Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (17)

Search Parameters:
Keywords = privacy coins

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
37 pages, 3696 KiB  
Article
Design Analysis for a Distributed Business Innovation System Employing Generated Expert Profiles, Matchmaking, and Blockchain Technology
by Adrian Alexandrescu, Delia-Elena Bărbuță, Cristian Nicolae Buțincu, Alexandru Archip, Silviu-Dumitru Pavăl, Cătălin Mironeanu and Gabriel-Alexandru Scînteie
Future Internet 2025, 17(4), 171; https://doi.org/10.3390/fi17040171 - 14 Apr 2025
Viewed by 590
Abstract
Innovation ecosystems often face challenges such as inadequate coordination, insufficient protection of intellectual property, limited access to quality expertise, and inefficient matchmaking between innovators and experts. This paper provides an in-depth design analysis of SPARK-IT, a novel business innovation platform specifically addressing these [...] Read more.
Innovation ecosystems often face challenges such as inadequate coordination, insufficient protection of intellectual property, limited access to quality expertise, and inefficient matchmaking between innovators and experts. This paper provides an in-depth design analysis of SPARK-IT, a novel business innovation platform specifically addressing these challenges. The platform leverages advanced AI to precisely match innovators with suitable mentors, supported by a distributed web scraper that constructs expert profiles from reliable sources (e.g., LinkedIn and BrainMap). Data privacy and security are prioritized through robust encryption that restricts sensitive content exclusively to innovators and mentors, preventing unauthorized access even by platform administrators. Additionally, documents are stored encrypted on decentralized storage, with their cryptographic hashes anchored on blockchain to ensure transparency, traceability, non-repudiation, and immutability. To incentivize active participation, SPARK-IT utilizes a dual-token approach comprising reward and reputation tokens. The reward tokens, SparkCoins, are wrapped stablecoins with tangible monetary value, enabling seamless internal transactions and external exchanges. Finally, the paper discusses key design challenges and critical architectural trade-offs and evaluates the socio-economic impacts of implementing this innovative solution. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

13 pages, 2325 KiB  
Article
User Acceptance of Blockchain Technology in Financial Applications: Information Security, Technology Awareness and Privacy Aspects
by Woon Kwan Tse, Xuechen Dai, Yat Ming Lee and Danqi Lu
Blockchains 2024, 2(3), 299-311; https://doi.org/10.3390/blockchains2030014 - 20 Aug 2024
Viewed by 2657
Abstract
Blockchain technology is now an advanced and innovative database technology and the attributes of blockchains are apparent in a variety of industries, especially in the financial industry. One of the most famous blockchain use cases, cryptocurrencies, has provoked much interest in social network [...] Read more.
Blockchain technology is now an advanced and innovative database technology and the attributes of blockchains are apparent in a variety of industries, especially in the financial industry. One of the most famous blockchain use cases, cryptocurrencies, has provoked much interest in social network users and customers. According to CoinMarketCap’s information, the global crypto market capitalization has reached around USD 2.37 T and there are around 9975 different cryptocurrencies available in the market. Despite the fact that academia and industry have paid much attention towards the blockchain direction, there is not much research on the factors that influence customer acceptability. This paper studies blockchains from a different angle, probing the factors prompting customers to use financial applications that utilize blockchain technology. We established the model and sorted the individual factors of perceived information security, technology awareness and privacy and found that users’ acceptance is significantly affected by information security and technology awareness, while privacy does not significantly influence users. According to the findings, we provide useful insights for application developers, conclude by presenting the limitations of the research and provide guidelines for future research. Full article
(This article belongs to the Special Issue Key Technologies for Security and Privacy in Web 3.0)
Show Figures

