Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 969150, 13 pages
http://dx.doi.org/10.1155/2014/969150
Review Article

A Survey on Personal Data Cloud

School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001, China

Received 11 April 2014; Revised 6 June 2014; Accepted 15 July 2014; Published 5 August 2014

Academic Editor: Gian Luca Marcialis

Copyright © 2014 Jiaqiu Wang and Zhongjie Wang. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. X. Meng and X. Ci, “Big data management: concepts, techniques and challenges,” Computer Research and Development, vol. 50, no. 1, pp. 146–169, 2013. View at Google Scholar · View at Scopus
  2. N. Stojanovic, L. Stojanovic, and R. Stuehmer, “Tutorial: personal big data management in the cyber-physical systems—the role of event processing,” in Proceedings of the 7th ACM International Conference on Distributed Event-Based Systems (DEBS '13), pp. 281–288, July 2013. View at Publisher · View at Google Scholar · View at Scopus
  3. P. S. Efraimidis, G. Drosatos, F. Nalbadis, and A. Tasidou, “Towards privacy in personal data management,” in Proceedings of the 12th Pan-Hellenic Conference on Informatics (PCI '08), pp. 3–7, Samos, Greece, August 2008. View at Publisher · View at Google Scholar · View at Scopus
  4. J. Kolter, M. Netter, and G. Pernul, “Visualizing past personal data disclosures,” in Proceedings of the 5th International Conference on Availability, Reliability, and Security (ARES '10), pp. 131–139, February 2010. View at Publisher · View at Google Scholar · View at Scopus
  5. M. Mun, S. Hao, N. Mishra et al., “Personal data vaults: a locus of control for personal data streams,” in Proceeding of the 6th International Conference on Emerging Networking Experiments and Technologies (Co-NEXT '10), New York, NY, USA, December 2010. View at Publisher · View at Google Scholar · View at Scopus
  6. L. Ardissono, A. Goy, G. Petrone, and M. Segnan, “From service clouds to user-centric personal clouds,” in Proceedings of the IEEE International Conference on Cloud Computing (CLOUD '09), pp. 1–8, 2009.
  7. T. Kirkham, S. Ravet, S. Winfield, and S. Kellomäki, “A personal data store for an Internet of Subjects,” in Proceedings of the International Conference on Information Society, i-Society 2011, pp. 92–97, June 2011. View at Scopus
  8. S. Garfinkel and D. Cox, “Finding and archiving the internet footprint,” in Proceedings of the 1st Digital Lives Research Conference: Personal Digital Archives for the 21st Century, Invited Paper, February 2009.
  9. M. Harrysson, E. Metayer, and H. Sarrazin, “How “social intelligence” can guide decisions,” McKinsey Quarterly, vol. 4, pp. 81–89, 2012. View at Google Scholar · View at Scopus
  10. T. Teraoka, “A study of exploration of heterogeneous personal data collected from mobile devices and web services,” in Proceedings of the 5th FTRA International Conference on Multimedia and Ubiquitous Engineering (MUE '11), pp. 239–245, Loutraki, Greece, June 2011. View at Publisher · View at Google Scholar · View at Scopus
  11. T. Mitchell, R. Carahuana, D. Freitag, J. McDermott, and D. Zabowski, “Experience with a learning personal assistant,” Communications of the ACM, vol. 37, no. 7, pp. 81–91, 1994. View at Publisher · View at Google Scholar · View at Scopus
  12. D. Malandrino, A. Petta, V. Scarano et al., “Privacy awareness about information leakage: who knows what about me?” in Proceedings of the 12th ACM Workshop on Privacy in the Electronic Society (WPES '13), pp. 279–284, 2013. View at Publisher · View at Google Scholar
  13. J. S. Erickson, S. Spence, M. Rhodes et al., “Content-centered collaboration spaces in the cloud,” IEEE Internet Computing, vol. 13, no. 5, pp. 34–42, 2009. View at Publisher · View at Google Scholar · View at Scopus
  14. C. Moiso, F. Antonelli, and M. Vescovi, “How do I manage my personal data? A telco perspective,” in Proceedings of the 1st International Conference on Data Technologies and Applications (DATA '12), pp. 123–128, July 2012. View at Scopus
  15. C. C. Huang, “A study on information security management with personal data protection,” in Proceedings of the IEEE 17th International Conference on Parallel and Distributed Systems, pp. 624–628, 2011.
