PISA: A proximity-based social networking (PBSN) protection model

The widespread adoption of Proximity-based Social Networking (PBSN) applications has been accompanied with several privacy concerns involving location information. As a result, many studies were directed towards innovative privacy-preserving solutions to provide a secure platform for mobile users. D...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Security journal Ročník 36; číslo 1; s. 165 - 200
Hlavní autori: Ramtohul, Asslinah Mocktoolah, Khedo, Kavi Kumar
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: London Palgrave Macmillan UK 01.03.2023
Palgrave Macmillan
Predmet:
ISSN:0955-1662, 1743-4645
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract The widespread adoption of Proximity-based Social Networking (PBSN) applications has been accompanied with several privacy concerns involving location information. As a result, many studies were directed towards innovative privacy-preserving solutions to provide a secure platform for mobile users. Despite the success of these solutions, there is a research gap in terms of the evaluation and analysis of their protection features. An in-depth evaluation of the privacy and security provisions in PBSN systems is necessary to assess the protection properties. In this paper, a comprehensive protection assessment model, the PISA model, is proposed to evaluate the privacy and security features of PBSN frameworks. The main objectives of this study refer to defining the protection goals of PBSN systems by reviewing the privacy and security requirements, analyzing the associated location privacy threats, and formulating the PISA model based on the quantification of the related protection goals using the privacy metrics. The study adopts an exploratory research methodology and explores four distinct research questions. The PISA model enables an extensive evaluation of privacy-preserving PBSN frameworks concerning their privacy and security features which can be further useful for researchers during the development of privacy-preserving algorithms to prevent flaws in advance and improve where necessary. Future works of the current research can focus on the analysis of privacy policies and adversary models based on their assumptions, resources, and capabilities.
AbstractList The widespread adoption of Proximity-based Social Networking (PBSN) applications has been accompanied with several privacy concerns involving location information. As a result, many studies were directed towards innovative privacy-preserving solutions to provide a secure platform for mobile users. Despite the success of these solutions, there is a research gap in terms of the evaluation and analysis of their protection features. An in-depth evaluation of the privacy and security provisions in PBSN systems is necessary to assess the protection properties. In this paper, a comprehensive protection assessment model, the PISA model, is proposed to evaluate the privacy and security features of PBSN frameworks. The main objectives of this study refer to defining the protection goals of PBSN systems by reviewing the privacy and security requirements, analyzing the associated location privacy threats, and formulating the PISA model based on the quantification of the related protection goals using the privacy metrics. The study adopts an exploratory research methodology and explores four distinct research questions. The PISA model enables an extensive evaluation of privacy-preserving PBSN frameworks concerning their privacy and security features which can be further useful for researchers during the development of privacy-preserving algorithms to prevent flaws in advance and improve where necessary. Future works of the current research can focus on the analysis of privacy policies and adversary models based on their assumptions, resources, and capabilities.
Author Ramtohul, Asslinah Mocktoolah
Khedo, Kavi Kumar
Author_xml – sequence: 1
  givenname: Asslinah Mocktoolah
  surname: Ramtohul
  fullname: Ramtohul, Asslinah Mocktoolah
  email: ashlinahmee@gmail.com
  organization: Faculty of Information, Communication and Digital Technologies, University of Mauritius
– sequence: 2
  givenname: Kavi Kumar
  surname: Khedo
  fullname: Khedo, Kavi Kumar
  organization: Faculty of Information, Communication and Digital Technologies, University of Mauritius
BookMark eNp9kE1LAzEQhoNUsK3-AU8LXvQQnSSbTeKtFj8KRQvVc0iyadm63a3JFu2_d-sKgodeZi7vM_PyDFCvqiuP0DmBawJc3MSUUJlioBQDMJZifoT6RKQMp1nKe6gPinNMsoyeoEGMKwCQSqg-Gs0m89FtMko2of4q1kWzw9ZEnyexdoUpk8o3n3V4L6plcjm7mz9f7YONd01RV8m6zn15io4Xpoz-7HcP0dvD_ev4CU9fHifj0RQ7RlSDlcucBUtFrgCsV44sjOVGCimshHbmKXGKWJ5LYaTMM08Is5TmgnsjmWVDdNHdbQt8bH1s9Krehqp9qamETAAFwtqU7FIu1DEGv9CuaMy-bRNMUWoCei9Md8J0K0z_CNO8Rek_dBOKtQm7wxDroNiGq6UPf60OUN85c34K