Figure 1

10 pages, 265 KiB  
Article
E-Coin-Based Priced Oblivious Transfer with a Fast Item Retrieval
by Francesc Sebé and Sergi Simón
Cryptography 2024, 8(1), 10; https://doi.org/10.3390/cryptography8010010 - 13 Mar 2024
Cited by 1 | Viewed by 1948
Abstract
Priced oblivious transfer (POT) is a cryptographic protocol designed for privacy-preserving e-commerce of digital content. It involves two parties: the merchant, who provides a set of priced items as input, and a customer, who acquires one of them. After the protocol has run, [...] Read more.
Priced oblivious transfer (POT) is a cryptographic protocol designed for privacy-preserving e-commerce of digital content. It involves two parties: the merchant, who provides a set of priced items as input, and a customer, who acquires one of them. After the protocol has run, the customer obtains the item they chose, while the merchant cannot determine which one. Moreover, the protocol guarantees that the customer gets the content only if they have paid the price established by the merchant. In a recent paper, the authors proposed a POT system where the payments employed e-coin transactions. The strong point of the proposal was the absence of zero-knowledge proofs required in preceding systems to guarantee the correctness of payments. In this paper, we propose a novel e-coin-based POT system with a fast item retrieval procedure whose running time does not depend on the number of items for sale. This is an improvement over the aforementioned existing proposal whose execution time becomes prohibitively long when the catalog is extensive. The use of zero-knowledge proofs is neither required. Full article
Show Figures

Figure 1

17 pages, 2221 KiB  
Article
Blockchain-Empowered Decentralized Philanthropic Charity for Social Good
by Istiaque Ahmed, Kai Fumimoto, Tadashi Nakano and Thi Hong Tran
Sustainability 2024, 16(1), 210; https://doi.org/10.3390/su16010210 - 26 Dec 2023
Cited by 5 | Viewed by 5255
Abstract
The charity sector impacts society significantly in many areas, including providing education, healthcare, hunger relief, drinking water, disaster relief, environmental preservation, and assistance to underserved people. The existing charity organizations have numerous limitations, such as poor management, high operation costs, and a lack [...] Read more.
The charity sector impacts society significantly in many areas, including providing education, healthcare, hunger relief, drinking water, disaster relief, environmental preservation, and assistance to underserved people. The existing charity organizations have numerous limitations, such as poor management, high operation costs, and a lack of transparency in the donation execution flow. The authentication of users and institutions is a big problem in the existing system. This research resolves the issues of transparency and reliability with an immutable and traceable distributed ledger. We empower the existing centralized charity works with the electronic know-your-customer (eKYC) authentication approach and cryptographic HASH. Information privacy is implemented using the filters within smart contracts. The implementation of eKYC to ensure authenticity and to secure data flow through the channel are two significant contributions of this work. A coin-toss function for data selection and a random time delay between pieces of data are used to avoid attacks based on guesswork. We aim for this framework to send 100% of donations to the beneficiaries and become a hyper-liquid medium to fill the United Nations Sustainable Development Goals (SDG) funding gap. We also introduce the concept of service charity to broaden the ability for people to offer their services and skills as charity. Full article
Show Figures

Figure 1

25 pages, 2031 KiB  
Article
A Sustainable Approach to Delivering Programmable Peer-to-Peer Offline Payments
by Luca Mainetti, Matteo Aprile, Emanuele Mele and Roberto Vergallo
Sensors 2023, 23(3), 1336; https://doi.org/10.3390/s23031336 - 25 Jan 2023
Cited by 17 | Viewed by 3458
Abstract
Payment apps and digital wallets are powerful tools used to exchange e-money via the internet. However, with the progressive disappearance of cash, there is a need for the digital equivalent of physical banknotes to guarantee the same level of anonymity of private payments. [...] Read more.
Payment apps and digital wallets are powerful tools used to exchange e-money via the internet. However, with the progressive disappearance of cash, there is a need for the digital equivalent of physical banknotes to guarantee the same level of anonymity of private payments. Few efforts to solve the double-spending problem exist in P2P payments (i.e., in avoiding the possibility of a payer retaining copies of digital coins in absence of a trusted third party (TTP)), and further research efforts are needed to explore options to preserve the privacy of payments, as per the mandates of numerous central bank digital currency (CBDC) exploratory initiatives, such as the digital euro. Moreover, generic programmability requirements and energetic impacts should be considered. In this paper, we present a sustainable offline P2P payment scheme to face the double-spending problem by means of a one-time program (OTP) approach. The approach consists of wiping the business logic out of a client’s app and allowing financial intermediaries to inject a certified payment code into the user’s device, which will execute (asynchronously and offline) at the time of payment. To do so, we wrap each coin in a program at the time of withdrawal. Then the program exploits the trusted execution environment (TEE) of modern smartphones to transfer itself from the payer to the payee via a direct IoT link. To confirm the validity of the approach, we performed qualitative and quantitative evaluations, specifically focusing on the energetic sustainability of the proposed scheme. Results show that our payment scheme is energetically sustainable as the current absorbed for sending one coin is, at most, ~1.8 mAh on an Apple smartphone. We advance the state-of-the-art because the scheme meets the programmability, anonymity, and sustainability requirements (at the same time). Full article
(This article belongs to the Special Issue Internet of Things for Smart City Application)
Show Figures

