Wireless Communications and Mobile Computing

Wireless Communications and Mobile Computing / 2020 / Article
Special Issue

Mobile Intelligence Assisted by Data Analytics and Cognitive Computing 2020

View this Special Issue

Research Article | Open Access

Volume 2020 |Article ID 8888296 | https://doi.org/10.1155/2020/8888296

Tao Zhang, Kun Zhao, Ming Yang, Tilei Gao, Wanyu Xie, "Research on Privacy Security Risk Assessment Method of Mobile Commerce Based on Information Entropy and Markov", Wireless Communications and Mobile Computing, vol. 2020, Article ID 8888296, 11 pages, 2020. https://doi.org/10.1155/2020/8888296

Research on Privacy Security Risk Assessment Method of Mobile Commerce Based on Information Entropy and Markov

Academic Editor: Yin Zhang
Received31 May 2020
Revised11 Jun 2020
Accepted17 Jun 2020
Published07 Jul 2020

Abstract

To obtain precise personalized services in mobile commerce, the users have to disclose their personal information to the operator, which constitutes a potential threat to their privacy security. In this paper, a mobile commerce privacy security risk assessment model is established based on information entropy and Markov chain, and effective security risk measurement, and assessment method is put forward. Our method can provide accurate and quantitative results in assessing privacy disclosure risk to guide the users’ selection of safe mobile commerce applications and protect their privacy security.

1. Introduction

In the mobile internet age, mobile commerce (m-commerce for short) has gained a high market share by virtue of its portable characteristics, and various precise services like web access, e-shopping, tourism consumption, and near-field payment are rendered to the public. With the popularization of m-commerce, the users can access more and more precise services, but meanwhile, their privacy and security are facing serious threats [1]. To obtain and enjoy more precise personalized services, the users have to disclose more personal information to the service operator, and the operator requires more details of such information to maintain the operation of the commercial platform and render the so called diverse personalized services. Then, the private information of users may be disclosed, abused, stolen, or exposed to other risks when being acquired, used, transmitted, and stored by the operator, and multiple data, including social security number, credit card number, protected health information, and user name, may be disclosed unintentionally. Meanwhile, the private information can also be stolen via internal theft, external hacking, employee negligence, or in other ways. As learned by the Identity Theft Resource Center and the US Department of Health and Human Services, the top 10 data breaches of 2019, where more than 137 million records were leaked, were all related to the government, medical institutions, and corporate websites or apps [2]. The academia and industry are paying more attention to the security risk of users’ private information in mobile commerce.

At present, most researchers focus on the risk assessment of private information in information system, cloud computing, and big data, and the risk assessment of user private information disclosure in m-commerce is rarely studied. Given the vital importance of risk assessment for information security to the ecosystem and sustainable development of m-commerce platform [3], the risks of users’ private information in m-commerce are explored in this paper from the perspective of private information disclosure. Compared with the traditional information system security risk factors, the risk hierarchy structure of users’ privacy information in m-commerce is more complex. These risks include traditional information system security risk, user behavior risk, third-party application risk, and special risks of m-commerce services, like the risk in location-based services in mobile networks [4]. Therefore, in this paper, various risk factors are comprehensively analyzed by reference to some literature, and a risk indicator system for user private information disclosure in m-commerce is built based on the security model of information system [5]. Moreover, the privacy security of users is still assessed, and effective risk assessment model is built based on the theories of information entropy and Markov chain, to provide accurate risk assessment results to the users and protect their privacy security in m-commerce.

This paper can divided into the following parts: in Section 1, the background, content, and significance of the research are presented; in Section 2, we summarize and discuss the privacy security risk index, measurement and assessment methods in m-commerce are summarized and expounded, and the existing problems in the current researches on privacy security of m-commerce are revealed; in Section 3, we apply information entropy and Markov chain in the research of privacy security risk of m-commerce users, the user privacy security is described based on the information entropy, and the random state of privacy security risk of m-commerce is restored in accordance with Markov chain; in Section 4, a risk assessment model for m-commerce user privacy disclosure is established based on information entropy and Markov chain, effective assessment method is put forward, and the whole assessment process is specified; in Section 5, a detailed case study is carried out by substituting the proposed model into a specific m-commerce application, and the quantitative assessment results for three applications are presented and compared with each other. And finally, in Section 6, the research of this paper is summarized, and the future research direction is pinpointed.