  16. P. Serrano-Alvarado and E. Desmontils, “Personal linked data: a solution to manage user's privacy on the web,” in Atelier sur la Protection de la Vie Privée, pp. 8–14, 2013.
  17. Y. A. de Montjoye, S. Wang, and A. Pentland, “On the trusted use of large-scale personal data,” IEEE Data Engineering Bulletin, vol. 35, no. 4, pp. 5–8, 2012. View at Google Scholar
  18. K. Sangani, “Who owns your personal data?” Engineering and Technology, vol. 5, no. 11, pp. 28–29, 2010. View at Publisher · View at Google Scholar · View at Scopus
  19. E. A. Whitley, “Informational privacy, consent and the control of personal data,” Information Security Technical Report, vol. 14, no. 3, pp. 154–159, 2009. View at Publisher · View at Google Scholar · View at Scopus
  20. M. S. Martín and C. Gutierrez, “Personal management of social networks data,” in Proceedings of the IEEE International Conference on Social Computing (SocialCom '09), pp. 765–770, August 2009. View at Publisher · View at Google Scholar · View at Scopus
  21. P. Ziegler, K. R. Dittrich, and E. Hunt, “A call for personal semantic data integration,” in Proceedings of the IEEE 24th International Conference on Data Engineering Workshop (ICDE '08), pp. 250–253, April 2008. View at Publisher · View at Google Scholar · View at Scopus
  22. M. Kim, D.-W. Lee, K. Kim, and W.-D. Cho, “Predicting personal information behaviors with lifelog data,” in Proceedings of the 9th International Conference & Expo on Emerging Technologies for a Smarter World, pp. 1–3, IEEE, Incheon, Republic of South Korea, 2012. View at Publisher · View at Google Scholar
  23. H. Liu, J. Cui, T. Liu, and W. Li, “UPDS: reliable storage for personal data in online services,” in Proceeding of the 1st International Conference on Networking and Distributed Computing (ICNDC '10), pp. 357–361, Hangzhou, China, October 2010. View at Publisher · View at Google Scholar · View at Scopus
  24. N. Anciaux, B. Nguyen, and I. S. Popa, “Personal data management with secure hardware: how to keep your data at hand,” in Proceedings of the IEEE 14th International Conference on Mobile Data Management, pp. 1–6, 2013.
  25. C. Moiso and R. Minerva, “Towards a user-centric personal data ecosystem the role of the bank of individuals' data,” in Proceedings of the 16th International Conference on Intelligence in Next Generation Networks (ICIN '12), pp. 202–209, October 2012. View at Publisher · View at Google Scholar · View at Scopus
  26. C. Song, S. Park, D. Kim, and S. Kang, “Parity cloud service: a privacy-protected personal data recovery service,” in Proceedings of the IEEE 10th Int’l Conf. Trust, Security and Privacy in Computing and Communications, pp. 812–817, November 2011. View at Publisher · View at Google Scholar · View at Scopus
  27. Y.-C. Chen and S.-J. Kao, “Application services based on personal data ontology,” in Proceedings of the 5th IEEE/ACIS International Conference on Computer and Information Science, pp. 280–285, July 2006. View at Publisher · View at Google Scholar · View at Scopus
  28. E. Aimeur and M. Lafond, “The scourge of internet personal data collection,” in Proceedings of the International Conference on Availability, Reliability and Security (ARES '13), pp. 821–828, 2013.
