sensors-logo

Journal Browser

Journal Browser

Data Privacy, Security, and Trust in New Technological Trends—2nd Edition

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Sensor Networks".

Deadline for manuscript submissions: 28 February 2025 | Viewed by 1769

Special Issue Editor


E-Mail Website
Guest Editor
Department of Information Science and Technology, ISTAR, University Institute of Lisbon (ISCTE-IUL), 1649-026 Lisbon, Portugal
Interests: distributed systems; algorithms; data privacy
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

The integration of sensors into a wide variety of connected devices will enable the expansion of IoT, enabling more comprehensive data collection to improve automation and decision making. As a result, sensors on mobile devices will become smarter, using machine learning and artificial intelligence algorithms to improve efficiency in data collection and interpretation. Therefore, the use of Heterogeneous Networks like 6G will likely adopt a more integrated approach, combining ground, air, and space communications to create a more heterogeneous and comprehensive network. Thus, there is a need for more robust solutions related to the security of applications and systems in different contexts of use and processing. Therefore, it is necessary to implement and improve solutions that involve security and data encryption in a context not only of software but also hardware, whether in a mini-actualization scenario or in large servers for large-scale data processing, thus making data privacy management more extensive, whether for the user or for commercial or industrial solutions. With this, we invite authors with proposals for solutions that solve these open problems with news and scientific contributions for the readers of this Special Issue and for the scientific community.

Prof. Dr. Valderi R. Q. Leithardt
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • blockchain
  • communication protocols
  • cryptographic algorithms
  • cyberattacks
  • cybersecurity
  • data privacy and trust
  • data security on drones
  • knowledge on security and privacy
  • hardware security
  • data security in smart cities
  • information context
  • Internet of Things
  • management data privacy and trust in cloud computing
  • mechanism to protect mobile and IoT applications
  • security in data science

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

14 pages, 3040 KiB  
Article
User Privacy Protection via Windows Registry Hooking and Runtime Encryption
by Edward L. Amoruso, Richard Leinecker and Cliff C. Zou
Sensors 2024, 24(16), 5106; https://doi.org/10.3390/s24165106 - 6 Aug 2024
Viewed by 624
Abstract
The Windows registry contains a plethora of information in a hierarchical database. It includes system-wide settings, user preferences, installed programs, and recently accessed files and maintains timestamps that can be used to construct a detailed timeline of user activities. However, these data are [...] Read more.
The Windows registry contains a plethora of information in a hierarchical database. It includes system-wide settings, user preferences, installed programs, and recently accessed files and maintains timestamps that can be used to construct a detailed timeline of user activities. However, these data are unencrypted and thus vulnerable to exploitation by malicious actors who gain access to this repository. To address this security and privacy concern, we propose a novel approach that efficiently encrypts and decrypts sensitive registry data in real time. Our developed proof-of-concept program intercepts interactions between the registry’s application programming interfaces (APIs) and other Windows applications using an advanced hooking technique. This enables the proposed system to be transparent to users without requiring any changes to the operating system or installed software. Our approach also implements the data protection API (DPAPI) developed by Microsoft to securely manage each user’s encryption key. Ultimately, our research provides an enhanced security and privacy framework for the Windows registry, effectively fortifying the registry against security and privacy threats while maintaining its accessibility to legitimate users and applications. Full article
Show Figures

Figure 1

25 pages, 1063 KiB  
Article
Enhancing Monitoring Performance: A Microservices Approach to Monitoring with Spyware Techniques and Prediction Models
by Anubis Graciela de Moraes Rossetto, Darlan Noetzold, Luis Augusto Silva and Valderi Reis Quietinho Leithardt
Sensors 2024, 24(13), 4212; https://doi.org/10.3390/s24134212 - 28 Jun 2024
Viewed by 695
Abstract
In today’s digital landscape, organizations face significant challenges, including sensitive data leaks and the proliferation of hate speech, both of which can lead to severe consequences such as financial losses, reputational damage, and psychological impacts on employees. This work considers a comprehensive solution [...] Read more.
In today’s digital landscape, organizations face significant challenges, including sensitive data leaks and the proliferation of hate speech, both of which can lead to severe consequences such as financial losses, reputational damage, and psychological impacts on employees. This work considers a comprehensive solution using a microservices architecture to monitor computer usage within organizations effectively. The approach incorporates spyware techniques to capture data from employee computers and a web application for alert management. The system detects data leaks, suspicious behaviors, and hate speech through efficient data capture and predictive modeling. Therefore, this paper presents a comparative performance analysis between Spring Boot and Quarkus, focusing on objective metrics and quantitative statistics. By utilizing recognized tools and benchmarks in the computer science community, the study provides an in-depth understanding of the performance differences between these two platforms. The implementation of Quarkus over Spring Boot demonstrated substantial improvements: memory usage was reduced by up to 80% and CPU usage by 95%, and system uptime decreased by 119%. This solution offers a robust framework for enhancing organizational security and mitigating potential threats through proactive monitoring and predictive analysis while also guiding developers and software architects in making informed technological choices. Full article
Show Figures

Figure 1

Back to TopTop