Recent researches on privacy security risk of m-commerce can be generally classified into two aspects, identification of risk factor and method development for risk assessment.

2.1. Research on Risk Factors of User Privacy Disclosure

Risk assessment depends on the identification of risk factors. In order to properly define the privacy risks of m-commerce users, we conclude the risk factors that have been widely studied by researchers in Table 1.


Risk classesRisk factors

Technology riskData encryption; intrusion detection; authorization and authentication; access control; anonymisation; trajectory information hiding

Platform environmental riskData contribution agreement; secure routing protocol; legal or institutional requirements; diversity of privacy laws; mobile advertising attack; location service

Operator management riskPrivacy management mechanism; regulatory and disciplinary systems; insider threat; third party information collection

User vulnerability riskPrivacy awareness; privacy invasion experience; privacy association setting; simple password setting

Mobile terminal device riskSensitive data protection; taint tracking; privilege manage; detection of malicious events

2.1.1. Technology Risk

Shirazi and Iqbal [6] studied the community clouds in m-commerce and pointed out that the privacy security of users in m-commerce mainly relies on data encryption, intrusion detection, identity management, security awareness, privacy protocol, privacy principle, privacy practice, and effective database utilization. Erfan et al. [7] suggested that anonymous technology could help reduce the personal privacy risk of m-commerce users. Zhang et al. [8] proposed a security policy based on identity authentication and access control to protect private information stored in the edge cloud. Yosef and Mahmoud [9] analyzed the security issues at various levels of the cyber physical system (CPS) architecture and pointed out that to improve its safety, attention should be paid to the influence of relevant technologies, such as authentication, access control, data encryption, environment monitoring, security routing protocol, network access control, attack detection mechanism, and user authentication and authorization.

2.1.2. Platform Environmental Risk

According to literature [10, 11], location information was extremely sensitive in m-commerce, and the exposure of location information might cause the risk of information abuse in m-commerce. In reference [12], it was found that advertisements in m-commerce were intrusive to the users’ privacy, for the users’ location, and other information may be mandatorily acquired. Reference [13] reveals that users are required to accept some privacy clauses before using some m-commerce applications and have no autonomy over whether to share their own information in utilization.

2.1.3. User Vulnerability Risk

Ampong et al. [14] noted that privacy awareness, privacy concerns, and privacy intrusion experiences were important factors that affected the disclosure of user privacy. Reference [15] conducted a qualitative analysis of the privacy risk factors of social networks in the big data environment and suggested that privacy association setting, spatial location sharing, information behavior negligence, and simple password setting constituted the major user behavior risk factors.

2.1.4. Operator Management Risk

Tian et al. [16] believed that the privacy risks in the management of mobile apps included rigid legal or institutional requirements, imperfect standards for disclosure of privacy information, lack of regulatory and disciplinary systems, and malicious disclosure by internal personnel. In line with the Risk Evaluation Specification for Information Security (GB-T20984-2007) and the behavior characteristics of m-commerce users, Xiang et al. [17] incorporated into their risk evaluation index system such related factors as privacy management mechanism, platform privacy protection input, information sharing risk, third party information collection, and privacy legal differences.

2.1.5. Mobile Terminal Device Risk

In addition to the risk factors mentioned above, potential privacy risk may arise from the mobile terminal as well. Therefore, corresponding measures, including sensitive data protection [18, 19], smear tracking [20], authority management [21], and malicious event monitoring [22], need to be taken to ensure the security at the mobile terminal.

