{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:15:42Z","timestamp":1760238942726,"version":"build-2065373602"},"reference-count":53,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2020,9,17]],"date-time":"2020-09-17T00:00:00Z","timestamp":1600300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Plataforma de Veh\u00edculos de Transporte de Materiales y Seguimiento Aut\u00f3nomo","award":["SA063G19"],"award-info":[{"award-number":["SA063G19"]}]},{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia - FCT","award":["UIDB\/04111\/2020"],"award-info":[{"award-number":["UIDB\/04111\/2020"]}]},{"name":"Junta Castilla y Le\u00f3n, Consejer\u00eda de Educaci\u00f3n and European Regional Development 507 Fund (ERDF)","award":["463AC03"],"award-info":[{"award-number":["463AC03"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electronics"],"abstract":"<jats:p>Smart environments are pervasive computing systems that provide higher comfort levels on daily routines throughout interactions among smart sensors and embedded computers. The lack of privacy within these interactions can lead to the exposure of sensitive data. We present PRIPRO (PRIvacy PROfiles), a management tool that includes an Android application that acts on the user\u2019s smartphone by allowing or blocking resources according to the context, in order to address this issue. Back-end web server processes and imposes a protocol according to the conditions that the user selected beforehand. The experimental results show that the proposed solution successfully communicates with the Android Device Administration framework, and the device appropriately reacts to the expected set of permissions imposed according to the user\u2019s profile with low response time and resource usage.<\/jats:p>","DOI":"10.3390\/electronics9091519","type":"journal-article","created":{"date-parts":[[2020,9,17]],"date-time":"2020-09-17T08:29:43Z","timestamp":1600331383000},"page":"1519","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["PRIPRO\u2014Privacy Profiles: User Profiling Management for Smart Environments"],"prefix":"10.3390","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8341-5695","authenticated-orcid":false,"given":"Jonas","family":"Cesconetto","sequence":"first","affiliation":[{"name":"Laboratory of Embedded and Distributed Systems, University of Vale do Itajai, Itaja\u00ed 88302-901, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9981-4586","authenticated-orcid":false,"given":"Lu\u00eds","family":"Augusto Silva","sequence":"additional","affiliation":[{"name":"Expert Systems and Applications Lab, Faculty of Science, University of Salamanca, Plaza de los Ca\u00eddos s\/n, 37008 Salamanca, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8680-6165","authenticated-orcid":false,"given":"Fabricio","family":"Bortoluzzi","sequence":"additional","affiliation":[{"name":"Laboratory of Embedded and Distributed Systems, University of Vale do Itajai, Itaja\u00ed 88302-901, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2344-1012","authenticated-orcid":false,"given":"Mar\u00eda","family":"Navarro-C\u00e1ceres","sequence":"additional","affiliation":[{"name":"Expert Systems and Applications Lab, Faculty of Science, University of Salamanca, Plaza de los Ca\u00eddos s\/n, 37008 Salamanca, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3039-4410","authenticated-orcid":false,"given":"Cesar","family":"A. Zeferino","sequence":"additional","affiliation":[{"name":"Laboratory of Embedded and Distributed Systems, University of Vale do Itajai, Itaja\u00ed 88302-901, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0446-9271","authenticated-orcid":false,"given":"Valderi","family":"R. Q. Leithardt","sequence":"additional","affiliation":[{"name":"Laboratory of Embedded and Distributed Systems, University of Vale do Itajai, Itaja\u00ed 88302-901, Brazil"},{"name":"COPELABS, Universidade Lus\u00f3fona de Humanidades e Tecnologias, 1749-024 Lisboa, Portugal"},{"name":"Departamento de Inform\u00e1tica, Universidade da Beira Interior, 6201-601 Covilh\u00e3, Portugal"},{"name":"VALORIZA, Research Center for Endogenous Resources Valorization, Instituto Polit\u00e9cnico de Portalegre, 7300-555 Portalegre, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2020,9,17]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Fernquist, J., Fangstrom, T., and Kaati, L. (2017). Iot data profiles: The routines of your life reveals who you are. 2017 European Intelligence and Security Informatics Conference (EISIC), IEEE.","DOI":"10.1109\/EISIC.2017.17"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1109\/COMST.2017.2748998","article-title":"Privacy in the smart city\u2014Applications, technologies, challenges, and solutions","volume":"20","author":"Eckhoff","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1016\/j.eswa.2017.11.017","article-title":"Spontaneous Social Network: Toward dynamic virtual communities based on context-aware computing","volume":"95","author":"Navarro","year":"2018","journal-title":"Expert Syst. Appl."