Enhancing User Privacy in Adaptive Web Sites with Client-Side User Profiles

Author(s):  
Constantinos Kolias ◽  
Vassilis Kolias ◽  
Ioannis Anagnostopoulos ◽  
Georgios Kambourakis ◽  
Eleftherios Kayafas
2021 ◽  
Author(s):  
Jindong Zhao ◽  
Wenshuo Wang ◽  
Dan Wang ◽  
Chunxiao Mu

Abstract Nowadays, smart medical cloud platforms have become a new direction in the industry. However, because the medical system involves personal physiological data, user privacy in data transmission and processing is also easy to leak in the smart medical cloud platform. This paper proposed a medical data privacy protection framework named PMHE based on blockchain and fully homomorphic encryption technology. The framework receives personal physiological data from wearable devices on the client side, and uses blockchain as data storage to ensure that the data cannot be tampered with or forged; Besides, it use fully homomorphic encryption method to design a disease prediction model, which was implemented using smart contracts. In PMHE, data is encoded and encrypted on the client side, and encrypted data is uploaded to the cloud platform via the public Internet, preventing privacy leakage caused by channel eavesdropping; Smart contracts run on the blockchain platform for disease prediction, and the operators participating in computing are encrypted user data too, so it avoids privacy and security issues caused by platform data leakage. The client-to-cloud interaction protocol is also designed to overcome the defect that fully homomorphic encryption only supports addition and multiplication by submitting tuples on the client side, to ensure that the prediction model can perform complex computing. In addition, the design of the smart contract is introduced in detail, and the performance of the system is analyzed. Finally, experiments are conducted to verify the operating effect of the system, ensuring that user privacy is not leaked without affecting the accuracy of the model, and realizing a smart medical cloud platform in which data can be used but cannot be borrowed.


Informatics ◽  
2021 ◽  
Vol 8 (1) ◽  
pp. 5
Author(s):  
Enrique Rus-Arias ◽  
Pedro R. Palos-Sanchez ◽  
Ana Reyes-Menendez

The evolution of digital advertising, which is aimed at a mass audience, to programmatic advertising, which is aimed at individual users depending on their profile, has raised concerns about the use of personal data and invasion of user privacy on the Internet. Concerned users install ad-blockers that prevent users from seeing ads and this has resulted in many companies using anti-ad-blockers. This study investigates the sociological variables that make users feel that advertising is annoying and then decide to use ad-blockers to avoid it. Our results provide useful information for companies to appropriately segment user profiles. To do this, data collected from Internet users (n = 19,973) about what makes online advertising annoying and why they decide to use ad-blockers are analyzed. First, the existing literature on the subject was reviewed and then the relevant sociological variables that influence users’ feelings about online advertising and the use of ad-blockers were investigated. This work contributes new information to the discussion about user privacy on the Internet. Some of the key findings suggest that Internet advertising can be very intrusive for many users and that all the variables investigated, except marital status and education, influence the users’ opinions. It was also found that all the variables in this study are important when a user decides to use an ad-blocker. A clear and inverse correlation between age and opinion about advertising as annoying could be seen, along with a clear difference of opinion due to gender. The results suggest that users without children use ad-blockers the least, while retirees and housewives use them the most.


Author(s):  
Jesús López Miján ◽  
Irene Garrigós ◽  
Sergio Firmenich
Keyword(s):  

Author(s):  
Xunhua Wang ◽  
Hua Lin

Unlike existing password authentication mechanisms on the web that use passwords for client-side authentication only, password-authenticated key exchange (PAKE) protocols provide mutual authentication. In this article, we present an architecture to integrate existing PAKE protocols to the web. Our integration design consists of the client-side part and the server-side part. First, we implement the PAKE client-side functionality with a web browser plug-in, which provides a secure implementation base. The plug-in has a log-in window that can be customized by a user when the plug-in is installed. By checking the user-specific information in a log-in window, an ordinary user can easily detect a fake log-in window created by mobile code. The server-side integration comprises a web interface and a PAKE server. After a successful PAKE mutual authentication, the PAKE plug-in receives a one-time ticket and passes it to the web browser. The web browser authenticates itself by presenting this ticket over HTTPS to the web server. The plug-in then fades away and subsequent web browsing remains the same as usual, requiring no extra user education. Our integration design supports centralized log-ins for web applications from different web sites, making it appropriate for digital identity management. A prototype is developed to validate our design. Since PAKE protocols use passwords for mutual authentication, we believe that the deployment of this design will significantly mitigate the risk of phishing attacks.


2008 ◽  
Vol 20 (2) ◽  
pp. 202-215 ◽  
Author(s):  
O. Nasraoui ◽  
M. Soliman ◽  
E. Saka ◽  
A. Badia ◽  
R. Germain

2013 ◽  
Vol 5 (1) ◽  
pp. 34-52
Author(s):  
Arto Salminen ◽  
Tommi Mikkonen ◽  
Feetu Nyrhinen ◽  
Antero Taivalsaari

Software mashups that combine content from multiple web sites to an integrated experience are a popular trend. However, methods, tools and architectures for creating mashups are still rather undeveloped, and there is little engineering support behind them. In this paper the authors present guidelines that can serve as a helpful starting point for the design of new mashups. Guidelines focus mainly on mashup creation methods. Furthermore, they describe a reference architecture for client-side mashup development. In addition, the authors provide insight into mashup development based on their practical experiences in implementing various sample client-side mashup applications and tools for creating them. The long term goal of the authors’ work is to facilitate the development of compelling, robust and maintainable mashup applications, and more generally ease the transition towards web-based software development.


Sign in / Sign up

Export Citation Format

Share Document