CitedBy_id crossref_primary_10_1016_j_jisa_2024_103918
Cites_doi 10.1109/TSMCA.2006.871655
10.1007/s11277-019-06500-0
10.1016/j.future.2016.08.023
10.1155/2015/815613
10.1002/sec.1438
10.1016/j.cose.2018.12.002
10.1145/3168389
10.1002/sec.330
10.1109/TDSC.2016.2604383
10.1145/1567253.1567257
10.14778/2733004.2733060
10.1109/TDSC.2019.2892150
10.1007/s11432-015-0981-4
10.1093/bib/bby076
10.2308/isys-50696
10.1109/TDSC.2020.2980271
10.1016/j.chb.2018.01.028
10.1007/s11036-012-0362-6
10.1038/s41467-019-09519-w
10.1016/j.procs.2013.05.112
10.1007/978-3-030-33582-3_77
10.1109/SPW.2015.15
10.1145/1734583.1734585
10.1109/ROLCG.2015.7367416
10.1007/978-3-319-13102-3_67
10.1109/INFOCOM.2014.6847945
10.1145/3383219.3383247
10.1109/INFOCOM.2014.6848003
10.1145/1866919.1866936
10.1007/978-3-642-14478-3_42
10.1109/SAHCN.2019.8824933
10.1109/SP.2011.18
10.1145/2971648.2971685
10.1109/INFCOM.2011.5934991
10.1109/INFCOM.2011.5935065
10.1145/2568225.2568240
10.1145/3195258.3195261
ContentType Journal Article
Copyright The Author(s), under exclusive licence to Springer Nature Limited 2022
The Author(s), under exclusive licence to Springer Nature Limited 2022.
Copyright_xml – notice: The Author(s), under exclusive licence to Springer Nature Limited 2022
– notice: The Author(s), under exclusive licence to Springer Nature Limited 2022.
DBID AAYXX
CITATION
0-V
3V.
7XB
88F
88G
88I
8AF
8AL
8AM
8FE
8FG
8FI
8FJ
8FK
8G5
ABUWG
AEUYN
AFKRA
ALSLI
ARAPS
AZQEC
BENPR
BGLVJ
BGRYB
CCPQU
DWQXO
FYUFA
GHDGH
GNUQQ
GUQSH
HCIFZ
JQ2
K7-
K7.
M0N
M0O
M1Q
M2M
M2O
M2P
MBDVC
P62
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PRQQA
PSYQQ
Q9U
DOI 10.1057/s41284-022-00334-5
DatabaseName CrossRef
ProQuest Social Sciences Premium Collection
ProQuest Central (Corporate)
ProQuest Central (purchase pre-March 2016)
Military Database (Alumni Edition)
Psychology Database (Alumni)
Science Database (Alumni Edition)
STEM Database
Computing Database (Alumni Edition)
Criminal Justice Database (Alumni Edition)
ProQuest SciTech Collection
ProQuest Technology Collection
Hospital Premium Collection
Hospital Premium Collection (Alumni Edition)
ProQuest Central (Alumni) (purchase pre-March 2016)
Research Library (Alumni)
ProQuest Central (Alumni)
ProQuest One Sustainability
ProQuest Central UK/Ireland
Social Science Premium Collection
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials
ProQuest Central
ProQuest Technology Collection
Criminology Collection
ProQuest One
ProQuest Central Korea
ProQuest Health & Medical Collection
Health Research Premium Collection (Alumni)
ProQuest Central Student
ProQuest Research Library
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
ProQuest Criminal Justice (Alumni)
Computing Database
Criminal Justice Database
Military Database (ProQuest)
Psychology Database
Research Library
Science Database
Research Library (Corporate)
ProQuest Advanced Technologies & Aerospace Collection
Proquest Central Premium
ProQuest One Academic (New)
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
ProQuest One Social Sciences
ProQuest One Psychology
ProQuest Central Basic
DatabaseTitle CrossRef
ProQuest One Psychology
Research Library Prep
Computer Science Database
ProQuest Central Student
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
ProQuest AP Science
SciTech Premium Collection
ProQuest Military Collection
ProQuest Central China
ProQuest One Applied & Life Sciences
ProQuest One Sustainability
Health Research Premium Collection
ProQuest Central (New)
Advanced Technologies & Aerospace Collection
Social Science Premium Collection
ProQuest Science Journals (Alumni Edition)
ProQuest One Academic Eastern Edition
ProQuest Hospital Collection
ProQuest Technology Collection
Health Research Premium Collection (Alumni)
ProQuest Hospital Collection (Alumni)
Criminology Collection
Criminal Justice Periodicals (Alumni Edition)
ProQuest Social Sciences Premium Collection
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Central (Alumni Edition)
ProQuest One Community College
Research Library (Alumni Edition)
ProQuest Central
ProQuest Criminal Justice
ProQuest Central Korea
ProQuest Research Library
ProQuest Computing
ProQuest One Social Sciences
ProQuest Central Basic
ProQuest Science Journals
ProQuest Computing (Alumni Edition)
ProQuest Psychology Journals (Alumni)
ProQuest Military Collection (Alumni Edition)
ProQuest SciTech Collection
ProQuest Criminal Justice (Alumni)
ProQuest Psychology Journals
ProQuest Central (Alumni)
DatabaseTitleList
ProQuest One Psychology
Database_xml – sequence: 1
  dbid: BENPR
  name: ProQuest Central
  url: https://www.proquest.com/central
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Social Welfare & Social Work
Business
EISSN 1743-4645
EndPage 200
ExternalDocumentID 10_1057_s41284_022_00334_5
GroupedDBID --K
0-V
0R~
123
1B1
3V.