Figure 1

20 pages, 1277 KiB  
Article
ID-Based Ring Signature against Continual Side Channel Attack
by Qihong Yu, Jiguo Li and Jian Shen
Symmetry 2023, 15(1), 179; https://doi.org/10.3390/sym15010179 - 7 Jan 2023
Cited by 3 | Viewed by 1934
Abstract
The security of the signature scheme is destroyed because its secret information of the signature system is leaked due to the side channel attack. Ring signature has good application value, which can provide more flexibility and complete anonymity. It can be used in [...] Read more.
The security of the signature scheme is destroyed because its secret information of the signature system is leaked due to the side channel attack. Ring signature has good application value, which can provide more flexibility and complete anonymity. It can be used in some systems such as anonymous authentication in ad hoc networks, electronic voting and crypto coin based on blockchain. Because of the side channel attack, the private key of the ring signature system may be exposed, which may cause insecurity. We present a ring signature system against continuous side channel attack. Because of the symmetry of the ring, the user’s identity has good privacy protection. The proposed scheme is completely secure without a random oracle model and the private key disclosure rate is close to 1/3. Through the dual system technique, the existential unforgeability and unconditional anonymity of the scheme are proved in the composite order group based on the subgroup decision assumption. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

20 pages, 1199 KiB  
Article
The “Socialized Architecture”: A Software Engineering Approach for a New Cloud
by Pedro Malo-Perisé and José Merseguer
Sustainability 2022, 14(4), 2020; https://doi.org/10.3390/su14042020 - 10 Feb 2022
Cited by 7 | Viewed by 2206
Abstract
Today, the cloud means a revolution within the Internet revolution. However, an oligopoly sustaining the cloud may not be the best solution, since ethical problems such as privacy or even transferring data sovereignty could eventually happen. Our research, coined as the "socialized architecture," [...] Read more.
Today, the cloud means a revolution within the Internet revolution. However, an oligopoly sustaining the cloud may not be the best solution, since ethical problems such as privacy or even transferring data sovereignty could eventually happen. Our research, coined as the "socialized architecture," presents a novel disruptive approach to completely transform the cloud as we know it today. The approach follows ideas already working in the field of volunteer computing, since it tries to socialize spare computing power in the infraused hardware that institutions and normal people own. However, our solution is completely different to current ones, since it does not create hyper-specialized muscles in client machines. The solution is new since it proposes a software engineering approach for developing “socialized services”, which, leveraging an asynchronous interaction model, creates a network of lightweight microservices that can be dynamically allocated and replicated through the network. The use of state-of-the-art patterns, such as Command Query Responsibility Segregation, helps to isolate domain events and persistence needs, while an API Gateway addresses communication. All previous ideas were tested through a complete and functional proof of concept, which is a prototype called Circle implementing a social network. Circle has been useful to expose problems that need to be addressed. The results of the assessment confirm, in our view, that it is worth to start this new field of work. Full article
(This article belongs to the Section Sustainable Engineering and Science)
Show Figures