2.2. Research on Assessment Method for Privacy Security Risk

At present, fruitful achievements have been made in the research of risk assessment, but only a few researches focus on privacy risk assessment, and researches on privacy assessment for m-commerce applications are rare. In references [2326], the risks were evaluated based on the concept of information entropy; a feasible program was proposed for the assessment of security risk in cloud computing, but the privacy security was not analyzed. In reference [27], a privacy-considered information security assessment model was built with the risk recommendation system based on the identifiability, context of use, quantity, sensitivity, and freshness of the personal identity information data. The likelihood of risk evaluation was calculated taking into account the impact assessment of existing control measures and risks, and privacy security was evaluated from the perspective of the frequency of risk occurrence. Oetzel and Spiekermann [28] proposed a system approach for privacy impact evaluation, and divided the entire privacy impact assessment (PIA) process into seven steps, namely, characterization of the system, definition of privacy objectives, evaluation of protection requirements, identification of threats, identification and recommendations of controls, evaluation of residual risks, and PIA documentation. Taking into account the new challenges of user privacy management, Lo et al. [29] worked out LRPdroid, a user privacy analysis framework for the Android platform, to detect the information leak and evaluate user privacy leak and privacy risks for applications installed on android-based mobile devices. These methods have significant reference value for the risk assessment of this paper. However, only a certain class of privacy security risk was evaluated with above methods, taking into account neither the interaction between various risks nor the risk characteristics of m-commerce applications.

In order to be able to put forward an effective m-commerce privacy security assessment method, this paper will collate relevant risk factors, establish a multilevel and multiangle assessment model, which constructs the hierarchy analysis model of privacy risk, uses information entropy to describe privacy risks, simulates and analyses a real risk environment of m-commerce application based on Markov chain, and realizes the effective assessment of the privacy security of m-commerce users. The privacy security risk assessment method proposed in this paper aim to provide a comprehensive method for the accurate and quantitative evaluation of privacy disclosure risk in real risk environment of m-commerce application.

3. Method Development for Risk Assessment Based on Information Entropy and Markov Chain

For the purpose of risk assessment, this paper proposes to integrate information entropy and Markov chain into the privacy risk assessment of m-commerce users; the framework of our work is shown in Figure 1.

As shown in Figure 1, our proposed assessment method is developed to integrate the works on the three parts.

3.1. Development of Risk Measurement Method Based on Information Entropy

Information entropy was proposed by Shannon in 1948. In Shannon’s theory, information entropy is measured by the well-known formula , where is the information source variable and is the probability of the information source. In information theory, information entropy is used to represent the amount of information content and quantify the uncertainty of things.

Privacy security is not so objective to be easily measured. However, with the method of information entropy, it can be described from the perspective between known to unknown, the two opposite extremes. That is, the privacy risks of users are described with the characteristics of information entropy uncertainty, as shown in Figure 2.

Figure 2(a) shows the mobile business environment with unknown risks , i.e., ; according to the information entropy theory, its entropy value will reach its maximum, , when all the risks occur with the same probability, that is . This idea also suggests that the higher the user privacy risk uncertainty, the lower the controllability of the risks, and the lower the security.

Figure 2(b) shows the opposite case, when there is only one unknown risk in the m-commerce environment and the other risks are controllable, the entropy value will reach its minimum according to the information entropy theory, indicating that the lower the privacy security risk uncertainty of the application, the higher the security, namely, the risk is substantially controllable.

3.2. Simulation of Risk Environment Based on Markov Chain

Markov chain [30, 31] is a discrete time random process of continuous transition from one state to another in the finite state space. It can describe the state space of the change of state of things and calculate the probability of occurrence of each random state of things by establishing Markov chain transfer matrix.

In addition to effective risk measurement method, the user privacy disclosure risk of m-commerce still needs to be assessed, and the random state in the practical application shall be analyzed, so as to ensure the validity of the assessment results. Therefore, the complex environment of user privacy disclosure risk in m-commerce is described in line with Markov chain, to achieve effective assessment of the user privacy security based on the practical conditions.

Assuming that there are risk factors in an m-commerce environment, according to Markov chain, this complex risk environment can be described as the following matrix taking into account the mutual influence between every two factors:

Matrix is an m-commerce privacy risk matrix, where the elements on the diagonal line represent the separate occurrence of risk factors , and represent simultaneous occurrence of risk factors and in the actual application process. The matrix R represents the complex privacy risk environment of m-commerce users by mathematical method, which provides a guarantee for the simulation analysis of this paper.