4.4
406
88I
8AF
8FE
8FG
8FI
8FJ
8G5
8R4
8R5
AACDK
AAFIF
AAIAL
AANZL
AARHV
AASML
AATNV
ABAKF
ABDZT
ABIVO
ABJNI
ABUWG
ACAOD
ACGFS
ACGOD
ACHQT
ACLPH
ACPIV
ACZOJ
ADBBV
ADINQ
ADXJC
AECXW
AEFQL
AEJRE
AEMSY
AESKC
AEUYN
AEVLU
AEXYK
AFBBN
AFKRA
AGAYW
AGQEE
AGRTI
AHBYD
AHSBF
AIGIU
AILAN
AJRNO
ALIPV
ALMA_UNASSIGNED_HOLDINGS
ALSLI
AMKLP
AMYLF
ARALO
ARAPS
ASPBG
AVWKF
AXYYD
AZQEC
BENPR
BGLVJ
BGRYB
BKKNO
BPHCQ
BVXVI
CAG
CCPQU
COF
CS3
CSNOR
DNIVK
DPUIP
DU5
DWQXO
EBLON
EBS
EIOEI
EJD
FEFRA
FERAY
FIGPU
FPDNL
FSGXE
FYUFA
GNUQQ
GUQSH
HCIFZ
IHE
IWAJR
J-C
JZLTJ
K6V
K7-
M0N
M0O
M1Q
M2M
M2O
M2P
M41
N8N
NQ-
O9-
P2P
PLIJB
PQQKQ
PROAC
PSYQQ
PVNMB
Q2X
RIG
ROL
RPC
RPZ
RSV
SJYHP
SNX
SOHCF
SOJ
SRMVM
SSHVO
TN5
TSG
UKHRP
WH7
AAYXX
ABBRH
ABDBE
ABFSG
ABJZF
ABRTQ
ACSTC
AEZWR
AFDZB
AFFHD
AFHIU
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
PHGZM
PHGZT
PQGLB
PRQQA
7XB
8AL
8FK
JQ2
K7.
MBDVC
P62
PKEHL
PQEST
PQUKI
PRINS
Q9U
ID FETCH-LOGICAL-c319t-9c6cb0b27d900be9c1fab5a8787b80787d41c91b5d87a88d6e113b22d75ea83b3
IEDL.DBID M2P
ISICitedReferencesCount 1
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000773857100001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0955-1662
IngestDate Thu Nov 20 04:32:20 EST 2025
Tue Nov 18 21:59:57 EST 2025
Sat Nov 29 05:42:34 EST 2025
Fri Feb 21 02:43:13 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 1
Keywords Privacy assessment
Proximity-based social networking
Location-based systems
Evaluation metrics
Security analysis
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c319t-9c6cb0b27d900be9c1fab5a8787b80787d41c91b5d87a88d6e113b22d75ea83b3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 2806702013
PQPubID 31219
PageCount 36
ParticipantIDs proquest_journals_2806702013
crossref_citationtrail_10_1057_s41284_022_00334_5
crossref_primary_10_1057_s41284_022_00334_5
springer_journals_10_1057_s41284_022_00334_5
PublicationCentury 2000
PublicationDate 20230300
2023-03-00
20230301
PublicationDateYYYYMMDD 2023-03-01
PublicationDate_xml – month: 3
  year: 2023
  text: 20230300
PublicationDecade 2020
PublicationPlace London
PublicationPlace_xml – name: London
PublicationTitle Security journal
PublicationTitleAbbrev Secur J
PublicationYear 2023
Publisher Palgrave Macmillan UK
Palgrave Macmillan
Publisher_xml – name: Palgrave Macmillan UK
– name: Palgrave Macmillan
References Ma, Li, Ma, Jiang, Gao, Xi, Lu (CR20) 2017; 60
Song, Sim, Park, Song (CR32) 2015; 11
Ravi, Subramaniyaswamy, Devarajan, Ravichandran, Arunkumar, Indragandhi, Vijayakumar (CR26) 2019; 108
Li, Zhu, Du, Liang, Shen (CR15) 2016; 15
CR19
Jiang, Li, Zhao, Zeng, Xiao, Iyengar (CR11) 2021; 54
Raschke, Krishen, Kachroo (CR25) 2014; 28
CR16
CR38
CR37
CR35
CR34
Zhu, Ayday, Vitenberg (CR45) 2019; 18
Xue, Liu, Ross, Qian (CR41) 2016; 9
Lee, Guo, Yin (CR14) 2013; 17
CR30
Sun, Liao, Li, Yu, Chang (CR33) 2016; 74
Do, Martini, Choo (CR10) 2019; 81
Al-Badawy, Abbas, Belal (CR1) 2018; 13
CR2
CR4
CR3
Liu (CR18) 2009; 1
CR6
CR5
Thuiller, Guéguen, Renaud, Karger, Zimmermann (CR36) 2019; 10
CR29
CR28
CR9
Kong, Liu, Huang (CR13) 2014; 7
Lilien, Bhargava (CR17) 2006; 36
Solove (CR31) 2005; 154
CR24
CR46
CR23
CR44
CR42
Wagner, Eckhoff (CR39) 2018; 51
Werner (CR40) 2016; 9
Buchanan, Kwecka, Ekonomou (CR8) 2013; 18
