Open Access Open Access  Restricted Access Subscription Access

Research on Privacy Protection Strategies of Mobile Social Network Users


Affiliations
1 School of Management Science and Engineering, Anhui University of Finance & Economics, China
 

In order to protect mobile social network users' privacy information, and promote the healthy development of the mobile social industry, This paper studies the types and ways of user privacy disclosure in mobile social networks, and proposes the privacy protection strategies for users in mobile social networks from the aspects of formulating national laws and regulations, building and managing mobile platforms, improving privacy protection technologies and enhancing personal protection awareness. It also briefly introduces the development trend and future research of access control policies in mobile social network.

Keywords

Mobile Social Network, User Privacy, Privacy Policy, Access Control Model.
User
Notifications
Font Size

  • K. Khan, W. Goodridge, A Survey of Network-Based Security Attacks,International Journal of Advanced Networking and Applications, 10(5), 2019, 3981-3989.
  • P. S. Wang, Z. C. Wang, and T. Chen, Personalized privacy protecting model in mobile social network,Computers, Materials & Continua,59(2), 2019, 533-546.
  • G. Q. Jiang, Privacy-preserving algorithms and its applications in MSNS,Master diss, Donghua University, China,2016.
  • H. Shen, M. Zhang, and H. Wang, A lightweight privacy-preserving fair meeting location determination scheme,IEEE Internet of Things Journal,7(4), 2020, 3083-3093.
  • Z. Q. Feng, Research on Problems of Network privacy under the age of big data: From protection of the rights to personal choice - A Case Study of mobile social networking users,Master diss, Jilin University, China, 2016.
  • Y. J. Ren, Y. Leng, and F. J. Zhu, ‘Data storage mechanism based on blockchain with privacy protection in wireless body area network’. Sensors,19(10), 2019, 2395-2406.
  • L. S. Huang, M. M. Tian, and H. Huang, Preserving privacy in big data: a survey from the cryptographic perspective,Journal of software,26(4), 2015, 946-952.
  • Y. Cheng, J. Park and R. Shu, An access control model for mobile social networks using user-to-user relationships,IEEE Transactions on Dependable and Secure Computing,13(4), 2016, 424-436.

Abstract Views: 165

PDF Views: 1




  • Research on Privacy Protection Strategies of Mobile Social Network Users

Abstract Views: 165  |  PDF Views: 1

Authors

Pshwang Wang
School of Management Science and Engineering, Anhui University of Finance & Economics, China
Zecheng Wang
School of Management Science and Engineering, Anhui University of Finance & Economics, China

Abstract


In order to protect mobile social network users' privacy information, and promote the healthy development of the mobile social industry, This paper studies the types and ways of user privacy disclosure in mobile social networks, and proposes the privacy protection strategies for users in mobile social networks from the aspects of formulating national laws and regulations, building and managing mobile platforms, improving privacy protection technologies and enhancing personal protection awareness. It also briefly introduces the development trend and future research of access control policies in mobile social network.

Keywords


Mobile Social Network, User Privacy, Privacy Policy, Access Control Model.

References