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.jnca.2018.01.017","article-title":"Interoperable, dynamic and privacy-preserving access control for cloud data storage when integrating heterogeneous organizations","volume":"108","author":"Esposito","year":"2018","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_5","unstructured":"Bezawada, B., Haefner, K., and Ray, I. Securing Home IoT Environments with Attribute-Based Access Control. Proceedings of the Third ACM Workshop on Attribute-Based Access Control\u2014ABAC\u201918."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"54575","DOI":"10.1109\/ACCESS.2019.2912975","article-title":"Pervasive-Based Access Control Model for IoT Environments","volume":"7","author":"Achbarou","year":"2019","journal-title":"IEEE Access"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"604","DOI":"10.1109\/TSC.2016.2616875","article-title":"Purpose-Based Privacy Preserving Access Control for Secure Service Provision and Composition","volume":"12","author":"Amini","year":"2019","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/j.buildenv.2019.05.016","article-title":"A framework for group activity detection and recognition using smartphone sensors and beacons","volume":"158","author":"Chen","year":"2019","journal-title":"Build. Environ."},{"key":"ref_9","unstructured":"Leithardt, V.R.Q. (2015). UbiPri\u2013Middleware for Privacy Control and Management in Ubiquitous Environments. [Ph.D. Thesis, PPGC, Federal Univ. of Rio Grande do Sul (UFRGS)]. (In Portuguese)."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1193","DOI":"10.1109\/TLA.2020.9099759","article-title":"A solution for dynamic management of user profiles in IoT environments","volume":"18","author":"Leithardt","year":"2020","journal-title":"IEEE Lat. Am. Trans."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Martins, J.A., Och\u00f4a, I.S., Silva, L.A., Mendes, A.S., Gonz\u00e1lez, G.V., De Paz Santana, J., and Leithardt, V.R.Q. (2020). PRIPRO: A Comparison of Classification Algorithms for Managing Receiving Notifications in Smart Environments. Appl. Sci., 10.","DOI":"10.3390\/app10020502"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Cesconetto, J., Silva, L.A., C\u00e1ceres, M.N., Garcia, N.M., and Valderi Leithardt, R.Q. (2020, January 24\u201327). PRIPRO: Solution for user profile control and management based on data privacy. Proceedings of the 2020 15th Iberian Conference on Information Systems and Technologies (CISTI), Sevilla, Spain.","DOI":"10.23919\/CISTI49556.2020.9140810"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/MWC.2016.7721736","article-title":"Internet-of-things-based smart environments: State of the art, taxonomy, and open research challenges","volume":"23","author":"Ahmed","year":"2016","journal-title":"IEEE Wirel. Commun."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Silva, L.A., Leithardt, V.R.Q., Rolim, C.O., Gonz\u00e1lez, G.V., Geyer, C.F.R., and Silva, J.S. (2019). PRISER: Managing notification in multiples devices with data privacy support. Sensors, 19.","DOI":"10.3390\/s19143098"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.ijhcs.2019.09.004","article-title":"Understanding human-data interaction: Literature review and recommendations for design","volume":"134","author":"Victorelli","year":"2020","journal-title":"Int. J. Hum.-Comput. Stud."},{"key":"ref_16","first-page":"4442","article-title":"PAPG: Private Aggregation Scheme based on Privacy-preserving Gene in Wireless Sensor Networks","volume":"10","author":"Zeng","year":"2016","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1016\/j.ins.2016.12.050","article-title":"An efficient privacy-preserving compressive data gathering scheme in WSNs","volume":"390","author":"Xie","year":"2017","journal-title":"Inf. Sci."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/329124.329126","article-title":"The Computer for the 21st Century","volume":"3","author":"Weiser","year":"1999","journal-title":"SIGMOBILE Mob. Comput. Commun. Rev."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1016\/j.future.2018.06.005","article-title":"Augmenting computing capabilities at the edge by jointly exploiting mobile devices: A survey","volume":"88","author":"Hirsch","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_20","unstructured":"Statista (2020). Number of Smartphone Users Worldwide from 2016 to 2021, Statista."