Zhao, Wagner (CR43) 2020; 19
Kim, Chen, Lin, Wang, Yang, Yang (CR12) 2019; 20
Mamonov, Benbunan-Fich (CR21) 2018; 83
L Ravi (334_CR26) 2019; 108
334_CR30
X Zhu (334_CR45) 2019; 18
M Werner (334_CR40) 2016; 9
W Thuiller (334_CR36) 2019; 10
334_CR34
334_CR35
334_CR37
AM Al-Badawy (334_CR1) 2018; 13
334_CR16
334_CR38
H Jiang (334_CR11) 2021; 54
334_CR28
334_CR6
334_CR29
334_CR9
D Song (334_CR32) 2015; 11
334_CR3
334_CR2
334_CR5
H Li (334_CR15) 2016; 15
334_CR4
T Kim (334_CR12) 2019; 20
DJ Solove (334_CR31) 2005; 154
WJ Buchanan (334_CR8) 2013; 18
G Sun (334_CR33) 2016; 74
L Kong (334_CR13) 2014; 7
C Lee (334_CR14) 2013; 17
Q Do (334_CR10) 2019; 81
I Wagner (334_CR39) 2018; 51
L Lilien (334_CR17) 2006; 36
334_CR42
334_CR44
334_CR23
334_CR24
Y Zhao (334_CR43) 2020; 19
334_CR46
L Liu (334_CR18) 2009; 1
X Ma (334_CR20) 2017; 60
334_CR19
S Mamonov (334_CR21) 2018; 83
RL Raschke (334_CR25) 2014; 28
M Xue (334_CR41) 2016; 9
References_xml – volume: 36
  start-page: 503
  issue: 3
  year: 2006
  end-page: 506
  ident: CR17
  article-title: A Scheme for Privacy-Preserving Data Dissemination
  publication-title: IEEE Transactions on Systems, Man, and Cybernetics-Part A
  doi: 10.1109/TSMCA.2006.871655
– volume: 108
  start-page: 1869
  issue: 3
  year: 2019
  end-page: 1907
  ident: CR26
  article-title: SECRECSY: A Secure Framework for Enhanced Privacy-Preserving Location Recommendations in Cloud Environment
  publication-title: Wireless Personal Communications
  doi: 10.1007/s11277-019-06500-0
– ident: CR4
– ident: CR2
– ident: CR16
– ident: CR37
– ident: CR30
– volume: 74
  start-page: 375
  year: 2016
  end-page: 384
  ident: CR33
  article-title: L2P2: A location-label based approach for privacy preserving in LBS
  publication-title: Future Generation Computer Systems
  doi: 10.1016/j.future.2016.08.023
– volume: 11
  start-page: 8
  year: 2015
  ident: CR32
  article-title: A privacy-preserving continuous location monitoring system for location-based services
  publication-title: International Journal of Distributed Sensor Networks
  doi: 10.1155/2015/815613
– volume: 9
  start-page: 1496
  issue: 11
  year: 2016
  end-page: 1508
  ident: CR41
  article-title: Thwarting Location Privacy Protection in Location-Based Social Discovery Services
  publication-title: Security and Communication Networks
  doi: 10.1002/sec.1438
– ident: CR35
– ident: CR6
– ident: CR29
– volume: 81
  start-page: 156
  year: 2019
  end-page: 181
  ident: CR10
  article-title: The Role of the Adversary Model in Applied Security Research
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2018.12.002
– volume: 54
  start-page: 1
  issue: 1
  year: 2021
  end-page: 36
  ident: CR11
  article-title: Location Privacy-Preserving Mechanisms in Location-Based Services: A Comprehensive Survey
  publication-title: ACM Computing Surveys (CSUR)
– volume: 51
  start-page: 1
  issue: 3
  year: 2018
  end-page: 38
  ident: CR39
  article-title: Technical Privacy Metrics: A Systematic Survey
  publication-title: ACM Computing Surveys (CSUR)
  doi: 10.1145/3168389
– volume: 9
  start-page: 130
  issue: 2
  year: 2016
  end-page: 138
  ident: CR40
  article-title: Privacy-Protected Communication for Location-Based Services
