Security and Trust in Online Social Networks

Security and Trust in Online Social Networks

Author: Barbara Carminati

Publisher: Springer Nature

Published: 2022-05-31

Total Pages: 110

ISBN-13: 3031023390

DOWNLOAD EBOOK

The enormous success and diffusion that online social networks (OSNs) are encountering nowadays is vastly apparent. Users' social interactions now occur using online social media as communication channels; personal information and activities are easily exchanged both for recreational and business purposes in order to obtain social or economic advantages. In this scenario, OSNs are considered critical applications with respect to the security of users and their resources, for their characteristics alone: the large amount of personal information they manage, big economic upturn connected to their commercial use, strict interconnection among users and resources characterizing them, as well as user attitude to easily share private data and activities with strangers. In this book, we discuss three main research topics connected to security in online social networks: (i) trust management, because trust can be intended as a measure of the perception of security (in terms of risks/benefits) that users in an OSN have with respect to other (unknown/little-known) parties; (ii) controlled information sharing, because in OSNs, where personal information is not only connected to user profiles, but spans across users' social activities and interactions, users must be provided with the possibility to directly control information flows; and (iii) identity management, because OSNs are subjected more and more to malicious attacks that, with respect to traditional ones, have the advantage of being more effective by leveraging the social network as a new medium for reaching victims. For each of these research topics, in this book we provide both theoretical concepts as well as an overview of the main solutions that commercial/non-commercial actors have proposed over the years. We also discuss some of the most promising research directions in these fields.


Security and Privacy in Social Networks

Security and Privacy in Social Networks

Author: Yaniv Altshuler

Publisher: Springer Science & Business Media

Published: 2012-08-14

Total Pages: 254

ISBN-13: 1461441390

DOWNLOAD EBOOK

Security and Privacy in Social Networks brings to the forefront innovative approaches for analyzing and enhancing the security and privacy dimensions in online social networks, and is the first comprehensive attempt dedicated entirely to this field. In order to facilitate the transition of such methods from theory to mechanisms designed and deployed in existing online social networking services, the book aspires to create a common language between the researchers and practitioners of this new area- spanning from the theory of computational social sciences to conventional security and network engineering.


Privacy Risk Analysis of Online Social Networks

Privacy Risk Analysis of Online Social Networks

Author: Sourya Joyee De

Publisher: Springer Nature

Published: 2022-06-01

Total Pages: 95

ISBN-13: 3031023552

DOWNLOAD EBOOK

The social benefit derived from Online Social Networks (OSNs) can lure users to reveal unprecedented volumes of personal data to an online audience that is much less trustworthy than their offline social circle. Even if a user hides his personal data from some users and shares with others, privacy settings of OSNs may be bypassed, thus leading to various privacy harms such as identity theft, stalking, or discrimination. Therefore, users need to be assisted in understanding the privacy risks of their OSN profiles as well as managing their privacy settings so as to keep such risks in check, while still deriving the benefits of social network participation. This book presents to its readers how privacy risk analysis concepts such as privacy harms and risk sources can be used to develop mechanisms for privacy scoring of user profiles and for supporting users in privacy settings management in the context of OSNs. Privacy scoring helps detect and minimize the risks due to the dissemination and use of personal data. The book also discusses many open problems in this area to encourage further research.


Securecsocial: Secure Cloud-based Social Network

Securecsocial: Secure Cloud-based Social Network

Author: Atrey Pradeep

Publisher: World Scientific

Published: 2019-08-19

Total Pages: 160

ISBN-13: 9811205930

DOWNLOAD EBOOK

The use of online social networks (OSNs) has grown exponentially in recent years, and these OSNs continue to have an ever-increasing impact on human lives. There are many concerns regarding the privacy of users in these environments, such as how trustworthy the social network operators (SNOs) are.This book presents a way to tackle the security and privacy issues in current OSNs through a new framework for online social networking, based on distributed cloud-based datacenters (CDCs) and using Shamir's secret sharing (SSS) as the method of encrypting user profile data. The framework aims to fulfill two contradictory goals: maintaining the utility of an OSN and preserving privacy of its users. The key feature of the framework lies in relinquishing control of a central authority over user's data (which is what usually happens in the current OSNs, e.g. Facebook keeps all our data) and distributing it to multiple CDCs in encrypted form. The use of SSS ensures perfect security, which means that the security of data does not rely on any unproven computational assumptions.In this unique book, SNOs are considered as an adversary instead of external adversary. This paves the way for researchers to think beyond the privacy setting mechanism within an OSN to protect users' data.


