Wednesday 21 November 2018

In Pursuit of Privacy: An Introduction to Anonymization Technologies (CTCSA)-Lupine Publishers




Privacy in the age of pervasive computing and networking is a very hard topic to fully grasp. Any serious attempt at discussing it must take many different angles into account. User interactions grow richer month after month, and due to Big Data techniques, more information about each individual is known to third parties than to the person in question themselves; this is illustrated in the concept of inverse privacy [4]. What is a user to do to keep at least a basic expectation of privacy? Due to the pervasive analysis, a user can only expect their actions to remain private by becoming anonymous-By incorporating into their everyday activities Privacy Enhancement Technologies (PETs) that avoid each of their actions to be linked into a wide-encompassing profile.



No comments:

Post a Comment

Wishing you a Magical and Blissful Holiday

 Take a leap of faith and begin this wondrous new year by believing. Happy New Year!