2020
DOI: 10.1155/2020/8888296
|View full text |Cite
|
Sign up to set email alerts
|

Research on Privacy Security Risk Assessment Method of Mobile Commerce Based on Information Entropy and Markov

Abstract: To obtain precise personalized services in mobile commerce, the users have to disclose their personal information to the operator, which constitutes a potential threat to their privacy security. In this paper, a mobile commerce privacy security risk assessment model is established based on information entropy and Markov chain, and effective security risk measurement, and assessment method is put forward. Our method can provide accurate and quantitative results in assessing privacy disclosure risk to gu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

4
3

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 26 publications
0
8
0
Order By: Relevance
“…In addition, using this method requires the establishment of a special trust chain, and the cost of assessment is high. erefore, as a risk assessment method, in order to illustrate the characteristics of the method proposed in this paper, it should be compared with other common risk assessment methods, such as risk assessment method based on AHP [45][46][47], risk assessment method based on risk matrix [48,49], and risk assessment method based on information entropy [26,[49][50][51][52]. ey are all mature risk assessment methods, which have been widely used and can provide users with effective risk assessment results.…”
Section: Methods Comparisonmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, using this method requires the establishment of a special trust chain, and the cost of assessment is high. erefore, as a risk assessment method, in order to illustrate the characteristics of the method proposed in this paper, it should be compared with other common risk assessment methods, such as risk assessment method based on AHP [45][46][47], risk assessment method based on risk matrix [48,49], and risk assessment method based on information entropy [26,[49][50][51][52]. ey are all mature risk assessment methods, which have been widely used and can provide users with effective risk assessment results.…”
Section: Methods Comparisonmentioning
confidence: 99%
“…Xiang [24] built a risk index system of personal privacy information disclosure of mobile commerce consumers and evaluated the risk of consumer privacy disclosure through the fuzzy comprehensive assessment method. Shi et al [25], Zhang [26], and Yang [27] used the information entropy method to measure and assess the privacy risk according to the uncertainty of information. Ali-Eldin et al [28] proposed a privacy risk assessment model, which can provide effective privacy risk avoidance and mitigation measures for open data.…”
Section: Related Researchmentioning
confidence: 99%
“…Markov chain [54] is a process with discrete set and random state space. It is suitable for analyzing things with random process.…”
Section: Assessment Of Cloud Service Trustworthiness State Based On M...mentioning
confidence: 99%
“…With the continuous development and progress of Internet technology, information security and privacy protection have attracted more and more attention [1][2][3][4][5][6][7]. e development of scienti c and technological revolution has promoted the advent of the Internet era, and computer intelligent image recognition technology is becoming more and more mature [8][9][10][11].…”
Section: Introductionmentioning
confidence: 99%