Online Social Networks Security

Online Social Networks Security

Author: Brij B. Gupta

Publisher: CRC Press

Published: 2021-02-25

Total Pages: 121

ISBN-13: 1000347117

DOWNLOAD EBOOK

In recent years, virtual meeting technology has become a part of the everyday lives of more and more people, often with the help of global online social networks (OSNs). These help users to build both social and professional links on a worldwide scale. The sharing of information and opinions are important features of OSNs. Users can describe recent activities and interests, share photos, videos, applications, and much more. The use of OSNs has increased at a rapid rate. Google+, Facebook, Twitter, LinkedIn, Sina Weibo, VKontakte, and Mixi are all OSNs that have become the preferred way of communication for a vast number of daily active users. Users spend substantial amounts of time updating their information, communicating with other users, and browsing one another’s accounts. OSNs obliterate geographical distance and can breach economic barrier. This popularity has made OSNs a fascinating test bed for cyberattacks comprising Cross-Site Scripting, SQL injection, DDoS, phishing, spamming, fake profile, spammer, etc. OSNs security: Principles, Algorithm, Applications, and Perspectives describe various attacks, classifying them, explaining their consequences, and offering. It also highlights some key contributions related to the current defensive approaches. Moreover, it shows how machine-learning and deep-learning methods can mitigate attacks on OSNs. Different technological solutions that have been proposed are also discussed. The topics, methodologies, and outcomes included in this book will help readers learn the importance of incentives in any technical solution to handle attacks against OSNs. The best practices and guidelines will show how to implement various attack-mitigation methodologies.


Computational Social Networks

Computational Social Networks

Author: Ajith Abraham

Publisher: Springer Science & Business Media

Published: 2012-08-14

Total Pages: 352

ISBN-13: 1447140516

DOWNLOAD EBOOK

This book is the second of three volumes that illustrate the concept of social networks from a computational point of view. The book contains contributions from a international selection of world-class experts, concentrating on topics relating to security and privacy (the other two volumes review Tools, Perspectives, and Applications, and Mining and Visualization in CSNs). Topics and features: presents the latest advances in security and privacy issues in CSNs, and illustrates how both organizations and individuals can be protected from real-world threats; discusses the design and use of a wide range of computational tools and software for social network analysis; describes simulations of social networks, and the representation and analysis of social networks, with a focus on issues of security, privacy, and anonymization; provides experience reports, survey articles, and intelligence techniques and theories relating to specific problems in network technology.


Trust in Social Media

Trust in Social Media

Author: Jiliang Tang

Publisher: Morgan & Claypool Publishers

Published: 2015-09-23

Total Pages: 129

ISBN-13: 1627054057

DOWNLOAD EBOOK

Social media greatly enables people to participate in online activities and shatters the barrier for online users to create and share information at any place at any time. However, the explosion of user-generated content poses novel challenges for online users to find relevant information, or,


Always On

Always On

Author: Naomi S. Baron

Publisher: Oxford University Press

Published: 2010-03-03

Total Pages: 305

ISBN-13: 0199779805

DOWNLOAD EBOOK

In Always On, Naomi S. Baron reveals that online and mobile technologies--including instant messaging, cell phones, multitasking, Facebook, blogs, and wikis--are profoundly influencing how we read and write, speak and listen, but not in the ways we might suppose. Baron draws on a decade of research to provide an eye-opening look at language in an online and mobile world. She reveals for instance that email, IM, and text messaging have had surprisingly little impact on student writing. Electronic media has magnified the laid-back "whatever" attitude toward formal writing that young people everywhere have embraced, but it is not a cause of it. A more troubling trend, according to Baron, is the myriad ways in which we block incoming IMs, camouflage ourselves on Facebook, and use ring tones or caller ID to screen incoming calls on our mobile phones. Our ability to decide who to talk to, she argues, is likely to be among the most lasting influences that information technology has upon the ways we communicate with one another. Moreover, as more and more people are "always on" one technology or another--whether communicating, working, or just surfing the web or playing games--we have to ask what kind of people do we become, as individuals and as family members or friends, if the relationships we form must increasingly compete for our attention with digital media? Our 300-year-old written culture is on the verge of redefinition, Baron notes. It's up to us to determine how and when we use language technologies, and to weigh the personal and social benefits--and costs--of being "always on." This engaging and lucidly-crafted book gives us the tools for taking on these challenges.