Skip to main content
. 2023 Apr 13:1–30. Online ahead of print. doi: 10.1007/s00607-023-01176-8

Table 8.

Security and privacy aspects in the reviewed research works (RQ4)

Author Confidentiality Integrity Threat model Security evaluation Privacy
Rajyashree et al. [11] AES encryption SHA256 hashing algorithm No No Not considered
Sinha et al. [37] DES and AES encryption SHA256 hashing algorithm No No Not considered
Singhal et al. [10] Not considered Not specified No No Not considered
Sundareswaran et al. [39] AES Encryption Not specified No Partial Not considered
Ullah et al. [41] Not specified Not specified No No Considered, but not specified
Bhaskaran et al. [42] AES encryption SHA-256 hashing algorithm No No Considered: anonymity of relationships, consent and access control
Hanbar et al. [9] AES encryption SHA-256 hashing algorithm No No Considered: consent
Parra-Moyano et al. [7] Not specified Not specified No No Considered: unlikability between users and organisations
Thoroddsen et al. [8] Not specified SHA-256 hashing algorithm No No Considered: unlikability between users and organisations
George et al. [44] Not specified Not specified No No Not considered
Rofiq et al. [45] Not considered Not considered No No Not considered
Schlatt et al. [46] Not specified Not specified No No Considered: full control and data minimisation