Table 8.
Security and privacy aspects in the reviewed research works (RQ4)
Author | Confidentiality | Integrity | Threat model | Security evaluation | Privacy |
---|---|---|---|---|---|
Rajyashree et al. [11] | AES encryption | SHA256 hashing algorithm | No | No | Not considered |
Sinha et al. [37] | DES and AES encryption | SHA256 hashing algorithm | No | No | Not considered |
Singhal et al. [10] | Not considered | Not specified | No | No | Not considered |
Sundareswaran et al. [39] | AES Encryption | Not specified | No | Partial | Not considered |
Ullah et al. [41] | Not specified | Not specified | No | No | Considered, but not specified |
Bhaskaran et al. [42] | AES encryption | SHA-256 hashing algorithm | No | No | Considered: anonymity of relationships, consent and access control |
Hanbar et al. [9] | AES encryption | SHA-256 hashing algorithm | No | No | Considered: consent |
Parra-Moyano et al. [7] | Not specified | Not specified | No | No | Considered: unlikability between users and organisations |
Thoroddsen et al. [8] | Not specified | SHA-256 hashing algorithm | No | No | Considered: unlikability between users and organisations |
George et al. [44] | Not specified | Not specified | No | No | Not considered |
Rofiq et al. [45] | Not considered | Not considered | No | No | Not considered |
Schlatt et al. [46] | Not specified | Not specified | No | No | Considered: full control and data minimisation |