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Kumar, S., Shanker, R., and Verma, S. (2018, January 19\u201320). Context aware dynamic permission model: A retrospect of privacy and security in android system. Proceedings of the 2018 International Conference on Intelligent Circuits and Systems (ICICS), Phagwara, India.","DOI":"10.1109\/ICICS.2018.00073"},{"key":"ref_22","unstructured":"(2019). Google Developers Device Administration Overview, Google."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Horsmanheimo, S., Lembo, S., Tuomimaki, L., Huilla, S., Honkamaa, P., Laukkanen, M., and Kemppi, P. (2019, January 20\u201324). Indoor Positioning Platform to Support 5G Location Based Services. Proceedings of the 2019 IEEE International Conference on Communications Workshops (ICC Workshops), Shanghai, China.","DOI":"10.1109\/ICCW.2019.8757118"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Gro\u03b2windhager, B., Stocker, M., Rath, M., Boano, C.A., and R\u00f6mer, K. (2019, January 15\u201318). SnapLoc: An ultra-fast UWB-based indoor localization system for an unlimited number of tags. Proceedings of the 2019 18th ACM\/IEEE International Conference on Information Processing in Sensor Networks (IPSN), Montreal, QC, Canada.","DOI":"10.1145\/3302506.3310389"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Tiwari, P., and Malik, P.K. (2020, January 9\u201310). Design of UWB Antenna for the 5G Mobile Communication Applications: A Review. Proceedings of the 2020 International Conference on Computation, Automation and Knowledge Management (ICCAKM), Dubai, UAE.","DOI":"10.1109\/ICCAKM46823.2020.9051556"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3057859","article-title":"Empowering end users to customize their smart environments: Model, composition paradigms, and domain-specific tools","volume":"24","author":"Desolda","year":"2017","journal-title":"ACM Trans. Comput.-Hum. Interact."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/j.asoc.2018.05.049","article-title":"Semi-supervised learning based distributed attack detection framework for IoT","volume":"72","author":"Rathore","year":"2018","journal-title":"Appl. Soft Comput."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Hasan, R., Zawoad, S., and Haque, M.M. (2016, January 1\u20133). StuxMob: A situational-aware malware for targeted attack on smart mobile devices. Proceedings of the MILCOM 2016 IEEE Military Communications Conference, Baltimore, MD, USA.","DOI":"10.1109\/MILCOM.2016.7795378"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Nurgaliyev, K., Mauro, D.D., Khan, N., and Augusto, J.C. (2017, January 21\u201325). Improved Multi-user Interaction in a Smart Environment through a Preference-Based Conflict Resolution Virtual Assistant. Proceedings of the 2017 International Conference on Intelligent Environments (IE), Seoul, Korea.","DOI":"10.1109\/IE.2017.21"},{"key":"ref_30","unstructured":"Coulouris, G., Dollimore, J., Kindberg, T., and Blair, G. (2012). Distributed Systems: Concepts and Design, Bookman Editora. [5th ed.]."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1109\/MC.2015.33","article-title":"Attribute-Based Access Control","volume":"48","author":"Hu","year":"2015","journal-title":"Computer"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1590\/S1413-99362011000200008","article-title":"Ontologias e taxonomias: Diferen\u00e7as","volume":"16","author":"Vital","year":"2011","journal-title":"Perspect. Cienc. Inform."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"2103","DOI":"10.1109\/JIOT.2018.2869847","article-title":"Internet of Things (IoT) cybersecurity research: A review of current research topics","volume":"6","author":"Lu","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Lozano Dom\u00ednguez, J.M., and Mateo Sanguino, T.J. (2019). Review on V2X, I2X, and P2X Communications and Their Applications: A Comprehensive Analysis over Time. Sensors, 19.","DOI":"10.3390\/s19122756"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1016\/j.comcom.2018.01.014","article-title":"Understanding autonomic network management: A look into the past, a solution for the future","volume":"122","author":"Khan","year":"2018","journal-title":"Comput. Commun."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1016\/j.chb.2015.04.046","article-title":"The impacts of identity verification and disclosure of social cues on flaming in online user comments","volume":"51","author":"Cho","year":"2015","journal-title":"Comput. Hum. Behav."