3.3. Construction of Risk Hierarchy

In the above discussions, we outline a method for descripting the privacy risk based on information entropy, and we develop a Markov matrix to simulate the complexity of risk environment for m-commerce. In our framework, it is still necessary to further establish a risk hierarchy to allow for multidimensional and multilevel simulation analysis of m-commerce user privacy risk, which is shown in Figure 3.

This hierarchy consists of three levels, target level A, risk class level β, and risk factor level X. Each risk class includes multiple risk factors . Different from the traditional user privacy risk analysis, our proposed analyzing framework presents a cross relationship between risk factors and risk class, which is more consistent with the real risk environment of m-commerce.

3.4. Development of the Proposed Assessment Method

A bottom-up process is used to the hierarchy in our method. In the following discussions, we use to represent the probability of occurrence of risk at level 3, and normalization process is carried out based on the classified categories, to calculate the probabilities of risk occurrence under different categories, which are substituted into the matrix R to further obtain the state transition matrix of the m-commerce privacy.

The calculation process is as shown in the following example: it is assumed that there are two risk classes, namely, and , which include risk factors as shown in Table 2.


Risk classRisk factors included risk class


As shown in Table 1, class includes particular risk factor , class includes particular risk factor , while risk factor is included in both and , then their transition state matrix can be derived through calculation.

Similarly, according to formula (2), it is assumed that there are m risk classes and n risk factors in an m-commerce, then the privacy risk transfer matrix for this m-commerce application can be derived based on the classified classes.

It is assumed that in the long utilization, the steady-state probability of class is . It is a possible probability of a certain risk class in the long stable utilization and a stable probability calculated by the Markov method. According to this method, the relation between and sate transition matrix satisfies the following equation:

The occurrence probability of various risks in the longstable utilization of the m-commerce application can be derived by solving the Equation (3).

Therefore, the privacy risk assessment results of the entire m-commerce environment can be calculated by substituting into the following information entropy formula (5): where represents the entropy value for privacy security of the m-commerce users, and the greater its value, the lower the privacy security of the m-commerce. The entropy value of the risk class can be derived by normalizing the occurrence probability of risk factors included in such class following the information entropy calculation method, and the greater this value, the lower the privacy security of this risk class.

4. Integration of the Assessment Method

4.1. Risk Attribute Model for Privacy Disclosure of m-commerce Users

According to the assessment method proposed in Section 3, 24 risk evaluation indicators for privacy information disclosure of m-commerce users are selected, and these indicators are divided into 5 classes, i.e., technology risk, platform environmental risk, platform operation manage risk, user vulnerability risk, and mobile terminal device risk. According to the hierarchical structure in Figure 3, a hierarchical attribute model for privacy disclosure risk is built, as shown in Figure 4.

4.2. Measurement and Assessment of Privacy Disclosure Risks

Based on the m-commerce user privacy risk attribute model in Figure 4 and in accordance with the assessment method proposed herein, the detailed calculation process is as follows:

Step 1. Table 3 “the level of probability of risk factors occurrence” is prepared, and the occurrence probability level of the lowest-level risk factors is obtained through scoring by experts, and the values of obtained through normalization processing.

Step 2. Based on the hierarchical structure in Figure 4 and according to Markov chain, use Equation (2) to calculate the state transition matrix .

Step 3. Use Equation (4) to calculate the stability probability of various risks.

Step 4. Use formula (5) to calculate , so as to evaluate the privacy security of the entire m-commerce environment.

Step 5. Normalize the probability of occurrence of these risk factors to obtain their weight coefficients in different risk classes. Then, calculate various risk entropy in combination with the information entropy formula with the following. where is the number of risk factors included in risk class . The larger this value is, the more difficult it is to control such risks, and the greater the privacy security risk will be.