  29. S.-J. Oh, S.-H. Kim, and H.-J. Lim, “Study on the modeling and utilization of a personal data protection index,” in Proceedings of the International Conference on Information and Multimedia Technology (ICIMT '09), pp. 353–360, Jeju Island, Republic of Korea, December 2009. View at Publisher · View at Google Scholar · View at Scopus
  30. W. Villegas, B. Ali, and M. Maheswaran, “An access control scheme for protecting personal data,” in Proceedings of the 6th Annual Conference on Privacy, Security and Trust (PST '08), pp. 24–35, Fredericton, Canada, January 2008. View at Publisher · View at Google Scholar · View at Scopus
  31. J. Neuhaeuser and L. D'Angelo, “Collecting and distributing wearable sensor data: an embedded personal area network to local area network gateway server,” in Proceedings of the 35th Annual International Conference on Engineering in Medicine and Biology Society, pp. 4650–4653, 2013.
  32. A. Simec and O. Stanicic, “Virtual computers and virtual data storage,” in Proceedings of the 36th International Conference, pp. 212–216, 2013.
  33. D. Z. Jankovic, “Key security measures for personal data protection in IT systems,” in Proceeding of the 20th Telecommunications Forum (TELFOR '12), pp. 79–82, Belgrade, Serbia, November 2012. View at Publisher · View at Google Scholar · View at Scopus
  34. K.-Y. Wang, I.-H. Ting, H.-J. Wu, and P.-S. Chang, “A dynamic and task-oriented social network extraction system based on analyzing personal social data,” in Proceedings of the International Conference on Advances in Social Network Analysis and Mining (ASONAM '10), pp. 464–469, August 2010. View at Publisher · View at Google Scholar · View at Scopus
  35. R. E. Crossler, “Protection motivation theory: understanding determinants to backing up personal data,” in Proceedings of the 43rd Annual Hawaii International Conference on System Sciences (HICSS '10), pp. 1–10, January 2010. View at Publisher · View at Google Scholar · View at Scopus
  36. H. Hayashi, “Personal authentication using spatial and temporal information reading the personal data,” in Proceedings of the IEEE 13th International Symposium on Consumer Electronics (ISCE '09), pp. 614–618, Kyoto, Japan, May 2009. View at Publisher · View at Google Scholar · View at Scopus
  37. W. Aigner, A. Rind, and S. Hoffmann, “Comparative evaluation of an interactive time-series visualization that combines quantitative data with qualitative abstractions,” Computer Graphics Forum, vol. 31, no. 3, pp. 995–1004, 2012. View at Publisher · View at Google Scholar · View at Scopus
  38. M. Raschke, T. Blascheck, and M. Burch, “Visual analysis of eye tracking data,” in Handbook of Human Centric Visualization, pp. 391–409, Springer, New York, NY, USA, 2014. View at Google Scholar
  39. L. Blunschi, “A dataspace odyssey: the iMeMex personal dataspace management system,” in Proceedings of the 3rd Biennial Conference on Innovative Data Systems Research, pp. 114–119, 2007.
  40. L. Cui, W. Zhang, H. Zhai, X. Zhang, and X. Xie, “Modeling and application of data correlations among heterogeneous data sources,” in Proceedings of the 2nd International Conference on Signal Processing Systems (ICSPS '10), pp. V2413–V2416, July 2010. View at Publisher · View at Google Scholar · View at Scopus
  41. J. Afonso, E. Monteiro, and V. Costa, “Development of an integrated solution for intrusion detection: a model based on data correlation,” in Proceedings of the International Conference on Networking and Services (ICNS '06), pp. 37–45, July 2006. View at Publisher · View at Google Scholar · View at Scopus
  42. T. R. Gruber, “A translation approach to portable ontology specifications,” Knowledge Acquisition, vol. 5, no. 2, pp. 199–220, 1993. View at Publisher · View at Google Scholar · View at Scopus
  43. S. Scerri, “Interacting with a context-aware personal information sharing system,” in Human-Computer Interaction. Towards Intelligent and Implicit Interaction, Part V, vol. 8008 of Lecture Notes in Computer Science, pp. 122–131, Springer, Berlin, Germany, 2013. View at Publisher · View at Google Scholar
  44. C. Bizer, T. Heath, and T. Berners-Lee, “Linked data—the story so far,” International Journal on Semantic Web and Information Systems, vol. 5, no. 3, pp. 1–22, 2009. View at Publisher · View at Google Scholar · View at Scopus
  45. W. Jones, “Personal information management,” Annual Review of Information Science and Technology, vol. 41, pp. 453–504, 2007. View at Publisher · View at Google Scholar · View at Scopus
  46. V. Katifori, A. Poggi, M. Scannapieco et al., “OntoPIM: how to rely on a personal ontology for personal information management,” in Proceedings of the 1st Semantic Desktop Workshop, 2005.
