{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T23:22:36Z","timestamp":1768260156243,"version":"3.49.0"},"reference-count":42,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2020,9,28]],"date-time":"2020-09-28T00:00:00Z","timestamp":1601251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["UIDB\/EEA\/50008\/2020"],"award-info":[{"award-number":["UIDB\/EEA\/50008\/2020"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["UIDB\/04111\/2020"],"award-info":[{"award-number":["UIDB\/04111\/2020"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers"],"abstract":"<jats:p>The mobile devices cause a constant struggle for the pursuit of data privacy. Nowadays, it appears that the number of mobile devices in the world is increasing. With this increase and technological evolution, thousands of data associated with everyone are generated and stored remotely. Thus, the topic of data privacy is highlighted in several areas. There is a need for control and management of data in circulation inherent to this theme. This article presents an approach to the interaction between the individual and the public environment, where this interaction will determine the access to information. This analysis was based on a data privacy management model in open environments created after reading and analyzing the current technologies. A mobile application based on location by Global Positioning System (GPS) was developed to substantiate this model, which considers the General Data Protection Regulation (GDPR) to control and manage access to each individual\u2019s data.<\/jats:p>","DOI":"10.3390\/computers9040077","type":"journal-article","created":{"date-parts":[[2020,9,28]],"date-time":"2020-09-28T10:39:58Z","timestamp":1601289598000},"page":"77","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["PriADA: Management and Adaptation of Information Based on Data Privacy in Public Environments"],"prefix":"10.3390","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0286-8677","authenticated-orcid":false,"given":"Hugo","family":"Lopes","sequence":"first","affiliation":[{"name":"Departamento de Inform\u00e1tica, Universidade da Beira Interior, 6201-001 Covilh\u00e3, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3394-6762","authenticated-orcid":false,"given":"Ivan Miguel","family":"Pires","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica\u00e7\u00f5es, Universidade da Beira Interior, 6201-001 Covilh\u00e3, Portugal"},{"name":"Computer Science Department, Polytechnic Institute of Viseu, 3504-510 Viseu, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1808-4364","authenticated-orcid":false,"given":"Hector","family":"S\u00e1nchez San Blas","sequence":"additional","affiliation":[{"name":"Expert Systems and Applications Lab, Faculty of Science, University of Salamanca, Plaza de los Ca\u00eddos s\/n, 37008 Salamanca, Spain"}]},{"given":"Ra\u00fal","family":"Garc\u00eda-Ovejero","sequence":"additional","affiliation":[{"name":"Expert Systems and Applications Lab, Faculty of Science, University of Salamanca, Plaza de los Ca\u00eddos s\/n, 37008 Salamanca, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0446-9271","authenticated-orcid":false,"given":"Valderi","family":"Leithardt","sequence":"additional","affiliation":[{"name":"Departamento de Inform\u00e1tica, Universidade da Beira Interior, 6201-001 Covilh\u00e3, Portugal"},{"name":"COPELABS, Universidade Lus\u00f3fona de Humanidades e Tecnologias, 1749-024 Lisboa, Portugal"},{"name":"VALORIZA, Research Center for Endogenous Resources Valorization, Instituto Polit\u00e9cnico de Portalegre, 7300-555 Portalegre, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2020,9,28]]},"reference":[{"key":"ref_1","unstructured":"Leithardt, V.R.Q., Geyer, C.F.R., and Silva, J.M.S. (2019). Controle e Gerenciamento de Privacidade de Dados, Novas Edi\u00e7\u00f5es Acad\u00eamicas."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1193","DOI":"10.1109\/TLA.2020.9099759","article-title":"A Solution for Dynamic Management of User Profiles in IoT Environments","volume":"18","author":"Leithardt","year":"2020","journal-title":"IEEE Latin Am. Trans."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/978-3-319-12817-7_12","article-title":"mHealth Sensors and Applications for Personal Aid","volume":"Volume 5","author":"Adibi","year":"2015","journal-title":"Mobile Health"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Marques, G., Pires, I.M., Miranda, N., and Pitarma, R. (2019). Air Quality Monitoring using Assistive Robots for Ambient Assisted Living and Enhanced Living Environments through Internet of Things. Electronics, 8.","DOI":"10.3390\/electronics8121375"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Pires, I.M., Garcia, N.M., Pombo, N., Fl\u00f3rez-Revuelta, F., and Rodr\u00edguez, N.D. (2016). Validation techniques for sensor data in mobile health applications. J. Sens., 2016.","DOI":"10.1155\/2016\/2839372"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"358","DOI":"10.1007\/978-3-030-58793-2_29","article-title":"A Privacy-By-Design Architecture for Indoor Localization Systems","volume":"Volume 1266","author":"Shepperd","year":"2020","journal-title":"Quality of Information and Communications Technology"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Kaaniche, N., Laurent, M., and Belguith, S. (2020). Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey. J. Netw. Comput. Appl., 102807.","DOI":"10.1016\/j.jnca.2020.102807"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1628","DOI":"10.1109\/JIOT.2019.2898113","article-title":"IoT Big Data Security and Privacy Versus Innovation","volume":"6","author":"Sollins","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Katsikas, S., and Gkioulos, V. (2020). Security, Privacy, and Trustworthiness of Sensor Networks and Internet of Things. Sensors, 20.","DOI":"10.3390\/s20143846"},{"key":"ref_10","first-page":"65","article-title":"Privacy-Preserving Aggregation of IoT Data with Distributed Differential Privacy","volume":"25","author":"Lim","year":"2020","journal-title":"J. Korea Soc. Comput. Inf."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Affonso Souza, C., C\u00e9sar de Oliveira, C., Perrone, C., and Carneiro, G. (2020). From privacy to data protection: The road ahead for the Inter-American System of human rights. Int. J. Hum. Rights, 1\u201331.","DOI":"10.1080\/13642987.2020.1789108"},{"key":"ref_12","first-page":"1","article-title":"Location Privacy-Preserving Method Based on Historical Proximity Location","volume":"2020","author":"Guo","year":"2020","journal-title":"Wirel. Commun. Mobile Comput."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Saraiva, D.A.F., Leithardt, V.R.Q., de Paula, D., Sales Mendes, A., Gonz\u00e1lez, G.V., and Crocker, P. (2019). PRISEC: Comparison of Symmetric Key Algorithms for IoT Devices. Sensors, 19.","DOI":"10.3390\/s19194312"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Qi, L., Hu, C., Zhang, X., Khosravi, M.R., Sharma, S., Pang, S., and Wang, T. (2020). Privacy-aware Data Fusion and Prediction with Spatial-Temporal Context for Smart City Industrial Environment. IEEE Trans. Ind. Inf.","DOI":"10.1109\/TII.2020.3012157"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Sophus Lai, S., and Flensburg, S. (2020). A proxy for privacy uncovering the surveillance ecology of mobile apps. Big Data Soc., 7.","DOI":"10.1177\/2053951720942543"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1168","DOI":"10.1177\/1461444820912544","article-title":"Data capitalism and the user: An exploration of privacy cynicism in Germany","volume":"22","author":"Lutz","year":"2020","journal-title":"New Media Soc."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Ismagilova, E., Hughes, L., Rana, N.P., and Dwivedi, Y.K. (2020). Security, Privacy and Risks within Smart Cities: Literature Review and Development of a Smart City Interaction Framework. Inf. Syst. Front.","DOI":"10.1007\/s10796-020-10044-1"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"131723","DOI":"10.1109\/ACCESS.2020.3009876","article-title":"Data Security and Privacy Protection for Cloud Storage: A Survey","volume":"8","author":"Yang","year":"2020","journal-title":"IEEE Access"},{"key":"ref_19","first-page":"253","article-title":"Data Security and Privacy Protection in Cloud Computing: A Review","volume":"Volume 1167","author":"Peter","year":"2020","journal-title":"Intelligence in Big Data Technologies\u2014Beyond the Hype"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Chanal, P.M., and Kakkasageri, M.S. (2020). Security and Privacy in IoT: A Survey. Wirel. Pers. Commun.","DOI":"10.1007\/s11277-020-07649-9"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"May, Z.E., Kaffel Ben Ayed, H., and Machfar, D. (2019, January 24\u201328). State of the art on Privacy Risk Estimation Related to Android Applications. Proceedings of the 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), Tangier, Morocco.","DOI":"10.1109\/IWCMC.2019.8766464"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Zhang, H., Latif, S., Bassily, R., and Rountev, A. (October, January 30). Introducing Privacy in Screen Event Frequency Analysis for Android Apps. Proceedings of the 2019 19th International Working Conference on Source Code Analysis and Manipulation (SCAM), Cleveland, OH, USA.","DOI":"10.1109\/SCAM.2019.00037"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1184","DOI":"10.1109\/TMC.2019.2903186","article-title":"Privacy Risk Analysis and Mitigation of Analytics Libraries in the Android Ecosystem","volume":"19","author":"Liu","year":"2020","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"39541","DOI":"10.1109\/ACCESS.2018.2850060","article-title":"Analyzing Android App Privacy with GP-PP Model","volume":"6","author":"Kesswani","year":"2018","journal-title":"IEEE Access"},{"key":"ref_25","unstructured":"Wang, X., Qin, X., Hosseini, M.B., Slavin, R., Breaux, T.D., and Niu, J. (June, January 27). GUILeak: Tracing privacy policy claims on user input data for Android applications. Proceedings of the 40th International Conference on Software Engineering, Gothenburg, Sweden."