  publication-title: Security and Communication Networks
  doi: 10.1002/sec.330
– ident: CR42
– ident: CR23
– ident: CR46
– ident: CR19
– ident: CR44
– volume: 15
  start-page: 646
  issue: 4
  year: 2016
  end-page: 660
  ident: CR15
  article-title: Privacy Leakage of Location Sharing In Mobile Social Networks: Attacks and Defense
  publication-title: IEEE Transactions on Dependable and Secure Computing
  doi: 10.1109/TDSC.2016.2604383
– volume: 13
  start-page: 11540
  issue: 14
  year: 2018
  end-page: 11547
  ident: CR1
  article-title: A TTP-Free Location Privacy Framework for Mobile Social Networks with Key Agreement Protocol
  publication-title: International Journal of Applied Engineering Research
– volume: 1
  start-page: 15
  issue: 2
  year: 2009
  end-page: 22
  ident: CR18
  article-title: Privacy and Location Anonymization in Location-Based Services
  publication-title: SIGSPATIAL Special
  doi: 10.1145/1567253.1567257
– volume: 7
  start-page: 1681
  issue: 13
  year: 2014
  end-page: 1684
  ident: CR13
  article-title: Spot: Locating Social Media Users Based on Social Network Context
  publication-title: Proceedings of the VLDB Endowment
  doi: 10.14778/2733004.2733060
– volume: 18
  start-page: 384
  issue: 1
  year: 2019
  end-page: 399
  ident: CR45
  article-title: A Privacy-Preserving Framework for Outsourcing Location-Based Services to The Cloud
  publication-title: IEEE Transactions on Dependable and Secure Computing
  doi: 10.1109/TDSC.2019.2892150
– ident: CR3
– volume: 60
  start-page: 1
  issue: 9
  year: 2017
  end-page: 16
  ident: CR20
  article-title: APPLET: A Privacy-Preserving Framework for Location-Aware Recommender System
  publication-title: Science China Information Sciences
  doi: 10.1007/s11432-015-0981-4
– ident: CR38
– volume: 20
  start-page: 2316
  issue: 6
  year: 2019
  end-page: 2326
  ident: CR12
  article-title: Impact of Similarity Metrics on Single-Cell RNA-Seq Data Clustering
  publication-title: Briefings in Bioinformatics
  doi: 10.1093/bib/bby076
– volume: 28
  start-page: 227
  issue: 1
  year: 2014
  end-page: 242
  ident: CR25
  article-title: Understanding the Components of Information Privacy Threats for Location-Based Services
  publication-title: Journal of Information Systems
  doi: 10.2308/isys-50696
– volume: 19
  start-page: 259
  issue: 1
  year: 2020
  end-page: 274
  ident: CR43
  article-title: Using Metrics Suites to Improve the Measurement of Privacy in Graphs
  publication-title: IEEE Transactions on Dependable and Secure Computing
  doi: 10.1109/TDSC.2020.2980271
– ident: CR9
– volume: 83
  start-page: 32
  issue: 3
  year: 2018
  end-page: 44
  ident: CR21
  article-title: The Impact of Information Security Threat Awareness on Privacy-Protective Behaviors
  publication-title: Computers in Human Behavior
  doi: 10.1016/j.chb.2018.01.028
– ident: CR34
– ident: CR5
– volume: 18
  start-page: 728
  issue: 5
  year: 2013
  end-page: 737
  ident: CR8
  article-title: A Privacy Preserving Method Using Privacy Enhancing Techniques for Location Based Services
  publication-title: Mobile Networks and Applications
  doi: 10.1007/s11036-012-0362-6
– volume: 10
  start-page: 1
  issue: 1
