2023
DOI: 10.1371/journal.pone.0280182
|View full text |Cite
|
Sign up to set email alerts
|

Privacy preserving data sharing method for social media platforms

Abstract: Digital security as a service is a crucial aspect as it deals with user privacy provision and secure content delivery to legitimate users. Most social media platforms utilize end-to-end encryption as a significant security feature. However, multimedia data transmission in group communication is not encrypted. One of the most important objectives for a service provider is to send the desired multimedia data/service to only legitimate subscriber. Broadcast encryption is the most appropriate cryptographic primiti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 44 publications
0
2
0
Order By: Relevance
“…Technologies like homomorphic encryption allow for secure computation on encrypted financial data, enabling analysis without exposing the underlying information. PETs are increasingly employed in social media platforms to enhance user privacy by providing features like end-to-end encryption, anonymous authentication, and secure data sharing (Yadav, and Tiwari, 2023;Kaaniche, et al, 2022). These technologies empower users to maintain control over their personal information and communications.…”
Section: Applications Of Pets Across Domainsmentioning
confidence: 99%
“…Technologies like homomorphic encryption allow for secure computation on encrypted financial data, enabling analysis without exposing the underlying information. PETs are increasingly employed in social media platforms to enhance user privacy by providing features like end-to-end encryption, anonymous authentication, and secure data sharing (Yadav, and Tiwari, 2023;Kaaniche, et al, 2022). These technologies empower users to maintain control over their personal information and communications.…”
Section: Applications Of Pets Across Domainsmentioning
confidence: 99%
“…Satisfy user needs, so that consumers can feel the impulse to consume when they first see the product. (Yadav & Tiwari, 2023). Finally, visual communication designers should fully consider the use needs of consumers for the product and the possible expected uses when designing (Amiruzzaman & Bhuiyan, 2023).…”
Section: Literature Reviewmentioning
confidence: 99%
“…A broadcast encryption system [2], enables a sender to encrypt a message for any subset of users who are listening on a broadcast channel. Traditional traditional broadcast encryption (BE) schemes has some limitations e.g., user's privacy protection [3], BEPM overcomes these potential limitation of traditional broadcast encryption (BE) schemes. Construction of efficient BEPM cryptographic primitive is not a trivial task.…”
Section: Introductionmentioning
confidence: 99%