Figure 1

13 pages, 299 KiB  
Article
A Digital Cash Paradigm with Valued and No-Valued e-Coins
by Ricard Borges and Francesc Sebé
Appl. Sci. 2021, 11(21), 9892; https://doi.org/10.3390/app11219892 - 22 Oct 2021
Cited by 3 | Viewed by 1995
Abstract
Digital cash is a form of money that is stored digitally. Its main advantage when compared to traditional credit or debit cards is the possibility of carrying out anonymous transactions. Diverse digital cash paradigms have been proposed during the last decades, providing different [...] Read more.
Digital cash is a form of money that is stored digitally. Its main advantage when compared to traditional credit or debit cards is the possibility of carrying out anonymous transactions. Diverse digital cash paradigms have been proposed during the last decades, providing different approaches to avoid the double-spending fraud, or features like divisibility or transferability. This paper presents a new digital cash paradigm that includes the so-called no-valued e-coins, which are e-coins that can be generated free of charge by customers. A vendor receiving a payment cannot distinguish whether the received e-coin is valued or not, but the customer will receive the requested digital item only in the former case. A straightforward application of bogus transactions involving no-valued e-coins is the masking of consumption patterns. This new paradigm has also proven its validity in the scope of privacy-preserving pay-by-phone parking systems, and we believe it can become a very versatile building block in the design of privacy-preserving protocols in other areas of research. This paper provides a formal description of the new paradigm, including the features required for each of its components together with a formal analysis of its security. Full article
(This article belongs to the Special Issue Cryptography and Its Applications in Information Security)
46 pages, 5723 KiB  
Review
State-of-the-Art Review on IoT Threats and Attacks: Taxonomy, Challenges and Solutions
by Ritika Raj Krishna, Aanchal Priyadarshini, Amitkumar V. Jha, Bhargav Appasani, Avireni Srinivasulu and Nicu Bizon
Sustainability 2021, 13(16), 9463; https://doi.org/10.3390/su13169463 - 23 Aug 2021
Cited by 66 | Viewed by 18087
Abstract
The Internet of Things (IoT) plays a vital role in interconnecting physical and virtual objects that are embedded with sensors, software, and other technologies intending to connect and exchange data with devices and systems around the globe over the Internet. With a multitude [...] Read more.
The Internet of Things (IoT) plays a vital role in interconnecting physical and virtual objects that are embedded with sensors, software, and other technologies intending to connect and exchange data with devices and systems around the globe over the Internet. With a multitude of features to offer, IoT is a boon to mankind, but just as two sides of a coin, the technology, with its lack of securing information, may result in a big bane. It is estimated that by the year 2030, there will be nearly 25.44 billion IoT devices connected worldwide. Due to the unprecedented growth, IoT is endangered by numerous attacks, impairments, and misuses due to challenges such as resource limitations, heterogeneity, lack of standardization, architecture, etc. It is known that almost 98% of IoT traffic is not encrypted, exposing confidential and personal information on the network. To implement such a technology in the near future, a comprehensive implementation of security, privacy, authentication, and recovery is required. Therefore, in this paper, the comprehensive taxonomy of security and threats within the IoT paradigm is discussed. We also provide insightful findings, presumptions, and outcomes of the challenges to assist IoT developers to address risks and security flaws for better protection. A five-layer and a seven-layer IoT architecture are presented in addition to the existing three-layer architecture. The communication standards and the protocols, along with the threats and attacks corresponding to these three architectures, are discussed. In addition, the impact of different threats and attacks along with their detection, mitigation, and prevention are comprehensively presented. The state-of-the-art solutions to enhance security features in IoT devices are proposed based on Blockchain (BC) technology, Fog Computing (FC), Edge Computing (EC), and Machine Learning (ML), along with some open research problems. Full article
Show Figures

Figure 1

15 pages, 1173 KiB  
Article
On Prices of Privacy Coins and Bitcoin
by Olli-Pekka Hilmola
J. Risk Financial Manag. 2021, 14(8), 361; https://doi.org/10.3390/jrfm14080361 - 6 Aug 2021
Cited by 6 | Viewed by 5365
Abstract
Since the inauguration of cryptocurrencies, Bitcoin has been under pressure from competing tokens. As Bitcoin is a public open ledger blockchain coin, it has its weaknesses in privacy and anonymity. In the recent decade numerous coins have been initiated as privacy coins, which [...] Read more.
Since the inauguration of cryptocurrencies, Bitcoin has been under pressure from competing tokens. As Bitcoin is a public open ledger blockchain coin, it has its weaknesses in privacy and anonymity. In the recent decade numerous coins have been initiated as privacy coins, which try to tackle these weaknesses. This research compares mostly mature privacy coins to Bitcoin, and comparison is made from a price perspective. It seems that Bitcoin is leading privacy coins in price terms, and correlation is typically high and positive. From the earlier crypto market peak of 2017–18, only a very small number of coins are showing positive returns in 2021. It is typical that many privacy coins have lost substantial amounts of their value (ranging 80–90%) or that they do not exist anymore at all. Only Horizen and Monero have shown long-term sustainability in their value; however, their price changes follow that of Bitcoin very closely. The role of privacy coins in the future remains as an open issue. Full article
(This article belongs to the Special Issue FinTech and the Future of Finance)
Show Figures

