Main Article Content

Authors

The digital world brought many benefits and risks for users, consequently the need arises to protect the user's privacy while browsing the web, this article describes the evaluative study of the elements that are part of the architecture of a composite prototype by an SBC device and anonymity software that allows the user to keep their identity anonymous while browsing the web, initially, studies were carried out to determine which areas of communication to protect, which is the appropriate software for the architecture and which device to use for the prototype, additionally the corresponding performance tests to the prototype were carried out, in addition to the security tests based on the OWASP IoT project; Finally, the prototype developed allows anonymity by browsing from the operating system on the SBC device and also shares that anonymity through a Wi-Fi network so that users or external devices can connect.

1.
Jiménez-Lagos GA, Amador-Donado S, Márceles-Villalba K. Evaluative study of an anonymous communication architecture for web browsing using SBC devices. inycomp [Internet]. 2022 Jan. 15 [cited 2024 Nov. 18];24(1). Available from: https://revistaingenieria.univalle.edu.co/index.php/ingenieria_y_competitividad/article/view/11063

(1) Freedman M. How Businesses Are Collecting Data (And What They're Doing With It). Business News Daily. [Internet].; 2020 [cited: 2020 02 07]. Available from: https://n9.cl/ocwbd.

(2) Mendieta T, Herrera J, Jiménez A. La Capacidad del IOT de Transformar el Futuro. Revista AVENIR. 2019 09 18;1(1):15-18. Available from: https://fundacionavenir.net/revista/index.php/avenir/article/view/79.

(3) Vázquez DJ, Reigosa L. Una nueva aproximación a la enseñanza tecnológica superior de informática centrada en dispositivos de computación de bajo costo y alto rendimiento. In: Memorias del primer Congreso Internacional de Ciencias Pedagógicas. Guayaquil: Instituto Superior Tecnológico Bolivariano de Tecnología; 2015. p. 596–609.

(4) Greenwood D, Levin M. Introduction to Action Research. In: 2nd ed. Thousand Oaks C. Social Research for Social Change. Sage Publications Inc. 2007. https://dx.doi.org/10.4135/9781412984614

(5) Kock NF, McQueen RJ, John LS. Can action research be made more rigorous in a positivist sense? The contribution of an iterative approach. Journal of Systems and Information Technology. 1997;1(1):1-23. https://doi.org/10.1108/13287269780000732

(6) Moreno S, Rodriguez A, Sarmiento Y.Supercomputación basada en arquitectura ARM [Internet]. Bucaramanga: Universidad Industrial de Santander [cited 2021 feb 15]. Available from: http://wiki.sc3.uis.edu.co/images/1/12/G11.pdf.

(7) Zúñiga M, Amador D, Márceles K. Protección de datos anónima y portable. 1st ed. Popayán: Editorial Académica Española; 2020.

(8) Sanz F. Estudio de tecnologías para la protección de la privacidad mediante anonimato. [Bacherlor’s Degree]. Madrid: Universidad Autónoma de Madrid;2018. Available from: https://repositorio.uam.es/bitstream/handle/10486/688072/andreu_sanz_francisco_tfg.pdf?sequence=1.

(9) Pantoja ND, Jiménez AF, Donado SA, Márceles K. Cryptanalysis of the RSA Algorithm Under a System Distributed Using SBC Devices. In: Mata-Rivera M, Zagal-Flores R, editors. Telematics and Computing WITCOM 2018 Communications in Computer and Information Science, vol 944. Springer, Cham; 2018. p. 3–12. https://doi.org/10.1007/978-3-030-03763-5_1

(10) Zúñiga M, Amador D, Márceles K. Servicio de navegación anónima basada en un–Raspberry Pi. Revista íberica de Sistemas y Tenologías de la información. 2019 Dec;(26):587-597.

(11) The International Organization for Standardization-ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection. ISO/IEC 27002:2013 Information technology — Security techniques — Code of practice for information security controls. 2nd ed. Switzerland: The International Organization for Standardization-ISO; 2013. Available from: https://www.iso.org/standard/54533.html

(12) The OWASP Foundation. OWASP Internet of Things. [Internet].; 2018. [cited 2020 02 14] Available from: https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project.

Received 2021-03-07
Accepted 2021-07-22
Published 2022-01-15