Futuristic invisibility for user identity and data protection
In this research survey analysis, we tried to introduce an all-inclusive study analyzing futuristic Invisibility of user Identity and data protection researches in cryptocurrencies. It has been classified into 2 main classes: Researches analyzing Invisibility of user Identity and Concealment, and studies proposing improvements in Invisibility of user Identity and Concealment. The first category deals with the disclosure of information through the use of de-anonymization. We inspected and determined classification for 35 types of research in this class and obtained 11 methods and 7 results from those researches. The motive of the researches is mainly to discover de-anonymization methodologies and get details which compromise Concealment, such as exploring cryptocurrency’s addresses, identifying individuality, matching cryptocurrency addresses to IP addresses, connecting cryptocurrency’s addresses to geographical-location coordinate. Our examination shows that the analytical survey of Blockchain comprises most researches in this class and there are some analytical researches.
Abawajy, J., Huda, S., Sharmeen, S., Hassan, M. M., & Almogren, A. (2018). Identifying cyber threats to mobile-IoT applications in edge computing paradigm. Future Generation Computer Systems, 89, 525-538. https://doi.org/10.1016/j.future.2018.06.053
Amoroso, E. (2012). Cyber attacks: protecting national infrastructure. Elsevier.
Andreas Pfitzmann, S. C., Hansen, M., & Van Herreweghen, E. (2010). Privacy-Enhancing Identity Management.
Andress, J. (2014). The basics of information security: understanding the fundamentals of InfoSec in theory and practice. Syngress.
Clark, J. A., Stepney, S., & Chivers, H. (2005). Breaking the model: finalisation and a taxonomy of security attacks. Electronic Notes in Theoretical Computer Science, 137(2), 225-242. https://doi.org/10.1016/j.entcs.2005.04.033
Ebad, R. (2014). Ubiquitous computing: A brief review of impacts and issues. Scal. Comput. Pract. Exp, 2(3), 59-68.
Esmaeilian, B., Behdad, S., & Wang, B. (2016). The evolution and future of manufacturing: A review. Journal of Manufacturing Systems, 39, 79-100. https://doi.org/10.1016/j.jmsy.2016.03.001
Fang, B., Ren, K., & Jia, Y. (2018). The new frontiers of cybersecurity. Engineering, 4(1), 1-2.
Gayathri, K. S., Thomas, T., & Jayasudha, J. (2012). Security issues of media sharing in social cloud. Procedia engineering, 38, 3806-3815. https://doi.org/10.1016/j.proeng.2012.06.436
Han, J., Pei, J., & Kamber, M. (2011). Data mining: concepts and techniques. Elsevier.
Light, A. (2011). HCI as heterodoxy: Technologies of identity and the queering of interaction with computers✩. Interacting with Computers, 23(5), 430-438. https://doi.org/10.1016/j.intcom.2011.02.002
MacMillan, D. (2014). Data sharing and discovery: What librarians need to know. The Journal of Academic Librarianship, 40(5), 541-549. https://doi.org/10.1016/j.acalib.2014.06.011
Manu, T. R., Parmar, M., Shashikumara, A. A., & Asjola, V. (2019). Research Information Management Systems: A Comparative Study. In Research Data Access and Management in Modern Libraries (pp. 54-80). IGI Global. https://doi.org/10.4018/978-1-5225-8437-7.ch003
Minkkinen, M. (2015). Futures of privacy protection: a framework for creating scenarios of institutional change. Futures, 73, 48-60. https://doi.org/10.1016/j.futures.2015.07.006
Raggo, M. T. (2015). Mobile Data Loss: Threats and Countermeasures. Syngress.
Rittinghouse, J., Ransome, J. F., & CISM, C. (2004). Wireless operational security. Elsevier.
Rittinghouse, J., Ransome, J. F., & CISM, C. (2005). IM Instant Messaging Security. Elsevier.
Wasserman, R. C. (2011). Electronic medical records (EMRs), epidemiology, and epistemology: reflections on EMRs and future pediatric clinical research. Academic pediatrics, 11(4), 280-287. https://doi.org/10.1016/j.acap.2011.02.007
Zhang, G., Yang, Y., & Chen, J. (2012). A historical probability based noise generation strategy for privacy protection in cloud computing. Journal of Computer and System Sciences, 78(5), 1374-1381. https://doi.org/10.1016/j.jcss.2011.12.020
Copyright (c) 2019 International research journal of management, IT and social sciences
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All articles in the IRJMIS is published under the terms of the Creative Commons Attribution-ShareAlike 4.0 International License (CC BY-SA) which allows authors and users to copy, distribute, transmit and adapt the article. The Creative Commons Attribution-ShareAlike 4.0 International License of an open-access article, as long as the author is properly attributed. Copyright on any research article published by SLOAP is retained by the author(s). Authors grant to the SLOAP right to publish the article, to be cited as its original publisher in case of reuse, and to distribute it in all forms and media. Copyright and source must be acknowledged and a link must be made to the article's DOI.