Figure 1

23 pages, 3046 KiB  
Article
Gait-Based Implicit Authentication Using Edge Computing and Deep Learning for Mobile Devices
by Xin Zeng, Xiaomei Zhang, Shuqun Yang, Zhicai Shi and Chihung Chi
Sensors 2021, 21(13), 4592; https://doi.org/10.3390/s21134592 - 5 Jul 2021
Cited by 31 | Viewed by 3934
Abstract
Implicit authentication mechanisms are expected to prevent security and privacy threats for mobile devices using behavior modeling. However, recently, researchers have demonstrated that the performance of behavioral biometrics is insufficiently accurate. Furthermore, the unique characteristics of mobile devices, such as limited storage and [...] Read more.
Implicit authentication mechanisms are expected to prevent security and privacy threats for mobile devices using behavior modeling. However, recently, researchers have demonstrated that the performance of behavioral biometrics is insufficiently accurate. Furthermore, the unique characteristics of mobile devices, such as limited storage and energy, make it subject to constrained capacity of data collection and processing. In this paper, we propose an implicit authentication architecture based on edge computing, coined Edge computing-based mobile Device Implicit Authentication (EDIA), which exploits edge-based gait biometric identification using a deep learning model to authenticate users. The gait data captured by a device’s accelerometer and gyroscope sensors is utilized as the input of our optimized model, which consists of a CNN and a LSTM in tandem. Especially, we deal with extracting the features of gait signal in a two-dimensional domain through converting the original signal into an image, and then input it into our network. In addition, to reduce computation overhead of mobile devices, the model for implicit authentication is generated on the cloud server, and the user authentication process also takes place on the edge devices. We evaluate the performance of EDIA under different scenarios where the results show that i) we achieve a true positive rate of 97.77% and also a 2% false positive rate; and ii) EDIA still reaches high accuracy with limited dataset size. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

24 pages, 5743 KiB  
Article
Bi-Directional Mutual Energy Trade between Smart Grid and Energy Districts Using Renewable Energy Credits
by Sana Rehman, Bilal Khan, Jawad Arif, Zahid Ullah, Abdullah J. Aljuhani, Ahmad Alhindi and Sahibzada M. Ali
Sensors 2021, 21(9), 3088; https://doi.org/10.3390/s21093088 - 29 Apr 2021
Cited by 10 | Viewed by 3506
Abstract
A central authority, in a conventional centralized energy trading market, superintends energy and financial transactions. The central authority manages and controls transparent energy trading between producer and consumer, imposes a penalty in case of contract violation, and disburses numerous rewards. However, the management [...] Read more.
A central authority, in a conventional centralized energy trading market, superintends energy and financial transactions. The central authority manages and controls transparent energy trading between producer and consumer, imposes a penalty in case of contract violation, and disburses numerous rewards. However, the management and control through the third party pose a significant threat to the security and privacy of consumers’/producers’ (participants) profiles. The energy transactions between participants involving central authority utilize users’ time, money, and impose a computational burden over the central controlling authority. The Blockchain-based decentralized energy transaction concept, bypassing the central authority, is proposed in Smart Grid (SG) by researchers. Blockchain technology braces the concept of Peer-to-Peer (P2P) energy transactions. This work encompasses the SolarCoin-based digital currency blockchain model for SG incorporating RE. Energy transactions from Prosumer (P) to Prosumer, Energy District to Energy District, and Energy District to SG are thoroughly investigated and analyzed in this work. A robust demand-side optimized model is proposed using Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) to maximize Prosumer Energy Surplus (PES), Grid revenue (GR), percentage energy transactions accomplished, and decreased Prosumer Energy Cost (PEC). Real-time averaged energy data of Australia are employed, and a piece-wise energy price mechanism is implemented in this work. The graphical analysis and tabular statistics manifest the efficacy of the proposed model. Full article
(This article belongs to the Special Issue Blockchain Applications in Smart Energy Grids)
Show Figures