  year: 2019
  end-page: 9
  ident: CR36
  article-title: Uncertainty in Ensembles of Global Biodiversity Scenarios
  publication-title: Nature Communications
  doi: 10.1038/s41467-019-09519-w
– volume: 17
  start-page: 879
  year: 2013
  end-page: 887
  ident: CR14
  article-title: A Framework of Evaluation Location Privacy in Mobile Network
  publication-title: Procedia Computer Science
  doi: 10.1016/j.procs.2013.05.112
– ident: CR28
– ident: CR24
– volume: 154
  start-page: 447
  issue: 3
  year: 2005
  end-page: 564
  ident: CR31
  article-title: A Taxonomy of Privacy
  publication-title: The University of Pennsylvania Law Review
– ident: 334_CR2
  doi: 10.1007/978-3-030-33582-3_77
– ident: 334_CR38
  doi: 10.1109/SPW.2015.15
– volume: 9
  start-page: 1496
  issue: 11
  year: 2016
  ident: 334_CR41
  publication-title: Security and Communication Networks
  doi: 10.1002/sec.1438
– ident: 334_CR37
– volume: 7
  start-page: 1681
  issue: 13
  year: 2014
  ident: 334_CR13
  publication-title: Proceedings of the VLDB Endowment
  doi: 10.14778/2733004.2733060
– ident: 334_CR24
  doi: 10.1145/1734583.1734585
– volume: 28
  start-page: 227
  issue: 1
  year: 2014
  ident: 334_CR25
  publication-title: Journal of Information Systems
  doi: 10.2308/isys-50696
– volume: 154
  start-page: 447
  issue: 3
  year: 2005
  ident: 334_CR31
  publication-title: The University of Pennsylvania Law Review
– ident: 334_CR4
  doi: 10.1109/ROLCG.2015.7367416
– volume: 18
  start-page: 728
  issue: 5
  year: 2013
  ident: 334_CR8
  publication-title: Mobile Networks and Applications
  doi: 10.1007/s11036-012-0362-6
– volume: 18
  start-page: 384
  issue: 1
  year: 2019
  ident: 334_CR45
  publication-title: IEEE Transactions on Dependable and Secure Computing
  doi: 10.1109/TDSC.2019.2892150
– ident: 334_CR6
  doi: 10.1007/978-3-319-13102-3_67
– volume: 10
  start-page: 1
  issue: 1
  year: 2019
  ident: 334_CR36
  publication-title: Nature Communications
  doi: 10.1038/s41467-019-09519-w
– ident: 334_CR28
  doi: 10.1109/INFOCOM.2014.6847945
– volume: 81
  start-page: 156
  year: 2019
  ident: 334_CR10
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2018.12.002
– ident: 334_CR34
  doi: 10.1145/3383219.3383247
– volume: 9
  start-page: 130
  issue: 2
  year: 2016
  ident: 334_CR40
  publication-title: Security and Communication Networks
  doi: 10.1002/sec.330
– ident: 334_CR19
  doi: 10.1109/INFOCOM.2014.6848003
– volume: 1
  start-page: 15
  issue: 2
  year: 2009
  ident: 334_CR18
  publication-title: SIGSPATIAL Special
  doi: 10.1145/1567253.1567257
– ident: 334_CR30
  doi: 10.1145/1866919.1866936
– ident: 334_CR5
  doi: 10.1007/978-3-642-14478-3_42
– ident: 334_CR9
  doi: 10.1109/SAHCN.2019.8824933
– volume: 36
  start-page: 503
  issue: 3
  year: 2006
  ident: 334_CR17
  publication-title: IEEE Transactions on Systems, Man, and Cybernetics-Part A
  doi: 10.1109/TSMCA.2006.871655
– volume: 83
  start-page: 32
  issue: 3
  year: 2018
  ident: 334_CR21
  publication-title: Computers in Human Behavior
  doi: 10.1016/j.chb.2018.01.028
– ident: 334_CR29
  doi: 10.1109/SP.2011.18
– ident: 334_CR44
– volume: 60
  start-page: 1
  issue: 9
  year: 2017
  ident: 334_CR20
