The Role of Context Awareness in Cloud Privacy, Security and Internet of Things

Authors

  • H. Manoj T. Gadiyar Associate Professor, Department of Computer Science and Engineering, Sri Dharmasthala Manjunatheshwara Institute of Technology, Ujire, Karnataka, India. E-mail: hmtcse@sdmit.in
  • Thyagaraju G S Professor and Head, Department of Computer Science and Engineering, Sri Dharmasthala Manjunatheshwara Institute of Technology, Ujire, Karnataka, India
  • Arjun K Assistant Professor, Department of Computer Science and Engineering, Sri Dharmasthala Manjunatheshwara Institute of Technology, Ujire, Karnataka, India
  • Gurusiddayya Hiremath Assistant Professor, Department of Computer Science and Engineering-AIML, Sahyadri College of Engineering and Management, Mangalore, Karnataka, India
  • Manjunath Kamath K Associate Professor, Department of Computer Science and Engineering, Yenepoya Institute of Technology, Moodabidri, Karnataka, India
  • Sahana Kumari B Assistant Professor, Department of Computer Science and Engineering, Sri Dharmasthala Manjunatheshwara Institute of Technology, Ujire, Karnataka, India
  • Pradeep Rao K B Assistant Professor, Department of Computer Science and Engineering, Sri Dharmasthala Manjunatheshwara Institute of Technology, Ujire, Karnataka, India
  • Preethi Assistant Professor, School of Computing and Information Technology, REVA University, Yelahanka, Bengaluru, Karnataka, India
  • Mohan Naik R Assistant Professor, Department of Electronics and Communication Engineering, Sri Dharmasthala Manjunatheshwara Institute of Technology, Ujire, Karnataka, India
  • Sowmya T K Assistant Professor, Department of Electronics and Communication Engineering, Sri Dharmasthala Manjunatheshwara Institute of Technology, Ujire, Karnataka, India

DOI:

https://doi.org/10.48001/jowacs.2023.1134-38

Keywords:

Consumer privacy, Context awareness, Data protection, Personal data, Privacy challenges

Abstract

In the rapidly evolving digital landscape, the proliferation of data-driven technologies has raised significant concerns about consumer privacy. This paper delves into the intricate relationship between context awareness and consumer privacy, highlighting the challenges that emerge when attempting to safeguard personal information in a world where context plays a pivotal role. Through an in-depth analysis of the evolving data ecosystem, privacy regulations, and technological advancements, this paper sheds light on the complexities associated with contextual privacy. The interplay between consumer preferences, data sharing practices, and the contextual nuances of data usage creates a dynamic landscape where traditional privacy paradigms fall short. As consumers engage with various digital platforms and services, their personal data is captured and exploited in diverse contexts, necessitating a more nuanced and adaptive approach to privacy preservation. The paper identifies key challenges, such as the trade-off between personalization and privacy, the difficulties in defining and enforcing context boundaries, and the need for innovative technological solutions that empower users to control their data in different contexts. By examining real-world case studies and the implications of context-aware privacy on businesses and regulatory bodies, this paper contributes to a comprehensive understanding of the multifaceted challenges faced in the pursuit of context-aware consumer privacy.

Downloads

Download data is not yet available.

References

Corrad, A., Montanari, R., & Tibaldi, D. (2004, September). Context-based access control management in ubiquitous environments. In Third IEEE International Symposium on Network Computing and Applications, 2004.(NCA 2004). Proceedings. (pp. 253-260). IEEE. https://doi.org/10.1109/NCA.2004.1347784.

Eldin, A. A., & Wagenaar, R. (2004, October). Towards users driven privacy control. In 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No. 04CH37583) (Vol. 5, pp. 4673-4679). IEEE. https://doi.org/10.1109/ICSMC.2004.1401269.

Gadiyar, H. M. T., Thyagaraju, G. S., & Goudar, R. H. (2023). An adaptive approach for preserving privacy in context aware applications for smartphones in cloud computing platform. International Journal of Advanced Computer Science and Applications, 13(5). http://dx.doi.org/10.14569/IJACSA.2022.0130561.

Hassan, J., Riaz, A., & Raazi, S. (2008). Activity-based Security Scheme for Ubiquitous Environments, IPCCC 2008. https://doi.org/10.1109/PCCC.2008.4745102.

Hayashi, E., Das, S., Amini, S., Hong, J., & Oakley, I. (2013, July). Casa: context-aware scalable authentication. In Proceedings of the Ninth Symposium on Usable Privacy and Security (pp. 1-10). https://doi.org/10.1145/2501604.2 501607.

Huang, X., He, Y., Hou, Y., Li, L., Sun, L., Zhang, S., ... & Zhang, T. (2009). Privacy of value-added context-aware service cloud. In Cloud Computing: First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009. Proceedings 1 (pp. 547-552). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-10665-1_50.

Joseph Charles, P., & Britto Ramesh Kumar, S. (2019). Security framework for context aware mobile web services. In International Conference on Computer Networks and Communication Technologies: ICCNCT 2018 (pp. 963-972). Springer Singapore. https://doi.org/10.1007/978-981-10-8681-6_89.

Kayes, A. S. M., Kalaria, R., Sarker, I. H., Islam, M. S., Watters, P. A., Ng, A., ... & Kumara, I. (2020). A survey of context-aware access control mechanisms for cloud and fog networks: Taxonomy and open research issues. Sensors, 20(9), 2464. https://doi.org/10.3390/s20092464.

Langheinrich, M. (2001, September). Privacy by design—principles of privacy-aware ubiquitous systems. In International conference on ubiquitous computing (pp. 273-291). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/3-540-45427-6_23.

Shi, E., Niu, Y., Jakobsson, M., & Chow, R. (2011). Implicit authentication through learning user behavior. In Information Security: 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers 13 (pp. 99-113). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-18178-8_9.

Venkataram, P. (2007, December). An authentication scheme for personalized mobile multimedia services: A cognitive agents based approach. In Future Generation Communication and Networking (FGCN 2007) (Vol. 1, pp. 167-172). IEEE.

https://doi.org/10.1109/FGCN.2007.57.

Zhang, Q., Qi, Y., Zhao, J., Hou, D., Zhao, T., & Liu, L. (2007, August). A study on context-aware privacy protection for personal information. In 2007 16th International Conference on Computer Communications and Networks (pp. 1351-1358). IEEE. https://doi.org/10.1109/ICCCN.2007.4318009.

Zhang, Q., Qi, Y., Zhao, J., Hou, D., Zhao, T., & Zhang, J. (2007, August). Context-aware learning privacy disclosure policy from interaction history. In Third International Conference on Natural Computation (ICNC 2007) (Vol. 5, pp. 3-7). IEEE. https://doi.org/10.1109/ICNC.2007.314.

Published

2023-06-30

How to Cite

H. Manoj T. Gadiyar, Thyagaraju G S, Arjun K, Gurusiddayya Hiremath, Manjunath Kamath K, Sahana Kumari B, Pradeep Rao K B, Preethi, Mohan Naik R, & Sowmya T K. (2023). The Role of Context Awareness in Cloud Privacy, Security and Internet of Things. Journal of Web Applications and Cyber Security (e-ISSN: 2584-0908), 1(1), 34–38. https://doi.org/10.48001/jowacs.2023.1134-38

Issue

Section

Original Research Articles