  47. K. Belhajjame, N. W. Paton, S. M. Embury, A. A. A. Fernandes, and C. Hedeler, “Incrementally improving dataspaces based on user feedback,” Information Systems, vol. 38, no. 5, pp. 656–687, 2013. View at Publisher · View at Google Scholar · View at Scopus
  48. I. Drago, M. Mellia, M. M. Munafò, A. Sperotto, R. Sadre, and A. Pras, “Inside dropbox: understanding personal cloud storage services,” in Proceedings of the ACM Internet Measurement Conference (IMC '12), pp. 481–494, November 2012. View at Publisher · View at Google Scholar · View at Scopus
  49. A. Kazi, R. Kazi, and R. Deters, “Supporting the personal cloud,” in Proceedings of the 1st IEEE Asia Pacific Cloud Computing Congress (APCloudCC '12), pp. 25–30, November 2012. View at Publisher · View at Google Scholar · View at Scopus
  50. S.-K. Seong, J. Seo, M. Nasielski et al., “PrPl: a decentralized social networking infrastructure,” in Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond, 2010.
  51. R. Kazi, X. Zhang, and R. Deters, “Supporting apps in the personal cloud: using WebSockets within hybrid apps,” in Proceedings of the IEEE 2nd Symposium on Network Cloud Computing and Applications (NCCA '12), pp. 110–115, London, UK, December 2012. View at Publisher · View at Google Scholar · View at Scopus
  52. A. Joshi, “A policy driven semantic approach to data usage management,” in Proceedings of the International Conference on World Wide Web, 2012.
  53. S. M. Yoo, P. K. Park, and J. S. Shin, “User-centric key management scheme for personal cloud storage,” in Proceedings of the International Conference on Information Science and Applications (ICISA '13), pp. 1–4, 2013.
  54. S. Nepal, S. Chen, and J. Yao, “TS3: a trust enhanced secure cloud storage service,” in Cloud Computing: Methodology, Systems, and Applications, pp. 197–219, CRC & Taylor & Francis, Boca Raton, Fla, USA, 2011. View at Google Scholar
  55. D. Thilakanathan and S. Chen, “Secure and controlled sharing of data in distributed computing,” in Proceedings of the 6th IEEE International Conference of Computational Science and Engineering, pp. 825–832, 2013.
  56. M. Van Kleek, D. A. Smith, H. S. Packer, J. Skinner, and N. R. Shadbolt, “Carpé data: supporting serendipitous data integration in personal information management,” in Proceeding of the 31st Annual CHI Conference on Human Factors in Computing Systems (CHI '13), pp. 2339–2348, New York, NY, USA, May 2013. View at Publisher · View at Google Scholar · View at Scopus
  57. F. Carrino, M. Sokhn, A. Le Calvé, E. Mugellini, and O. Abou Khaled, “Personal information management based on semantic technologies,” Journal of Ambient Intelligence and Humanized Computing, vol. 4, no. 3, pp. 401–407, 2013. View at Publisher · View at Google Scholar · View at Scopus
  58. R. Geambasu, C. Cheung, A. Moshchuk, S. D. Gribble, and H. M. Levy, “Organizing and sharing distributed personal web-service data,” in Proceedings of the 17th International Conference on World Wide Web (WWW '08), pp. 755–764, April 2008. View at Publisher · View at Google Scholar · View at Scopus