Social network security: Issues, challenges, threats, and solutions

被引:136
作者
Rathore, Shailendra [1 ]
Sharma, Pradip Kumar [1 ]
Loia, Vincenzo [2 ]
Jeong, Young-Sik [3 ]
Park, Jong Hyuk [1 ]
机构
[1] Seoul Natl Univ Sci & Technol SeoulTech, Dept Comp Sci & Engn, Seoul 01811, South Korea
[2] Univ Salerno, Dept Management & Innovat Syst, Fisciano, Italy
[3] Dongguk Univ, Dept Multimedia Engn, Seoul 04620, South Korea
关键词
Social network service; Security and privacy; Multimedia data; Security threats; ACCESS-CONTROL; PRIVACY POLICIES; DETECTION SYSTEM; SPAM DETECTION; MODEL; COMMUNITY; ATTACKS; TRUST; URLS;
D O I
10.1016/j.ins.2017.08.063
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Social networks are very popular in today's world. Millions of people use various forms of social networks as they allow individuals to connect with friends and family, and share private information. However, issues related to maintaining the privacy and security of a user's information can occur, especially when the user's uploaded content is multimedia, such as photos, videos, and audios. Uploaded multimedia content carries information that can be transmitted virally and almost instantaneously within a social networking site and beyond. In this paper, we present a comprehensive survey of different security and privacy threats that target every user of social networking sites. In addition, we separately focus on various threats that arise due to the sharing of multimedia content within a social networking site. We also discuss current state-of- the-art defense solutions that can protect social network users from these threats. We then present future direction and discuss some easy-to-apply response techniques to achieve the goal of a trustworthy and secure social network ecosystem. (C) 2017 Elsevier Inc. All rights reserved.
引用
收藏
页码:43 / 69
页数:27
相关论文
共 113 条
[1]  
Aggarwal A., 2012, eCrime Researchers Summit (eCrime), 2012, P1
[2]   A generic statistical approach for spam detection in Online Social Networks [J].
Ahmed, Faraz ;
Abulaish, Muhammad .
COMPUTER COMMUNICATIONS, 2013, 36 (10-11) :1120-1129
[3]   Graph based anomaly detection and description: a survey [J].
Akoglu, Leman ;
Tong, Hanghang ;
Koutra, Danai .
DATA MINING AND KNOWLEDGE DISCOVERY, 2015, 29 (03) :626-688
[4]  
Alattar A. M., 2015, MEDIA WATERMARKING S
[5]  
[Anonymous], 2010, P 3 ACM INT C WEB SE
[6]  
[Anonymous], 2013, 2013 10 INT C EL ENG
[7]  
[Anonymous], CORR
[8]  
[Anonymous], 2013, P 7 INT C UB INF MAN
[9]  
Backes J., 2011, ARXIV11122649, P1
[10]  
Barinka A., BAD DAY NEWSWEEK DEL