PISA: A proximity-based social networking (PBSN) protection model

The widespread adoption of Proximity-based Social Networking (PBSN) applications has been accompanied with several privacy concerns involving location information. As a result, many studies were directed towards innovative privacy-preserving solutions to provide a secure platform for mobile users. D...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Security journal Ročník 36; číslo 1; s. 165 - 200
Hlavní autoři: Ramtohul, Asslinah Mocktoolah, Khedo, Kavi Kumar
Médium: Journal Article
Jazyk:angličtina
Vydáno: London Palgrave Macmillan UK 01.03.2023
Palgrave Macmillan
Témata:
ISSN:0955-1662, 1743-4645
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Popis
Shrnutí:The widespread adoption of Proximity-based Social Networking (PBSN) applications has been accompanied with several privacy concerns involving location information. As a result, many studies were directed towards innovative privacy-preserving solutions to provide a secure platform for mobile users. Despite the success of these solutions, there is a research gap in terms of the evaluation and analysis of their protection features. An in-depth evaluation of the privacy and security provisions in PBSN systems is necessary to assess the protection properties. In this paper, a comprehensive protection assessment model, the PISA model, is proposed to evaluate the privacy and security features of PBSN frameworks. The main objectives of this study refer to defining the protection goals of PBSN systems by reviewing the privacy and security requirements, analyzing the associated location privacy threats, and formulating the PISA model based on the quantification of the related protection goals using the privacy metrics. The study adopts an exploratory research methodology and explores four distinct research questions. The PISA model enables an extensive evaluation of privacy-preserving PBSN frameworks concerning their privacy and security features which can be further useful for researchers during the development of privacy-preserving algorithms to prevent flaws in advance and improve where necessary. Future works of the current research can focus on the analysis of privacy policies and adversary models based on their assumptions, resources, and capabilities.
Bibliografie:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:0955-1662
1743-4645
DOI:10.1057/s41284-022-00334-5