  publication-title: Science China Information Sciences
  doi: 10.1007/s11432-015-0981-4
– volume: 74
  start-page: 375
  year: 2016
  ident: 334_CR33
  publication-title: Future Generation Computer Systems
  doi: 10.1016/j.future.2016.08.023
– ident: 334_CR42
  doi: 10.1145/2971648.2971685
– volume: 20
  start-page: 2316
  issue: 6
  year: 2019
  ident: 334_CR12
  publication-title: Briefings in Bioinformatics
  doi: 10.1093/bib/bby076
– ident: 334_CR23
– volume: 19
  start-page: 259
  issue: 1
  year: 2020
  ident: 334_CR43
  publication-title: IEEE Transactions on Dependable and Secure Computing
  doi: 10.1109/TDSC.2020.2980271
– ident: 334_CR46
  doi: 10.1109/INFCOM.2011.5934991
– ident: 334_CR16
  doi: 10.1109/INFCOM.2011.5935065
– ident: 334_CR35
  doi: 10.1145/2568225.2568240
– volume: 54
  start-page: 1
  issue: 1
  year: 2021
  ident: 334_CR11
  publication-title: ACM Computing Surveys (CSUR)
– ident: 334_CR3
  doi: 10.1145/3195258.3195261
– volume: 17
  start-page: 879
  year: 2013
  ident: 334_CR14
  publication-title: Procedia Computer Science
  doi: 10.1016/j.procs.2013.05.112
– volume: 13
  start-page: 11540
  issue: 14
  year: 2018
  ident: 334_CR1
  publication-title: International Journal of Applied Engineering Research
– volume: 11
  start-page: 8
  year: 2015
  ident: 334_CR32
  publication-title: International Journal of Distributed Sensor Networks
  doi: 10.1155/2015/815613
– volume: 51
  start-page: 1
  issue: 3
  year: 2018
  ident: 334_CR39
  publication-title: ACM Computing Surveys (CSUR)
  doi: 10.1145/3168389
– volume: 15
  start-page: 646
  issue: 4
  year: 2016
  ident: 334_CR15
  publication-title: IEEE Transactions on Dependable and Secure Computing
  doi: 10.1109/TDSC.2016.2604383
– volume: 108
  start-page: 1869
  issue: 3
  year: 2019
  ident: 334_CR26
  publication-title: Wireless Personal Communications
  doi: 10.1007/s11277-019-06500-0
SSID ssj0008979
Score 2.2477818
Snippet The widespread adoption of Proximity-based Social Networking (PBSN) applications has been accompanied with several privacy concerns involving location...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 165
SubjectTerms Algorithms
Computer privacy
Crime and Society
Criminology and Criminal Justice
Evaluation
Measurement
Networking
Original Article
Privacy
Property
Protection
Proximity
Research methodology
Security
Social networks
Social Sciences
Welfare state
SummonAdditionalLinks – databaseName: SpringerLINK Contemporary 1997-Present
  dbid: RSV
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1JSwMxFH5oFfHiUhWrVXIQUTTYzCRN4q2KRUFKsVp7G7LMgFhaaavgvzeZpUVRQa8zSQhvn3nLB3AQakqorUmsqKKYciqwNtZiSp30hIpang577t7yVkv0erKdN4WNi2r3IiWZWuoci_ZsTL0pxb763AOQUczmYcG5O-EBG-463an9FbKYsMcwqdeDvFXm-zM-u6NZjPklLZp6m-bq_-65Bit5dIkamTisw1w8KMNSUdxehmrWjYse436iRjE6RMWD4eh5Axrtm07jHDWQL27xnU_v2Hs5i7I_62iQ1Yy726Cj9kWndYzyMQ-OuSjF1NmEh-bV_eU1zjEWsHHKN8HS1I2u6YBbWavpWBqSKM2UcHqs_Sh6bikxkmhmBVdC2HpMSKiDwPEwViLU4RaUBsNBvA2IscQQqUMeUOfyFJEJV5wl7ovEEJYkugKkIHVk8gHkHgejH6WJcMajjHSRI12Uki5iFTiZ7nnJxm_8urpacDDKVXEc-dQxd0ExCStwWnBs9vrn03b-tnwXlj0UfVafVoXSZPQa78GieZs8jUf7qYh-AJ152-8
  priority: 102
  providerName: Springer Nature
Title PISA: A proximity-based social networking (PBSN) protection model