LevelDefinition and description

(8, 10)This factor has a great risk and a direct threat to the user’s privacy
(6, 8)This risk has a high probability of occurrence and exists in most m-commerce environments
(4, 6)This risk is a common risk, which exists in some m-commerce
(2, 4)This risk exists and only occurs when special conditions are met
(0, 2)This factor has high security and hardly causes user privacy risk

5. Case Study

5.1. Assessment Process

In order to verify the feasibility of the proposed method, three companies with different nature in m-commerce applications background are selected and assessed from bottom to top in details, where company A provides food delivery m-commerce service, company B provides financial m-commerce service, and company B provides map navigation service. The three applications all carry the users’ privacy data like information of finance, identity, location, and device. The assessment is specifically carried out for these three companies as follows:

Step 1. First of all, the bottom risk factors of three m-commerce applications are scored by a panel of 10 experts with AHP [32] method according to the definitions in Table 3. After the scoring is completed, the scores of 10 experts are summed up, averaged to obtain their level, and the level is further normalized to obtain the value of , and the results are shown in Table 4.

Step 2. Based on the hierarchical structure in Figure 4, the results of Table 4 are substituted into formula (2), to obtain the following state transition matrices , , and for privacy disclosure risk of m-commerce users of the three companies.

Step 3. The data in the above transition matrices are substituted into formula (4) to calculate the steady-state probability of various risks, as shown in Table 5.

Step 4. The calculated results of Table 5 are substituted into formula (5) to obtain the user privacy security evaluation results of three companies’ m-commerce applications, as shown in Table 6.

Step 5. The risk factors included in different risk classes are further normalized. The known risk classes and the contained risk factors are shown in Table 7.


CompanyRisk factor LevelRisk factor LevelRisk factor Level

A21.887%21.887%98.491%
21.887%21.887%98.491%
32.830%76.604%76.604%
32.830%76.604%65.660%
10.943%21.887%54.717%
10.943%32.830%43.774%
65.660%21.887%65.660%
65.660%76.604%43.774%

B22.000%22.000%99.000%
77.000%22.000%88.000%
33.000%33.000%99.000%
22.000%22.000%11.000%
22.000%55.000%55.000%
22.000%33.000%44.000%
44.000%22.000%77.000%
44.000%88.000%44.000%

C10.901%21.802%98.108%
10.901%21.802%98.108%
32.703%21.802%98.108%
21.802%98.108%21.802%
10.901%87.207%32.703%
98.108%32.703%43.604%
87.207%21.802%87.207%
32.703%76.306%43.604%


CompanyCompanyCompany

A0.159B0.119C0.135
0.1810.1630.172
0.1900.2030.192
0.2470.2770.266
0.2280.2470.242


CompanyRisk entropy

A2.307
B2.270
C2.288


Risk class Risk factor contained in

{}
{}
{}
{}
{}

Based on the division of Table 7, the level-2 risk classes of three different m-commerce companies are evaluated in this paper, and the calculated entropy values of various risks are shown in Figure 5.

5.2. Analysis of Assessment Results

According to the results of the assessment and the proposed risk hierarchy, the analysis is carried out level by level:

5.2.1. Analysis of Top-Level Evaluation Results

The comparison of Table 6 shows that , indicating that the food delivery m-commerce application of company A has higher privacy risk compared with the other two applications; on the contrary, company B’s financial m-commerce application enjoys the highest privacy security.

However, the privacy security evaluation results of the three companies are not very different in data size, indicating that on the whole, the three companies have similar privacy security performance and certain privacy and security factors.

5.2.2. Analysis of Middle-Level Evaluation Results

(1) Comparative Analysis of Steady-State Probability Results of Risk Classes. It is found in Table 5 that . This result shows that the three companies share one marked characteristic, namely, the value is the greatest, indicating that compared with other risk classes, user vulnerability risk is most likely to occur in the long utilization of m-commerce application. Secondly, the value of is great, which suggests that while user vulnerability risk can easily arise, the terminal device often causes security problems. On the contrary, the value of the technical risk is the smallest, which indicates that technology risk is not the main cause of the user’s privacy information security problem, and compared with other risk classes, it is not likely that the privacy security problems are caused by technology risk.

Thus, it can be seen that when m-commerce users disclose personal information in pursuit of personalized services provided by the m-commerce platform, there are mainly problems such as low awareness of privacy risks, numerous privacy association settings, insufficient experience in privacy invasion, and simple password setting, etc. The above situation poses a great threat to user privacy. Users should strengthen their awareness of privacy protection and improve their ability to deal with risks. While enjoying the convenience brought by m-commerce, users should also understand the risks and avoid excessive disclosure of their private information.