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"29763","DOI":"10.1109\/ACCESS.2018.2880838","article-title":"Trust management techniques for the Internet of Things: A survey","volume":"7","author":"Guizani","year":"2019","journal-title":"IEEE Access"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"563","DOI":"10.1007\/s10115-017-1027-3","article-title":"Contextual information fusion for intrusion detection: A survey and taxonomy","volume":"52","author":"Aleroud","year":"2017","journal-title":"Knowl. Inf. Syst."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1016\/j.comnet.2018.12.008","article-title":"Internet of Things applications: A systematic review","volume":"148","author":"Asghari","year":"2019","journal-title":"Comput. Netw."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1016\/j.chb.2018.10.028","article-title":"Mobile crowd sensing\u2014Taxonomy, applications, challenges, and solutions","volume":"101","author":"Boubiche","year":"2019","journal-title":"Comput. Hum. Behav."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1016\/j.jpdc.2014.08.004","article-title":"Reputation systems: A survey and taxonomy","volume":"75","author":"Hendrikx","year":"2015","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/j.inffus.2019.05.004","article-title":"A survey of data fusion in smart city applications","volume":"52","author":"Lau","year":"2019","journal-title":"Inf. Fusion"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"358","DOI":"10.1016\/j.future.2016.10.026","article-title":"Major requirements for building Smart Homes in Smart Cities based on Internet of Things technologies","volume":"76","author":"Hui","year":"2017","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/j.ijmedinf.2017.12.018","article-title":"Analyzing recommender systems for health promotion using a multidisciplinary taxonomy: A scoping review","volume":"114","author":"Schneider","year":"2018","journal-title":"Int. J. Med Inform."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/j.comnet.2015.10.018","article-title":"Data routing strategies in opportunistic mobile social networks: Taxonomy and open challenges","volume":"93","author":"Zhu","year":"2015","journal-title":"Comput. Netw."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1016\/j.pec.2018.08.034","article-title":"The Taxonomy of Everyday Self-management Strategies (TEDSS): A framework derived from the literature and refined using empirical data","volume":"102","author":"Audulv","year":"2019","journal-title":"Patient Educ. Couns."},{"key":"ref_47","unstructured":"Gassen, M., and Fhom, H.S. (2016). Towards Privacy-preserving Mobile Location Analytics. EDBT\/ICDT Workshops, CEUR-WS Team."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"101606","DOI":"10.1016\/j.cose.2019.101606","article-title":"Weaponizing information systems for political disruption: The actor, lever, effects, and response taxonomy (ALERT)","volume":"88","author":"Desouza","year":"2019","journal-title":"Comput. Secur."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Anthonysamy, P., Rashid, A., and Chitchyan, R. (2017, January 20\u201328). Privacy requirements: Present & future. Proceedings of the 2017 IEEE\/ACM 39th International Conference on Software Engineering: Software Engineering in Society Track (ICSE-SEIS), Bueons Aires, Argentina.","DOI":"10.1109\/ICSE-SEIS.2017.3"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1016\/j.dcan.2017.04.003","article-title":"A roadmap for security challenges in the Internet of Things","volume":"4","author":"Natalizio","year":"2018","journal-title":"Digit. Commun. Netw."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.procs.2019.04.011","article-title":"PrivUML: A privacy metamodel","volume":"151","author":"Mokhtari","year":"2019","journal-title":"Procedia Comput. Sci."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"74120","DOI":"10.1109\/ACCESS.2018.2883149","article-title":"Future cloud systems design: Challenges and research directions","volume":"6","author":"Taherkordi","year":"2018","journal-title":"IEEE Access"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"477","DOI":"10.2307\/40041279","article-title":"A taxonomy of privacy","volume":"154","author":"Solove","year":"2006","journal-title":"Univ. PA Law Rev."}],"container-title":["Electronics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2079-9292\/9\/9\/1519\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T10:10:49Z","timestamp":1760177449000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2079-9292\/9\/9\/1519"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,17]]},"references-count":53,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2020,9]]}},"alternative-id":["electronics9091519"],"URL":"https:\/\/doi.org\/10.3390\/electronics9091519","relation":{},"ISSN":["2079-9292"],"issn-type":[{"type":"electronic","value":"2079-9292"}],"subject":[],"published":{"date-parts":[[2020,9,17]]}}}