@article{ART003245101},
author={Dupyo Hong and Sung-Il Jang and Yong-Joon Joe and Dong-Myung Shin},
title={A Security Vulnerability Assessment of Personal Data Storage Technologies},
journal={Journal of Software Assessment and Valuation},
issn={2092-8114},
year={2025},
volume={21},
number={3},
pages={1-10}
TY - JOUR
AU - Dupyo Hong
AU - Sung-Il Jang
AU - Yong-Joon Joe
AU - Dong-Myung Shin
TI - A Security Vulnerability Assessment of Personal Data Storage Technologies
JO - Journal of Software Assessment and Valuation
PY - 2025
VL - 21
IS - 3
PB - Korea Software Assessment and Valuation Society
SP - 1
EP - 10
SN - 2092-8114
AB - Against the backdrop of shifts in the digital economy and data-sovereignty regulation, Personal Data Stores (PDS) have emerged as a viable alternative; however, limitations persist—most notably security vulnerabilities and a lack of empirical validation in operational settings. This work identifies three principal attack surfaces—(1) authentication and access control, (2) third-party applications, and (3) leakage and inference via repetitive/compound queries—and argues for systematic, quantitative evaluation aligned with market and policy developments. We propose a security architecture that counters each vector through composite proof–based access control, static analysis with permission re-confirmation, and context-aware query monitoring with response-precision control. Scenario-based analyses indicate effectiveness in preventing impersonation and privilege-escalation attempts, preempting malicious code ingress, and detecting query-driven inference attacks at an early stage. The approach strengthens data integrity, privacy, and user agency while aligning with domestic regulatory requirements such as data portability and purpose/Scope specification. The architecture is applicable across healthcare, education, and media, and is deployable alongside standardized APIs, and authentication frameworks to support real-world adoption.
KW - Personal Data Store;Web3.0;Solid project;Security Vulnerability;Data Sovereignty
DO -
UR -
ER -
Dupyo Hong, Sung-Il Jang, Yong-Joon Joe and Dong-Myung Shin. (2025). A Security Vulnerability Assessment of Personal Data Storage Technologies. Journal of Software Assessment and Valuation, 21(3), 1-10.
Dupyo Hong, Sung-Il Jang, Yong-Joon Joe and Dong-Myung Shin. 2025, "A Security Vulnerability Assessment of Personal Data Storage Technologies", Journal of Software Assessment and Valuation, vol.21, no.3 pp.1-10.
Dupyo Hong, Sung-Il Jang, Yong-Joon Joe, Dong-Myung Shin "A Security Vulnerability Assessment of Personal Data Storage Technologies" Journal of Software Assessment and Valuation 21.3 pp.1-10 (2025) : 1.
Dupyo Hong, Sung-Il Jang, Yong-Joon Joe, Dong-Myung Shin. A Security Vulnerability Assessment of Personal Data Storage Technologies. 2025; 21(3), 1-10.
Dupyo Hong, Sung-Il Jang, Yong-Joon Joe and Dong-Myung Shin. "A Security Vulnerability Assessment of Personal Data Storage Technologies" Journal of Software Assessment and Valuation 21, no.3 (2025) : 1-10.
Dupyo Hong; Sung-Il Jang; Yong-Joon Joe; Dong-Myung Shin. A Security Vulnerability Assessment of Personal Data Storage Technologies. Journal of Software Assessment and Valuation, 21(3), 1-10.
Dupyo Hong; Sung-Il Jang; Yong-Joon Joe; Dong-Myung Shin. A Security Vulnerability Assessment of Personal Data Storage Technologies. Journal of Software Assessment and Valuation. 2025; 21(3) 1-10.
Dupyo Hong, Sung-Il Jang, Yong-Joon Joe, Dong-Myung Shin. A Security Vulnerability Assessment of Personal Data Storage Technologies. 2025; 21(3), 1-10.
Dupyo Hong, Sung-Il Jang, Yong-Joon Joe and Dong-Myung Shin. "A Security Vulnerability Assessment of Personal Data Storage Technologies" Journal of Software Assessment and Valuation 21, no.3 (2025) : 1-10.