(2) Analysis of Comparison Results of Entropy Value of Risk Classes. Figure 5 shows that the values of the three companies are the greatest, indicating that it is most difficult to control the mobile terminal device risk.

Moreover, the evaluation results show high of company A and company C, indicating that when utilizing the m-commerce applications of these two companies, the users could hardly control their own privacy risk, giving rise to privacy security issues in these applications (take-away catering, map navigation). By contrast, the value of financial application is low, which suggests that the users’ behavior and operation are strictly regulated in such application, and its user risk is easier to control compared with other applications. This comparison shows that platform environment risk should be mainly blamed for the leakage of such application privacy information.

5.2.3. Analysis of Bottom-Level Evaluation Results

The above comparison shows that the user vulnerability risk has the highest probability of occurrence. There is an observation of the bottom factors of such risk class that the security problems of m-commerce applications are mainly caused by the users’ weak privacy risk awareness , excessive privacy association settings , the lack of privacy invasion experience , and simple password setting and so on.

In the financial application, the platform environment risk has the greater probability of occurrence, it is affected by , , , and so on. This result shows that the privacy security problem is mainly caused by the platform environment risk factors such as the data sharing agreement with the users , the security routing agreement , the formulation of privacy law , and so on.

5.3. Suggestions and Remarks

It is well known that it is not feasible to only improve the privacy security of m-commerce users by the use of technique tools. The current risk problems mainly arise from the weak privacy security awareness of users, and the security issues of m-commerce applications will not be effectively solved until the users are more aware of and better understand the privacy security issues. For this purpose, the operator should more diligently remind the users on privacy security in the utilization of m-commerce applications, standardize their relevant operation as much as possible, and urge them to take security protection measures. On the other hand, for some financial applications, more explicit confidentiality agreement shall be signed with the users, the access to the users’ permission shall be reduced, relevant responsibilities shall be clarified, and guarantee the information security of the users through laws and regulations.

6. Conclusions

In this paper, the risk factors of user privacy disclosure in m-commerce are reviewed, the magnitude of risks is measured based on information entropy, to provide effective data support for risk assessment. We have detailed discussed the complexity of user privacy risk in the real environment, and a complete assessment model for user privacy disclosure risks is established, and reasonable risk measurement and assessment methods are proposed based on Markov chain. In addition, a detailed comparative analysis is carried out based on the actual application that can provide practical reference for the protection of the privacy security of m-commerce users, and enrich and improve the relevant research theory of user privacy security. In the future research, with the update of the m-commerce application service, it is necessary to keep track of the latest research theories and further improve the attribute model of the user privacy risk. Moreover, the risks can be divided in line with actual application into more classes, which can be selected based on relevant risk factors, to realize more accurate assessment and research on user privacy security.

Data Availability

The expert scoring data used to support the findings of this study are included within the article.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.

Acknowledgments

This work was supported by the National Natural Science Foundation Project (No. 71462036), Yunnan Basic Applied Research Program (No. 2017FD130), the Scientific Research Foundation of Yunnan Education Department (No. 2020J0377, No. 2020J0392, and No. 2020J0378), and School-level Project of Yunnan University of Finance and Economics (No. 2017D29, No. 2018B07, and No. 2018B08).