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1016\/j.future.2019.02.038","article-title":"PAU: Privacy Assessment method with Uncertainty consideration for cloud-based vehicular networks","volume":"96","author":"Feng","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_27","unstructured":"Leithardt, V.R.Q. (2015). UbiPri: Middleware Para Controle e Gerenciamento de Privacidade em Ambientes Ub\u00edquos. [Ph.D. Thesis, Universidade Federal do Rio Grande do Sul]. Available online: https:\/\/lume.ufrgs.br\/handle\/10183\/147774."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Yan, Y., Gai, K., Jiang, P., Xu, L., and Zhu, L. (2019, January 10\u201312). Location-based Privacy-Preserving Techniques in Connected Environment: A Survey. Proceedings of the 2019 IEEE International Conference on Smart Cloud (SmartCloud), Tokyo, Japan.","DOI":"10.1109\/SmartCloud.2019.00036"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Zhuo, G., and Yang, H. (2018, January 12\u201314). Privacy-preserving context-aware friend discovery based on mobile sensing. Proceedings of the 2018 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA.","DOI":"10.1109\/ICCE.2018.8326325"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Hao, G., and Ya-Bin, X. (2017, January 13\u201316). Research on privacy preserving method based on T-closeness model. Proceedings of the 2017 3rd IEEE International Conference on Computer and Communications (ICCC), Chengdu, China.","DOI":"10.1109\/CompComm.2017.8322783"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Sales Mendes, A., Jim\u00e9nez-Bravo, D.M., Navarro-C\u00e1ceres, M., Reis Quietinho Leithardt, V., and Villarrubia Gonz\u00e1lez, G. (2020). Multi-Agent Approach Using LoRaWAN Devices: An Airport Case Study. Electronics, 9.","DOI":"10.3390\/electronics9091430"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Zhao, M., Ding, Y., Wu, Q., Wang, Y., Qin, B., and Fan, K. (2020). Privacy-Preserving Lightweight Data Monitoring in Internet of Things Environments. Wirel. Pers. Commun.","DOI":"10.1007\/s11277-020-07760-x"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1109\/TIFS.2019.2928205","article-title":"MoveWithMe: Location Privacy Preservation for Smartphone Users","volume":"15","author":"Kang","year":"2020","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"ref_34","unstructured":"Silva, L.A., Valderi, R.Q.L., Rudimar, S.D., and Silva, J.S. (2018). Priser\u2014Utiliza\u00e7\u00e3o De Ble Para Localiza\u00e7\u00e3o E Notifica\u00e7\u00e3o Com Base Na Privacidade De Dados. Rev. Eletr\u00f4nica Argent-Bras. Tecnol. Inf. Comun."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"4527","DOI":"10.1109\/TVT.2018.2791402","article-title":"ShiftRoute: Achieving Location Privacy for Map Services on Smartphones","volume":"67","author":"Zhang","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1109\/JSYST.2019.2938611","article-title":"SieveDroid: Intercepting Undesirable Private-Data Transmissions in Android Applications","volume":"14","author":"Huang","year":"2020","journal-title":"IEEE Syst. J."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1007\/978-3-030-50732-9_79","article-title":"PISA: A Privacy Impact Self-assessment App Using Personas to Relate App Behavior to Risks to Smartphone Users","volume":"Volume 1226","author":"Stephanidis","year":"2020","journal-title":"HCI International 2020\u2014Posters"},{"key":"ref_38","unstructured":"(2020, July 11). Measure App Performance with Android Profiler. Available online: https:\/\/developer.android.com\/studio\/profile\/android-profiler."},{"key":"ref_39","unstructured":"(2020, July 10). Android. The Platform Pushing what\u2019s Possible. Available online: https:\/\/www.android.com\/."},{"key":"ref_40","unstructured":"(2020, July 10). Inspect Energy Usage with the Energy Profiler. Available online: https:\/\/developer.android.com\/studio\/profile\/energy-profiler."},{"key":"ref_41","unstructured":"(2020, July 10). View Java Heap and Memory Allocations with Memory Profiler. Available online: https:\/\/developer.android.com\/studio\/profile\/memory-profiler."},{"key":"ref_42","unstructured":"(2020, July 11). Inspect CPU Activities with the CPU Profiler. Available online: https:\/\/developer.android.com\/studio\/profile\/cpu-profiler."}],"container-title":["Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-431X\/9\/4\/77\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T10:14:31Z","timestamp":1760177671000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-431X\/9\/4\/77"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,28]]},"references-count":42,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2020,12]]}},"alternative-id":["computers9040077"],"URL":"https:\/\/doi.org\/10.3390\/computers9040077","relation":{},"ISSN":["2073-431X"],"issn-type":[{"value":"2073-431X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,28]]}}}