URI https://link.springer.com/article/10.1057/s41284-022-00334-5
https://www.proquest.com/docview/2806702013
Volume 36
WOSCitedRecordID wos000773857100001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAVX
  databaseName: SpringerLINK Contemporary 1997-Present
  customDbUrl:
  eissn: 1743-4645
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0008979
  issn: 0955-1662
  databaseCode: RSV
  dateStart: 19990101
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3dT9swED8BndBeGONDK3TIDxNiAos4set4L1OZWoGgXUb5eov8kUiIqi1tQeK_x04cqiGtL3u5ByexLP_su4vvfD-Ab5GihJpAYEklxZTTGCttDKbUrp5IUsOLYs83F7zXi-_uROIP3KY-rbLSiYWiNiPtzsiPXQSQW9-GRD_Hj9ixRrnoqqfQWIaa9WyIS-nqhsmbJo5FVWuPYdJshv7SjHVRjqfUKWbsctkdnRnF7G_DNPc23wVIC7vT-fS_I16HNe9xola5RD7DUjbcgNUq4X0DGuUNXXSbDXI5ydA-qhpGk4dNaCVn_dYP1EIu4cXdhnrBzvIZVJ62o2GZR27Hjg6Sk37vO_KlHyzgqODZ2YLrTvvq1yn2vAtY2w05w0I3tQpUyI0IApUJTXKpmIzt3lauPD03lGhBFDMxl3FsmhkhkQpDi2sm40hF27AyHA2zL4AYyzURKuIhtWZQEpFzyVlu_1I0YXmu6kCqSU-1L0ruuDEGaREcZzwtgUotUGkBVMrqcPj2zbgsybHw7UaFTuq35zSdQ1OHowrf-eN_97azuLdd-Ojo6MsctQaszCZP2Vf4oJ9n99PJHtRO2r3kcg-Wzzm2shv8dpL8cTLsFrJoCRMrL_s3r3lp7Qo
linkProvider ProQuest
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1bTxQxFD5BIOgLCkhcWbUPaiDasO202ykJIeuFsGHZbAIqb6W3SYxkF3dXCH_K32g7M2Ujibzx4Otcmpn26zln5nznOwCvM8MIcy2JNdMMM8FybKxzmLGAnkwzJ0qx56890e_np6dyMAe_Uy1MpFUmm1gaajey8R_5dswAihDbkGzv4ieOXaNidjW10Khgceivr8In22S3-yms7xtK9z-ffDzAdVcBbAPcpljatjUtQ4WTrZbx0pJCG67zgFwTxdeFY8RKYrjLhc5z1_aEZIbS8NRe55nJwrgPYIFFZbFIFaSDG8ufy6TtxzFpt2ldpBNCou0Ji44AR-58bJ_GMP_bEc6i21sJ2dLP7T_-32boCSzXETXqVFtgBeb8cBWWEqF_FZpVBTL65s8LPfboLUoHRuMfa9AZdI87O6iDIqEnVntd4-jZHaqyCWhY8eTDXKHNwYfj_haqpS0CoFHZR-gpfLmX91uH-eFo6J8B4rywRJpMUBbcvCayEFrwInyFWcKLwjSApEVWthZdj70_zlWZ_OdCVcBQARiqBIbiDXh3c89FJTly59XNhAZVm5-JmkGhAe8Tnman_z3a87tHewUPD06OeqrX7R9uwCMaAr6Kj9eE-en4l38Bi_Zy-n0yflluDARn942zPxxNQyI
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1LbxMxEB6VFlVceBQQgQA-tAgEVuJdO14jIZTSRo1SRZHKozfj10qIKilJWtS_xq9jvLtuBBK99cB1d23J9md_451vZgC2c8sZ911FDTeccskLap33lHNET264l1Wy58-Hcjwujo_VZA1-pViYKKtMZ2J1UPuZi__IO9EDKNG2YXmnbGQRk73B-9MfNFaQip7WVE6jhsgoXPzE69vi3XAP13onywb7Hz8c0KbCAHUIvSVVruds12bSq27XBuVYaawwBaLYxkTs0nPmFLPCF9IUhe8FxnKbZTiCYIrc5tjvDdhAFhaxesJI0ksWKFTK8yco6_WyJmAHzaPOgkdSoFFHH0upcSr-JMWVpfuXc7bivMGd_3m27sLtxtIm_Xpr3IO1MN2CzST034J2HZlMvoST0swDeUHSg9n8-33oT4ZH_bekT6LQJ0aBXdDI-J7UXgYyrfXzOG_k5WT3aPyKNCkvEOikqi_0AD5dy_gewvp0Ng2PgAhROqZsLjOO9G-YKqWRosTbmWOiLG0LWFpw7Zpk7LEmyImuRAFC6hokGkGiK5Bo0YLXl21O61QkV37dTsjQzbG00CtYtOBNwtbq9b97e3x1b89hE-GlD4fj0RO4laEdWMv02rC-nJ-Fp3DTnS-_LebPqj1C4Ot1w-w3vA1LpA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=PISA%3A+A+proximity-based+social+networking+%28PBSN%29+protection+model&rft.jtitle=Security+journal&rft.au=Ramtohul%2C+Asslinah+Mocktoolah&rft.au=Khedo%2C+Kavi+Kumar&rft.date=2023-03-01&rft.issn=0955-1662&rft.eissn=1743-4645&rft.volume=36&rft.issue=1&rft.spage=165&rft.epage=200&rft_id=info:doi/10.1057%2Fs41284-022-00334-5&rft.externalDBID=n%2Fa&rft.externalDocID=10_1057_s41284_022_00334_5
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0955-1662&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0955-1662&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0955-1662&client=summon