References

  1. C. Cao and X. Zhu, “Strong anonymous mobile payment against curious third-party provider,” Electronic Commerce Research, vol. 19, no. 3, pp. 501–520, 2019. View at: Publisher Site | Google Scholar
  2. Y. Lei, “The top 10 data breaches of 2019,” Computer Networks, vol. 46, no. 2, pp. 46-47, 2020. View at: Google Scholar
  3. Y. Z. Xu, J. L. Zhang, Y. Hua, and L. Y. Wang, “Dynamic Credit Risk Evaluation Method for E-Commerce Sellers Based on a Hybrid Artificial Intelligence Model,” Sustainability, vol. 11, no. 19, 2019. View at: Publisher Site | Google Scholar
  4. Y. Zhang, R. Wang, M. S. Hossain, M. F. Alhamid, and M. Guizani, “Heterogeneous Information Network-Based Content Caching in the Internet of Vehicles,” IEEE Transactions on Vehicular Technology, vol. 68, no. 10, pp. 10216–10226, 2019. View at: Publisher Site | Google Scholar
  5. Y. Wu, G. Feng, N. Wang, and H. Liang, “Game of information security investment: Impact of attack types and network vulnerability,” Expert Systems with Applications, vol. 42, no. 15-16, pp. 6132–6146, 2015. View at: Publisher Site | Google Scholar
  6. F. Shirazi and A. Iqbal, “Community clouds within M-commerce: a privacy by design perspective,” Journal of Cloud Computing, vol. 6, no. 1, 2017. View at: Publisher Site | Google Scholar
  7. E. Aghasian, S. Garg, and J. Montgomery, “A Privacy-Enhanced Friending Approach for Users on Multiple Online Social Networks,” Computers, vol. 7, no. 3, article 7030042, 2018. View at: Publisher Site | Google Scholar
  8. Y. Zhang, Y. Qian, M. S. H. Di Wu, A. Ghoneim, and M. Chen, “Emotion-Aware Multimedia Systems Security,” IEEE Transactions on Multimedia, vol. 21, no. 3, pp. 617–624, 2019. View at: Publisher Site | Google Scholar
  9. Y. Ashibani and Q. H. Mahmoud, “Cyber physical systems security: Analysis, challenges and solutions,” Computers and Security, vol. 68, pp. 81–97, 2017. View at: Publisher Site | Google Scholar
  10. H. Zhu, C. X. J. Ou, W. J. A. M. van den Heuvel, and H. Liu, “Privacy calculus and its utility for personalization services in e-commerce: An analysis of consumer decision-making,” Information and Management, vol. 54, no. 4, pp. 427–437, 2017. View at: Publisher Site | Google Scholar
  11. M. Fodor and A. Brem, “Do privacy concerns matter for Millennials? Results from an empirical analysis of location-based services adoption in Germany,” Computers in Human Behavior, vol. 53, pp. 344–353, 2015. View at: Publisher Site | Google Scholar
  12. V. M. Wottrich, E. A. van Reijmersdal, and E. G. Smit, “The privacy trade-off for mobile app downloads: The roles of app value, intrusiveness, and privacy concerns,” Decision Support Systems, vol. 106, pp. 44–52, 2018. View at: Publisher Site | Google Scholar
  13. A. Gutierrez, S. O'Leary, N. P. Rana, Y. K. Dwivedi, and T. Calle, “Using privacy calculus theory to explore entrepreneurial directions in mobile location-based advertising: Identifying intrusiveness as the critical risk factor,” Computers in Human Behavior, vol. 95, pp. 295–306, 2019. View at: Publisher Site | Google Scholar
  14. G. Ampong, A. Mensah, A. Adu, J. Addae, O. Omoregie, and K. Ofori, “Examining Self-Disclosure on Social Networking Sites: A Flow Theory and Privacy Perspective,” Behavioral Sciences, vol. 8, no. 6, pp. 58–75, 2018. View at: Publisher Site | Google Scholar
  15. G. Zhu, M. N. Feng, Y. Chen, and J. Y. Yang, “Research on Fuzzy Evaluation of Privacy Risk for Social Network in Big Data Environment,” Information Science, vol. 34, no. 9, pp. 94–98, 2016. View at: Google Scholar
  16. B. Tian, Y. S. Zheng, P. Y. Liu, and C. H. Li, “The evaluation index and empirical study on risk of privacy information disclosure of mobile APP users,” Library and Information Services, vol. 62, no. 19, pp. 101–110, 2018. View at: Google Scholar
  17. M. M. Xiang, X. W. Wang, R. N. Jia, and L. Wang, “Research on the Risk Evaluation of Consumers' Privacy Information Disclosure in Mobile Commerce,” Library and information service, vol. 62, no. 18, pp. 34–44, 2018. View at: Publisher Site | Google Scholar
