Автор: Rafi Ullah Khan
Издательство: IGI Global
Год: 2023
Страниц: 360
Язык: английский
Формат: pdf (true), epub
Размер: 23.0 MB
The objective is to publish both disciplinary, multidisciplinary and interdisciplinary works on questions related to experiences and phenomena that can or could be covered by concepts regarding the protection of privacy of web services users. Another major objective of this book is to highlight the importance of web search privacy to the readers and educate them about the recent developments. Privacy is a fundamental right, essential to autonomy and the protection of human dignity, serving as the foundation upon which many other human rights are built. Privacy is a meaningful way we seek to protect ourselves and society against arbitrary and unjustified use of power by reducing what can be known about us and what has been done to us while protecting us from others who may wish to exert control. This book will help students and the research community understand the current status of the privacy-aware web search mechanisms and help identify new challenges in the areas.
Privacy is a fundamental right, essential to autonomy and the protection of human dignity, serving as the foundation upon which many other human rights are built. Privacy is a meaningful way we seek to protect ourselves and society against arbitrary and unjustified use of power by reducing what can be known about us and what has been done to us while protecting us from others who may wish to exert control. This book has hot topics related to web privacy such as AI-based intrusion detection, desktop search engines, privacy risks, data leakage, web applications testing, secure cloud-based manufacturing, the status of user privacy in IoT, and GDPR for personal data protection.
Chapter 1, “State of the Art in Distributed Privacy-Preserving Protocols in Private Web Search,” discusses that Web Search Engine (WSE) is an inevitable software system used by people worldwide to retrieve data from the web by using keywords called queries. WSE stores search queries to build user profiles and provide personalized results. User search queries often hold identifiable information that could compromise the user’s privacy. Preserving privacy in web searches is the primary concern of users from various backgrounds. Many techniques have been proposed to preserve a person’s web search privacy with time.
Chapter 4, “Desktop Search Engines: A Review from User Perspective”, reveals that The advancements in desktop computing technologies and widespread use of digital devices have enabled users to generate and store tones of contents on their computers which creates information overload problem. Therefore, users need applications to search and retrieve required stored data instantly and accurately. This attracted the software industry to develop desktop search engines using the ideas of web search engines. However, selecting an effective desktop search engine is difficult for users. In this chapter, we have analyzed and compared available desktop search engines using a set of parameters including users' privacy and security.
Chapter 6, “Design, Development and Testing of Web Applications: Security Aspects”, explains that with the changes and developments in software technologies, web applications have gained an important place by being actively used in many sectors. Due to the fact that web applications do not require installation costs and are easily accessible and operable, the increased usage rate in recent years makes these systems the target of cyber hackers. As a result of cyber-attacks, services are blocked, material and moral damages and data privacy violations are experienced. Within the scope of this study, web applications are explained, vulnerabilities that threaten software security and the measures that can be taken against these vulnerabilities are included.
Chapter 8, “On the Current State of Privacy Risks in Software Requirement Elicitation Techniques”, explains that the requirement engineering encompasses five activities: feasibility investigation, elicitation, analysis, specification, and validation. Requirement engineering has achieved immense appeal among researchers and developers. During the elicitation step, data are gathered from several stack holders. Hence, if the data is shared with a third party, the integrity of the entire system, process, and data may be compromised, posing privacy risks. This paper proposes a comparative analysis of the prominent strategies, including privacy breach aspects, to achieve this objective.
Chapter 11, “Security in Internet-of-Things, Requirements, Challenges and Open Issues”, explores that electronic devices, cognitive computing and sensing enable the deployment of Internet-of-things (IoTs) with a huge application domain. However, resource constraints such as low computing powers, and limited storage IoT infrastructures are vulnerable to a variety of cyber-attacks. In Dark-Net the address space developed as designated unrestricted internet address space anticipated to be used by trustworthy hosts anywhere in the world, therefore, any communication activity is presumed to be unwanted and particularly treated as a probe, backscatter, or misconfiguration. This chapter investigates and evaluates the operation of Dark-Net Traffic Detection Systems in IoT networks. Moreover, the most recent work done to ensure security in the IoTs network has been discussed.
Chapter 12, “Users’ Privacy in IoT”, explains that the data gathered about individual users on IoT may include very intimate and private information. IoT devices are frequently distributed over the world, allowing for real-time communication between linked devices. Recently, a much broader range of IoT devices are connected to the network i.e., vehicles, household appliances, medical equipment, electric meters and controls, street lights, traffic controls, smart TVs, and digital assistants like Amazon Alexa and Google Home have all been targeted. These devices collect and transmit a huge amount of data daily via the Internet for various purposes. Users are mostly unaware of the fact that how much information is gathered and how it is utilized or shared with others. These devices constitute a privacy risk because this data can be utilized for malevolent reasons. Traditional cyber systems connect general-purpose computers, and IoT systems frequently connect highly specialized devices that are developed for specific purposes with limited programmability and customizability. Furthermore, unlike the highly centralized method of aggregating storage and processing power in huge data centres, IoT devices normally store and process data in a distributed manner. In addition, unlike traditional cyber systems, IoT systems also include sensors that collect data from the physical environment, so they are sometimes referred to as cyber-physical systems.
Chapter 14, "Artificial Intelligence (AI)-based Intrusion Detection System for IoT-enabled Networks: A State-of-the-art Survey", explain that the quality of human existence is improving day by day, and the Internet of things (IoT) has arisen as a new world of technology in the last two decades. It has aided the world through its applications in many sectors. However, while delivering several benefits, the extreme expansion of IoT devices makes them a potential target of attacks, which jeopardize the organization if left unchecked. Cyber security analysts have recently been using the DL-based model to detect and investigate malware to keep the organization secure from cyber-attacks. This work describes how AI-based techniques are utilized to identify cyber threats in the IoT environments better while considering these devices' heterogeneous and resource-constrained nature so that no extra burden is imposed on them. This work comprehensively evaluated the current solutions, challenges, and future directions in IoT security.
Target audience:
This premier reference source is an essential resource for students and educators of higher education, data experts, privacy professionals and engineers, IT managers, software developers, government officials, archivists and librarians, privacy rights activists, researchers, and academicians.
Скачать Protecting User Privacy in Web Search Utilization