Figure 1

24 pages, 2107 KiB  
Review
A Systematic Review of Challenges and Opportunities of Blockchain for E-Voting
by Ruhi Taş and Ömer Özgür Tanrıöver
Symmetry 2020, 12(8), 1328; https://doi.org/10.3390/sym12081328 - 9 Aug 2020
Cited by 142 | Viewed by 36688
Abstract
A blockchain is a distributed, digitized and consensus-based secure information storage mechanism. The present article provides an overview of blockchain based e-voting systems. The primary purpose of this review is to study the up-to-date state of blockchain-based voting research along with associated possible [...] Read more.
A blockchain is a distributed, digitized and consensus-based secure information storage mechanism. The present article provides an overview of blockchain based e-voting systems. The primary purpose of this review is to study the up-to-date state of blockchain-based voting research along with associated possible challenges while aiming to forecast future directions. The methodology applied in the review is a systematic review approach. Following an introduction to the basic structure and features of the blockchain in relation to e-voting, we provide a conceptual description of the desired blockchain-based e-voting application. Symmetrical and asymmetrical cryptography improvements play a key role in developing blockchain systems. We have extracted and reviewed 63 research papers from scientific databases that have advised the adoption of the blockchain framework to voting systems. These articles indicate that blockchain-supported voting systems may provide different solutions than traditional e-voting. We classified the main prevailing issues into the five following categories: general, integrity, coin-based, privacy and consensus. As a result of this research, it was determined that blockchain systems can provide solutions to certain problems that prevail in current election systems. On the other hand, privacy protection and transaction speed are most frequently emphasized problems in blockchain applications. Security of remote participation and scalability should be improved for sustainable blockchain based e-voting. It was concluded that frameworks needed enhancements in order to be used in voting systems due to these reservations. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

15 pages, 833 KiB  
Article
DeliveryCoin: An IDS and Blockchain-Based Delivery Framework for Drone-Delivered Services
by Mohamed Amine Ferrag and Leandros Maglaras
Computers 2019, 8(3), 58; https://doi.org/10.3390/computers8030058 - 6 Aug 2019
Cited by 71 | Viewed by 9684
Abstract
In this paper, we propose an intrusion detection system (IDS) and Blockchain-based delivery framework, called DeliveryCoin, for drone-delivered services. The DeliveryCoin framework consists of four phases, including system initialization phase, creating the block, updating the blockchain, and intrusion detection phase. To achieve privacy-preservation, [...] Read more.
In this paper, we propose an intrusion detection system (IDS) and Blockchain-based delivery framework, called DeliveryCoin, for drone-delivered services. The DeliveryCoin framework consists of four phases, including system initialization phase, creating the block, updating the blockchain, and intrusion detection phase. To achieve privacy-preservation, the DeliveryCoin framework employs hash functions and short signatures without random oracles and the Strong Diffie–Hellman (SDH) assumption in bilinear groups. To achieve consensus inside the blockchain-based delivery platform, we introduce a UAV-aided forwarding mechanism, named pBFTF. We also propose an IDS system in each macro eNB (5G) for detecting self-driving network attacks as well as false transactions between self-driving nodes. Furthermore, extensive simulations are conducted, and results confirm the efficiency of our proposed DeliveryCoin framework in terms of latency of blockchain consensus and accuracy. Full article
(This article belongs to the Special Issue Blockchain-Based Systems)
Show Figures

Figure 1

17 pages, 554 KiB  
Article
Privacy Threats and Protection Recommendations for the Use of Geosocial Network Data in Research
by Ourania Kounadi, Bernd Resch and Andreas Petutschnig
Soc. Sci. 2018, 7(10), 191; https://doi.org/10.3390/socsci7100191 - 11 Oct 2018
Cited by 17 | Viewed by 6129
Abstract
Inference attacks and protection measures are two sides of the same coin. Although the former aims to reveal information while the latter aims to hide it, they both increase awareness regarding the risks and threats from social media apps. On the one hand, [...] Read more.
Inference attacks and protection measures are two sides of the same coin. Although the former aims to reveal information while the latter aims to hide it, they both increase awareness regarding the risks and threats from social media apps. On the one hand, inference attack studies explore the types of personal information that can be revealed and the methods used to extract it. An additional risk is that geosocial media data are collected massively for research purposes, and the processing or publication of these data may further compromise individual privacy. On the other hand, consistent and increasing research on location protection measures promises solutions that mitigate disclosure risks. In this paper, we examine recent research efforts on the spectrum of privacy issues related to geosocial network data and identify the contributions and limitations of these research efforts. Furthermore, we provide protection recommendations to researchers that share, anonymise, and store social media data or publish scientific results. Full article
Show Figures

Figure 1

Back to TopTop