  18. Y. Nan, Z. Yang, M. Yang et al., “Identifying User-Input Privacy in Mobile Applications at a Large Scale,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 3, pp. 647–661, 2017. View at: Publisher Site | Google Scholar
  19. Y. Zhang, X. Ma, J. Zhang, M. S. Hossain, G. Muhammad, and S. U. Amin, “Edge Intelligence in the Cognitive Internet of Things: Improving Sensitivity and Interactivity,” IEEE Network, vol. 33, no. 3, pp. 58–64, 2019. View at: Publisher Site | Google Scholar
  20. H. Li, B. Wang, W. Zhang, Q. Tang, and Y. L. Zhang, “X-Decaf : Detection of Cache File Leaks in Android Social Apps,” Journal of Electronics & Information Technology, vol. 39, no. 1, pp. 66–74, 2017. View at: Google Scholar
  21. Y. A. Tan, Y. Xue, C. Liang et al., “A root privilege management scheme with revocable authorization for Android devices,” Journal of Network and Computer Applications, vol. 107, pp. 69–82, 2018. View at: Publisher Site | Google Scholar
  22. A. Ruiz-Heras, P. García-Teodoro, and L. Sánchez-Casado, “ADroid: anomaly-based detection of malicious events in Android platforms,” International Journal of Information Security, vol. 16, no. 4, pp. 371–384, 2017. View at: Publisher Site | Google Scholar
  23. T. L. Gao, T. Li, R. Jiang, M. Yang, and R. Zhu, “Research on cloud service security measurement based on information entropy,” International Journal of Network Security, vol. 21, no. 6, pp. 1003–1013, 2019. View at: Publisher Site | Google Scholar
  24. M. Yang, R. Jiang, T. L. Gao, W. Y. Xie, and J. Wang, “Research on cloud computing security risk assessment based on information entropy and Markov chain,” International Journal of Network Security, vol. 20, no. 4, pp. 664–673, 2018. View at: Publisher Site | Google Scholar
  25. G. Tilei, L. Tong, Y. Ming, and J. Rong, “Research on a Trustworthiness Measurement Method of Cloud Service Construction Processes Based on Information Entropy,” Entropy, vol. 21, no. 5, 2019. View at: Publisher Site | Google Scholar
  26. J. Wang, J. Liu, and H. Zhang, “Access Control Based Resource Allocation in Cloud Computing Environment,” International Journal of Network Security, vol. 19, no. 2, pp. 236–243, 2017. View at: Publisher Site | Google Scholar
  27. Y. C. Wei, W. C. Wu, G. H. Lai, and Y. C. Chu, “pISRA: privacy considered information security risk assessment model,” The Journal of Supercomputing, vol. 76, no. 3, pp. 1468–1481, 2020. View at: Publisher Site | Google Scholar
  28. M. C. Oetzel and S. Spiekermann, “A systematic methodology for privacy impact assessments: a design science approach,” European Journal of Information Systems, vol. 23, no. 2, pp. 126–150, 2019. View at: Publisher Site | Google Scholar
  29. N.-W. Lo, K.-H. Yeh, and C.-Y. Fan, “Leakage Detection and Risk Assessment on Privacy for Android Applications: LRPdroid,” IEEE Systems Journal, vol. 10, no. 4, pp. 1361–1369, 2016. View at: Publisher Site | Google Scholar
  30. W. J. Stewart, Introduction to the numerical solutions of Markov chains, USA:Princeton University Press, Princeton, 1994.
  31. W. J. Stewart, Probability, Markov Chains, Queues, and Simulation: the Mathematical Basis of Performance Modeling. Princeton, Princeton University Press, Princeton,USA, 2009.
  32. M. Yang, T. B. Li, R. Jiang, T. L. Gao, and J. Wang, “Research on Model of Big Data Usability and Mining Strategy Based on AHP,” Computer Technology and Development, vol. 28, no. 5, pp. 51–58, 2018. View at: Google Scholar

Copyright © 2020 Tao Zhang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


More related articles

 PDF Download Citation Citation
 Download other formatsMore
 Order printed copiesOrder
Views305
Downloads379
Citations

Related articles

Article of the Year Award: Outstanding research contributions of 2020, as selected by our Chief Editors. Read the winning articles.