Privacy in the Future Internet

A special issue of Future Internet (ISSN 1999-5903).

Deadline for manuscript submissions: closed (20 February 2013) | Viewed by 29273

Special Issue Editors


E-Mail
Guest Editor
Department of Computer Science, University of Paderborn, Fürstenallee 11, 33102 Paderborn, Germany
Interests: network security; privacy enhancing technologies; data protection and information law; smart grid privacy

E-Mail
Guest Editor
Institute for Media and Imaging Technologies, Cologne University of Applied Sciences, Betzdorfer Str. 2, D-50679 Cologne, Germany

E-Mail
Guest Editor
Department of Computer Science, Karlstad University, Universitetsgatan 1, S 651 88 Karlstad, Sweden

Special Issue Information

Dear Colleagues,

Whatever the Future Internet is going to look like, we can be certain it will impact our daily lives even more than current networks. The “Internet of Things” vision, for example, includes the ubiquitous presence of networked devices, including RFID tags, sensors and sensor networks, and possibly devices we haven’t even considered yet. These do not exist in isolation, as they are used by human beings on the one hand, and sense information about human beings on the other hand. If privacy is not sufficiently taken into account in the design of communication infrastructures, including authentication, access control, and accounting solutions, there is a risk that personal information gathered in the Internet of Things will be abused. The same is true for the “Internet of Services”, where service usage might enable the creation of comprehensive user profiles if privacy risks are not considered in the design stage.

However, new challenges for privacy enhancing technologies do not merely arise from a change of scale or from new applications. Numerous research projects deal with new architectural approaches, e.g. based on network virtualization. How can privacy be built into these architectures, for example by enabling anonymous communication or the handling of privacy policies? Is there a need for new privacy enhancing technologies, or can the existing ones (e.g., onion routing) be easily adapted?

This special issue of Future Internet welcomes all contributions dealing with privacy challenges related to the Future Internet and its applications. This includes, for example:

  • Anonymous communication
  • Privacy-aware AAA solutions
  • Descriptions and models of new threats to privacy
  • User-centric identity management
  • Location privacy
  • Impact of new Internet architectures on privacy-enhancing technologies and vice versa
  • Privacy in future critical infrastructures (e.g., smart energy grid)
  • Future of privacy legislation (defining appropriate legal frameworks for the Future Internet)

Dr. Christoph Sorge
Prof. Dr. Luigi Lo Iacono
Prof. Dr. Simone Fischer-Hübner
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • privacy enhancing technologies
  • identity management
  • anonymous communication
  • internet of things
  • internet of services

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Related Special Issue

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Other

520 KiB  
Article
Supporting Trust and Privacy with an Identity-Enabled Architecture
by Amardeo Sarma and Joao Girao
Future Internet 2012, 4(4), 1016-1025; https://doi.org/10.3390/fi4041016 - 19 Nov 2012
Cited by 1 | Viewed by 6415
Abstract
Cost reduction and a vastly increased potential to create new services, such as via the proliferation of the Cloud, have led to many more players and “end points”. With many of them being new entrants, possibly short-lived, the question of how to handle [...] Read more.
Cost reduction and a vastly increased potential to create new services, such as via the proliferation of the Cloud, have led to many more players and “end points”. With many of them being new entrants, possibly short-lived, the question of how to handle trust and privacy in this new context arises. In this paper, we specifically look at the underlying infrastructure that connects end-points served by these players, which is an essential part of the overall architecture to enable trust and privacy. We present an enhanced architecture that allows real people, objects and services to reliably interact via an infrastructure providing assured levels of trust. Full article
(This article belongs to the Special Issue Privacy in the Future Internet)
Show Figures

Figure 1

1671 KiB  
Article
Distributed Performance Measurement and Usability Assessment of the Tor Anonymization Network
by Sebastian Müller, Franziska Brecht, Benjamin Fabian, Steffen Kunz and Dominik Kunze
Future Internet 2012, 4(2), 488-513; https://doi.org/10.3390/fi4020488 - 15 May 2012
Cited by 3 | Viewed by 14844
Abstract
While the Internet increasingly permeates everyday life of individuals around the world, it becomes crucial to prevent unauthorized collection and abuse of personalized information. Internet anonymization software such as Tor is an important instrument to protect online privacy. However, due to the performance [...] Read more.
While the Internet increasingly permeates everyday life of individuals around the world, it becomes crucial to prevent unauthorized collection and abuse of personalized information. Internet anonymization software such as Tor is an important instrument to protect online privacy. However, due to the performance overhead caused by Tor, many Internet users refrain from using it. This causes a negative impact on the overall privacy provided by Tor, since it depends on the size of the user community and availability of shared resources. Detailed measurements about the performance of Tor are crucial for solving this issue. This paper presents comparative experiments on Tor latency and throughput for surfing to 500 popular websites from several locations around the world during the period of 28 days. Furthermore, we compare these measurements to critical latency thresholds gathered from web usability research, including our own user studies. Our results indicate that without massive future optimizations of Tor performance, it is unlikely that a larger part of Internet users would adopt it for everyday usage. This leads to fewer resources available to the Tor community than theoretically possible, and increases the exposure of privacy-concerned individuals. Furthermore, this could lead to an adoption barrier of similar privacy-enhancing technologies for a Future Internet. Full article
(This article belongs to the Special Issue Privacy in the Future Internet)
Show Figures

Figure 1

Other

Jump to: Research

183 KiB  
Essay
The Clean Privacy Ecosystem of the Future Internet
by Lothar Fritsch
Future Internet 2013, 5(1), 34-45; https://doi.org/10.3390/fi5010034 - 14 Jan 2013
Cited by 1 | Viewed by 7267
Abstract
This article speculates on the future of privacy and electronic identities on the Internet. Based on a short review of security models and the development of privacy-enhancing technology, privacy and electronic identities will be discussed as parts of a larger context—an ecosystem of [...] Read more.
This article speculates on the future of privacy and electronic identities on the Internet. Based on a short review of security models and the development of privacy-enhancing technology, privacy and electronic identities will be discussed as parts of a larger context—an ecosystem of personal information and electronic identities. The article argues for an ecosystem view of personal information and electronic identities, as both personal information and identity information are basic required input for many applications. Therefore, for both application owners and users, a functioning ecosystem of personal information and electronic identification is important. For the future of the Internet, high-quality information and controlled circulation of such information is therefore argued as decisive for the value of future Internet applications. Full article
(This article belongs to the Special Issue Privacy in the Future Internet)
Back to TopTop