2021
DOI: 10.1016/j.ins.2021.01.004
|View full text |Cite
|
Sign up to set email alerts
|

A Blockchain-based approach for matching desired and real privacy settings of social network users

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(12 citation statements)
references
References 31 publications
0
12
0
Order By: Relevance
“…Proposed Model [45] Model based on security data storage [53] Solution to managing the privacy preferences of a user [55] Autonomous decentralized online social network architecture [59] Blockchain-based data mining methodology [60] A blockchain-based privacy-preserving framework (BPP) [62] An auditable and trustworthy access control structure [65] A hierarchical blockchain-based attribute matching system [68] BCOSN, a blockchain-based Online Social Network [70] A decentralized social networking architecture [71] A blockchain-based model for data storage [76] An autonomous resource request transaction framework [80] Blockchain-enhanced version of social networking (BEV-SNSs) [81] Blockchain-based identity providers [82] A decentralized social network based on Ethereum and IPFS [83] RPchain, a blockchain based academic social networking platform [84] A protocol and authentication with a blockchain algorithm [86] Ushare: a blockchain scheme for social networks Similar to the models proposed for detecting fake content, the models proposed for protecting data use Blockchain-based elements such as smart contracts and consensus algorithms. Dawei Xu et al [45] recommended a novel truthfulness information storing system, CL-BC (Clark-Wilson), which contains a theoretical strategy, initial setting architecture, and comprehensive flux architecture to construct the entree regulator structure of a distributed veracity information storing system and optimize the safety of risks such as over-agreement and illegitimate completion in the storing of information.…”
Section: Referencementioning
confidence: 99%
“…Proposed Model [45] Model based on security data storage [53] Solution to managing the privacy preferences of a user [55] Autonomous decentralized online social network architecture [59] Blockchain-based data mining methodology [60] A blockchain-based privacy-preserving framework (BPP) [62] An auditable and trustworthy access control structure [65] A hierarchical blockchain-based attribute matching system [68] BCOSN, a blockchain-based Online Social Network [70] A decentralized social networking architecture [71] A blockchain-based model for data storage [76] An autonomous resource request transaction framework [80] Blockchain-enhanced version of social networking (BEV-SNSs) [81] Blockchain-based identity providers [82] A decentralized social network based on Ethereum and IPFS [83] RPchain, a blockchain based academic social networking platform [84] A protocol and authentication with a blockchain algorithm [86] Ushare: a blockchain scheme for social networks Similar to the models proposed for detecting fake content, the models proposed for protecting data use Blockchain-based elements such as smart contracts and consensus algorithms. Dawei Xu et al [45] recommended a novel truthfulness information storing system, CL-BC (Clark-Wilson), which contains a theoretical strategy, initial setting architecture, and comprehensive flux architecture to construct the entree regulator structure of a distributed veracity information storing system and optimize the safety of risks such as over-agreement and illegitimate completion in the storing of information.…”
Section: Referencementioning
confidence: 99%
“…Privacy for the user of a service, in the digital framework, is an issue of transcendental relevance and there are numerous recent research studies that analyze this variable and its impact on the user (Chung et al, 2021;Lax et al, 2021;Pilton et al, 2021;Saura et al, 2021c;Wu et al, 2021). This has led competent authorities to develop specific regulations that allow users to manage their privacy preferences when they log on to a platform (Tamburri, 2020;Curry, 2021).…”
Section: Hypotheses and Research Modelmentioning
confidence: 99%
“…Research on online privacy has focused on personal information that can be leaked in an e-commerce environment and online social networks [9]. These days, a massive amount of personal information has been collected and managed online, and it has raised privacy concerns about how to manage these data appropriately [10]. Fast-developing IT technology also causes various types of privacy invasions, which could further increase related incidents.…”
Section: Algorithms For Protecting Online Privacymentioning
confidence: 99%
“…A lot of research has been conducted to determine a method to protect online privacy by developing protection techniques such as differential privacy (DP), which has been introduced to preserve privacy in datasets [15,16]. It is defined as a way of circumventing the problems of an adversary with auxiliary information and provides the level of privacy with superior performance [10]. DP was based on a probability model with a set of conditions that need to be met to guarantee that auxiliary information will not result in a privacy breach [17,18].…”
Section: Algorithms For Protecting Online Privacymentioning
confidence: 99%
See 1 more Smart Citation