Futuristic invisibility for user identity and data protection
Keywords:
money, safe, secure, society, transferAbstract
In this research survey analysis, we tried to introduce an all-inclusive study analyzing futuristic Invisibility of user Identity and data protection researches in cryptocurrencies. It has been classified into 2 main classes: Researches analyzing Invisibility of user Identity and Concealment, and studies proposing improvements in Invisibility of user Identity and Concealment. The first category deals with the disclosure of information through the use of de-anonymization. We inspected and determined classification for 35 types of research in this class and obtained 11 methods and 7 results from those researches. The motive of the researches is mainly to discover de-anonymization methodologies and get details which compromise Concealment, such as exploring cryptocurrency’s addresses, identifying individuality, matching cryptocurrency addresses to IP addresses, connecting cryptocurrency’s addresses to geographical-location coordinate. Our examination shows that the analytical survey of Blockchain comprises most researches in this class and there are some analytical researches.
Downloads
References
Abawajy, J., Huda, S., Sharmeen, S., Hassan, M. M., & Almogren, A. (2018). Identifying cyber threats to mobile-IoT applications in edge computing paradigm. Future Generation Computer Systems, 89, 525-538. https://doi.org/10.1016/j.future.2018.06.053
Amoroso, E. (2012). Cyber attacks: protecting national infrastructure. Elsevier.
Andreas Pfitzmann, S. C., Hansen, M., & Van Herreweghen, E. (2010). Privacy-Enhancing Identity Management.
Andress, J. (2014). The basics of information security: understanding the fundamentals of InfoSec in theory and practice. Syngress.
Clark, J. A., Stepney, S., & Chivers, H. (2005). Breaking the model: finalisation and a taxonomy of security attacks. Electronic Notes in Theoretical Computer Science, 137(2), 225-242. https://doi.org/10.1016/j.entcs.2005.04.033
Ebad, R. (2014). Ubiquitous computing: A brief review of impacts and issues. Scal. Comput. Pract. Exp, 2(3), 59-68.
Esmaeilian, B., Behdad, S., & Wang, B. (2016). The evolution and future of manufacturing: A review. Journal of Manufacturing Systems, 39, 79-100. https://doi.org/10.1016/j.jmsy.2016.03.001
Fang, B., Ren, K., & Jia, Y. (2018). The new frontiers of cybersecurity. Engineering, 4(1), 1-2.
Gayathri, K. S., Thomas, T., & Jayasudha, J. (2012). Security issues of media sharing in social cloud. Procedia engineering, 38, 3806-3815. https://doi.org/10.1016/j.proeng.2012.06.436
Han, J., Pei, J., & Kamber, M. (2011). Data mining: concepts and techniques. Elsevier.
Light, A. (2011). HCI as heterodoxy: Technologies of identity and the queering of interaction with computers✩. Interacting with Computers, 23(5), 430-438. https://doi.org/10.1016/j.intcom.2011.02.002
MacMillan, D. (2014). Data sharing and discovery: What librarians need to know. The Journal of Academic Librarianship, 40(5), 541-549. https://doi.org/10.1016/j.acalib.2014.06.011
Manu, T. R., Parmar, M., Shashikumara, A. A., & Asjola, V. (2019). Research Information Management Systems: A Comparative Study. In Research Data Access and Management in Modern Libraries (pp. 54-80). IGI Global. https://doi.org/10.4018/978-1-5225-8437-7.ch003
Minkkinen, M. (2015). Futures of privacy protection: a framework for creating scenarios of institutional change. Futures, 73, 48-60. https://doi.org/10.1016/j.futures.2015.07.006
Raggo, M. T. (2015). Mobile Data Loss: Threats and Countermeasures. Syngress.
Rittinghouse, J., Ransome, J. F., & CISM, C. (2004). Wireless operational security. Elsevier.
Rittinghouse, J., Ransome, J. F., & CISM, C. (2005). IM Instant Messaging Security. Elsevier.
Wasserman, R. C. (2011). Electronic medical records (EMRs), epidemiology, and epistemology: reflections on EMRs and future pediatric clinical research. Academic pediatrics, 11(4), 280-287. https://doi.org/10.1016/j.acap.2011.02.007
Zhang, G., Yang, Y., & Chen, J. (2012). A historical probability based noise generation strategy for privacy protection in cloud computing. Journal of Computer and System Sciences, 78(5), 1374-1381. https://doi.org/10.1016/j.jcss.2011.12.020
Published
How to Cite
Issue
Section
Articles published in the International Research Journal of Management, IT and Social sciences (IRJMIS) are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IRJMIS right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.
Articles published in IRJMIS can be copied, communicated and shared in their published form for non-commercial purposes provided full attribution is given to the author and the journal. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
This copyright notice applies to articles published in IRJMIS volumes 7 onwards. Please read about the copyright notices for previous volumes under Journal History.