2023
DOI: 10.1016/j.bcra.2022.100111
|View full text |Cite
|
Sign up to set email alerts
|

RecGuard: An efficient privacy preservation blockchain-based system for online social network users

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 35 publications
0
2
0
Order By: Relevance
“…The process involves the identification of deviations that lead to potential attacks, abnormalities, and fraudulent activities. Irregularities can be identified using graph-based methods, behavioral analysis, ML, and statistical techniques 103 . Statistical approaches utilize statistical techniques to identify abnormalities in transaction patterns, network behavior, or consensus parameters.…”
Section: Anomaly Detectionmentioning
confidence: 99%
“…The process involves the identification of deviations that lead to potential attacks, abnormalities, and fraudulent activities. Irregularities can be identified using graph-based methods, behavioral analysis, ML, and statistical techniques 103 . Statistical approaches utilize statistical techniques to identify abnormalities in transaction patterns, network behavior, or consensus parameters.…”
Section: Anomaly Detectionmentioning
confidence: 99%
“…Economic Perspective In today's world, many internet service providers offer their services for free in exchange for user data through various IEEE Internet of Things Journal Manuscript ID: IoT-36643-2024 channels and devices [43], [45], [47]. However, this can lead to privacy violations, and users may unknowingly sacrifice their privacy for convenience [46]. Data brokerage businesses have emerged, facilitating the exchange of personal data for a price [43], [48], but "pay-for-privacy" models further erode data owners' privacy rights [9], [45].…”
Section: ) Potential Solutions For Challenges Identified Frommentioning
confidence: 99%
“…Additionally, every involved business must also be held accountable for compliance [61]. While experts still recommend using blockchain with smart contracts to create a decentralised IoT data marketplace, enabling policy-setting for accessing, storing, and sharing/transferring IoT data [45], [46], [52], [55], [58], [59], [68], [70], [71], [72], [73], however, it is essential to implement additional privacy-enhancing measures such as anonymisation, encryption, and differential privacy [9], [42], [48], [52], [62], [66], [68], [71], [74], [75], among others, to reinforce privacy protection. Data security measures, such as intrusion detection and threat analytics [45], [71], should also be made mandatory to overcome the privacy mechanism shortfalls in blockchain adoption.…”
Section: ) Potential Solutions For Challenges Identified Frommentioning
confidence: 99%