Critical Review of Different Approaches of Multiparty Privacy Protection Methods and Effectiveness on Social Media

IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Transactions on Emerging Telecommunications Technologies Pub Date : 2025-04-21 DOI:10.1002/ett.70130
P. Jayaprabha, K. Paulose Jacob
{"title":"Critical Review of Different Approaches of Multiparty Privacy Protection Methods and Effectiveness on Social Media","authors":"P. Jayaprabha,&nbsp;K. Paulose Jacob","doi":"10.1002/ett.70130","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>Social networking is a significant notion that has emerged for effective communication among multiple users. Social media services are in high demand among users all around the world. Privacy is important on social networking sites, and privacy concerns are particularly sensitive. Social media has numerous applications, and ensuring multiparty privacy (MP) among various users is a critical requirement. Massive research has been undertaken to manage secured MP across network users. However, certain issues still come up, like authentication, co-ownership of data by third parties, surveillance, and data misuse. The privacy preferences of a certain user are the priority by which the user can adjust or edit their network settings. Conflicts between users can be avoided, high security for personal data can be achieved, and highly confidential information can be maintained with the help of user preferences. Some security flaws in social media allow for the misuse of private information and the emergence of user conflicts. Therefore, privacy preservation techniques are developed and put into practice in order to address privacy concerns and provide improved security during data transfer. These techniques serve as technical assistance in recognizing and resolving disputes inside the MP management. For the construction of privacy preservation methods, real-world empirical data, user-centered MP controls, privacy-improved party analysis, hypothetical privacy support, and privacy assurance in the case of multiparty agreement are required.</p>\n </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 4","pages":""},"PeriodicalIF":2.5000,"publicationDate":"2025-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Transactions on Emerging Telecommunications Technologies","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/ett.70130","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0

Abstract

Social networking is a significant notion that has emerged for effective communication among multiple users. Social media services are in high demand among users all around the world. Privacy is important on social networking sites, and privacy concerns are particularly sensitive. Social media has numerous applications, and ensuring multiparty privacy (MP) among various users is a critical requirement. Massive research has been undertaken to manage secured MP across network users. However, certain issues still come up, like authentication, co-ownership of data by third parties, surveillance, and data misuse. The privacy preferences of a certain user are the priority by which the user can adjust or edit their network settings. Conflicts between users can be avoided, high security for personal data can be achieved, and highly confidential information can be maintained with the help of user preferences. Some security flaws in social media allow for the misuse of private information and the emergence of user conflicts. Therefore, privacy preservation techniques are developed and put into practice in order to address privacy concerns and provide improved security during data transfer. These techniques serve as technical assistance in recognizing and resolving disputes inside the MP management. For the construction of privacy preservation methods, real-world empirical data, user-centered MP controls, privacy-improved party analysis, hypothetical privacy support, and privacy assurance in the case of multiparty agreement are required.

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
社交媒体上多方隐私保护的不同方法及有效性评述
社交网络是一个重要的概念,它的出现是为了在多个用户之间进行有效的交流。世界各地的用户都对社交媒体服务有很高的需求。隐私在社交网站上很重要,隐私问题尤其敏感。社交媒体有许多应用程序,确保不同用户之间的多方隐私(MP)是一项关键要求。已经进行了大量的研究来管理跨网络用户的安全MP。然而,某些问题仍然会出现,如身份验证、第三方数据的共同所有权、监视和数据滥用。特定用户的隐私偏好是用户可以调整或编辑其网络设置的优先级。可以避免用户之间的冲突,实现个人数据的高安全性,并通过用户偏好来维护高度机密的信息。社交媒体上的一些安全漏洞允许滥用私人信息和出现用户冲突。因此,隐私保护技术被开发并付诸实践,以解决隐私问题,并在数据传输过程中提供改进的安全性。这些技术可以作为识别和解决MP管理内部纠纷的技术援助。对于隐私保护方法的构建,需要真实世界的经验数据、以用户为中心的MP控制、隐私改进方分析、假设隐私支持以及多方协议情况下的隐私保证。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
8.90
自引率
13.90%
发文量
249
期刊介绍: ransactions on Emerging Telecommunications Technologies (ETT), formerly known as European Transactions on Telecommunications (ETT), has the following aims: - to attract cutting-edge publications from leading researchers and research groups around the world - to become a highly cited source of timely research findings in emerging fields of telecommunications - to limit revision and publication cycles to a few months and thus significantly increase attractiveness to publish - to become the leading journal for publishing the latest developments in telecommunications
期刊最新文献
Cloud Computing With Image Processing Framework for Lung Cancer Diagnosis Using Improved Heuristic-Aided Hybrid Residual Attention Network A Reinforcement Learning–Driven Payoff-Adaptive Game-Theoretic Framework for Secure and Reliable Operation of Mobile Ad Hoc Networks Spatiotemporal Graph Neural Network-Driven Anomaly Detection for Cooperative Vehicle Messaging in Dense VANET Corridors Blockchain-Powered IoT Healthcare Framework With Dandelion Depthwise Separable Convolutional Neural Network for Enhanced Security A Trust-Centric Federated Edge Learning Paradigm in Healthcare for Decentralized Threat Intelligence Sharing
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1