2021
DOI: 10.1080/09540091.2020.1854181
|View full text |Cite
|
Sign up to set email alerts
|

A novel blockchain-based privacy-preserving framework for online social networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
3

Relationship

3
5

Authors

Journals

citations
Cited by 49 publications
(15 citation statements)
references
References 40 publications
0
15
0
Order By: Relevance
“…Proposed Model [45] Model based on security data storage [53] Solution to managing the privacy preferences of a user [55] Autonomous decentralized online social network architecture [59] Blockchain-based data mining methodology [60] A blockchain-based privacy-preserving framework (BPP) [62] An auditable and trustworthy access control structure [65] A hierarchical blockchain-based attribute matching system [68] BCOSN, a blockchain-based Online Social Network [70] A decentralized social networking architecture [71] A blockchain-based model for data storage [76] An autonomous resource request transaction framework [80] Blockchain-enhanced version of social networking (BEV-SNSs) [81] Blockchain-based identity providers [82] A decentralized social network based on Ethereum and IPFS [83] RPchain, a blockchain based academic social networking platform [84] A protocol and authentication with a blockchain algorithm [86] Ushare: a blockchain scheme for social networks Similar to the models proposed for detecting fake content, the models proposed for protecting data use Blockchain-based elements such as smart contracts and consensus algorithms. Dawei Xu et al [45] recommended a novel truthfulness information storing system, CL-BC (Clark-Wilson), which contains a theoretical strategy, initial setting architecture, and comprehensive flux architecture to construct the entree regulator structure of a distributed veracity information storing system and optimize the safety of risks such as over-agreement and illegitimate completion in the storing of information.…”
Section: Referencementioning
confidence: 99%
See 1 more Smart Citation
“…Proposed Model [45] Model based on security data storage [53] Solution to managing the privacy preferences of a user [55] Autonomous decentralized online social network architecture [59] Blockchain-based data mining methodology [60] A blockchain-based privacy-preserving framework (BPP) [62] An auditable and trustworthy access control structure [65] A hierarchical blockchain-based attribute matching system [68] BCOSN, a blockchain-based Online Social Network [70] A decentralized social networking architecture [71] A blockchain-based model for data storage [76] An autonomous resource request transaction framework [80] Blockchain-enhanced version of social networking (BEV-SNSs) [81] Blockchain-based identity providers [82] A decentralized social network based on Ethereum and IPFS [83] RPchain, a blockchain based academic social networking platform [84] A protocol and authentication with a blockchain algorithm [86] Ushare: a blockchain scheme for social networks Similar to the models proposed for detecting fake content, the models proposed for protecting data use Blockchain-based elements such as smart contracts and consensus algorithms. Dawei Xu et al [45] recommended a novel truthfulness information storing system, CL-BC (Clark-Wilson), which contains a theoretical strategy, initial setting architecture, and comprehensive flux architecture to construct the entree regulator structure of a distributed veracity information storing system and optimize the safety of risks such as over-agreement and illegitimate completion in the storing of information.…”
Section: Referencementioning
confidence: 99%
“…The hash function is applied to encode social media content in order to increase its safety. Zhang Shiwen et al [60] used blockchain and public key cryptography methods to create a blockchain-based structure to safeguard privacy called BPP. It can accomplish secure information sharing, information recovery, and obtain information reasonably and without concern over potential harm to clients' interests.…”
Section: Referencementioning
confidence: 99%
“…The issue of the fair allocation of multiresources to each user is well addressed using DRF. However, simply considering the cluster as a large machine and assuming that the tasks are divisible leave many problems 24 that DRF needs to be further explored 25 . For example, the resource fragmentation problem in cluster environments with discrete tasks, 9 defining fairness when tasks have placement constraints, 26 discrete multiresource allocation, 12 and the fairness‐efficiency trade‐off 23 .…”
Section: Related Workmentioning
confidence: 99%
“…Tuli et al (2019) proposed a simplified and blockchain-based framework for integrating IoT, Edge, Fog and Cloud. Blockchain-based smart contracts were used to manage and protect health data generated by medical sensors (Griggs et al, 2018;Zhang et al, 2020).…”
Section: Related Work and Motivationmentioning
confidence: 99%