Trust management and data protection for online social networks

被引:3
作者
Thabit, Shehab [1 ]
LianShan, Yan [1 ]
Tao, Yao [2 ]
Abdullah, AL-badwi [1 ]
机构
[1] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu, Sichuan, Peoples R China
[2] Southwest Jiaotong Univ, Yantai Res Inst Next Generat Informat Technol, Yantai, Shandong, Peoples R China
关键词
DATA INJECTION ATTACKS; PRIVACY; ENCRYPTION; ALGORITHM;
D O I
10.1049/cmu2.12401
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Online social networks (OSNs) have been an integral aspect of daily life. Most people use OSNs such as Facebook and Twitter to communicate and exchange information. Numerous analytical methods have been applied to OSNs by active exploration of their graph structure, like clustering analyses for automatic online group detection and node impact analyses of awareness of influential nodes within social networks. On OSN, a large-scale attack was launched by creating a bogus profile and using it to propagate spam, malware, and phishing attacks. To overcome the above issues, we designed a trust management and data protection model (TM-A-DPM), in which the trust management identifies the trust factor accuracy to achieve confidentiality, integrity, and privacy. Experimental results determine the performance and computational efficiency as well as resolve the privacy threats such as data leakage and data forgery.
引用
收藏
页码:1355 / 1368
页数:14
相关论文
共 50 条
[31]   Predicting Teens' Privacy Management and Attitude Toward Data Protection on Social Media [J].
De Wolf, Ralf ;
Martens, Marijn ;
Vanden Abeele, Mariek ;
De Marez, Lieven .
CYBERPSYCHOLOGY BEHAVIOR AND SOCIAL NETWORKING, 2023, 26 (03) :153-160
[32]   Risk Analysis of Online Social Networks [J].
Kumar, Horesh ;
Jain, Shruti ;
Srivastava, Ritesh .
2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, :846-851
[33]   Online Social Networks: Threats and Solutions [J].
Fire, Michael ;
Goldschmidt, Roy ;
Elovici, Yuval .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (04) :2019-2036
[34]   Verifiable Outsourced Decryption of Encrypted Data From Heterogeneous Trust Networks [J].
Hahn, Changhee ;
Kim, Jongkil .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (22) :22559-22570
[35]   Privacy of Organization in Online Social Networks [J].
Singh, Priyanja ;
Shrivastava, Sarang .
RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 3, 2018, 709 :141-152
[36]   Preserving Privacy in Online Social Networks [J].
Raji, Fatemeh ;
Miri, Ali ;
Jazi, Mohammad Davarpanah .
FOUNDATIONS AND PRACTICE OF SECURITY, 2011, 6888 :1-+
[37]   Modeling Exposure in Online Social Networks [J].
Cortese, Andrew ;
Masoumzadeh, Amirreza .
2017 15TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2017, :327-336
[38]   Security Issues in Online Social Networks [J].
Gao, Hongyu ;
Hu, Jun ;
Huang, Tuo ;
Wang, Jingnan ;
Chen, Yan .
IEEE INTERNET COMPUTING, 2011, 15 (04) :56-63
[39]   A survey on decentralized Online Social Networks [J].
Paul, Thomas ;
Famulari, Antonino ;
Strufe, Thorsten .
COMPUTER NETWORKS, 2014, 75 :437-452
[40]   Location Privacy Protection on Social Networks [J].
Zhan, Justin ;
Fang, Xing .
SOCIAL COMPUTING, BEHAVIORAL-CULTURAL MODELING AND PREDICTION, 2011, 6589 :78-85