Social Networking : Security , Privacy , and Applications By

نویسندگان

  • Sonia Jahid
  • SONIA JAHID
  • Indranil Gupta
چکیده

Online social networks have become ubiquitous and changed the way that users interact online. There has been an enormous growth in the usage of online social networking in the past few years as users share a variety of information including personal profiles, pictures, and messages to socialize with their friends in the Internet. Besides, several special purpose social networks have emerged to serve their users with useful functionalities. This vast amount of user data is valuable, and therefore, introduce several security and privacy risks and challenges. In this thesis we propose several techniques to enhance the security and privacy features of online social networks. Our goal is to shift the control over user data from a centralized social network provider to the end users. We realize this concept by decentralization of the social networking architecture. First, we construct and implement a cryptographic access control mechanism that ensures data confidentiality and integrity, and efficiently supports the fine-grained access policies expected by social network users. Next, we present a detailed design of a decentralized online social network that focuses on security and privacy. Finally, we propose and implement auditable anonymity, a cryptographic scheme, which allows a social networking user to keep track of who accesses her data even when her data is encrypted and decentralized, without revealing this information to the storage provider.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Sudy on Information Privacy Issue on Social Networks

In the recent years, social networks (SN) are now employed for communication and networking, socializing, marketing, as well as one’s daily life. Billions of people in the world are connected though various SN platforms and applications, which results in generating massive amount of data online. This includes personal data or Personally Identifiable Information (PII). While more and more data a...

متن کامل

Paradigm Shift in the Security-n-Privacy Implementation of Semi-Distributed Online Social Networking

Social Networking Applications has gained tremendous response from all the sections of people across the entire world from last few years. Social networking has crossed all the boundaries and glued whole world population together. Users of OSN (Online Social Networking) sites can re-connect with school friends, find some activity or even life partners, and make new friends. OSN has also revolut...

متن کامل

Security and privacy in business networking

Business networking relies on application-specific quantity and quality of information in order to support social infrastructures in, e.g., energy allocation coordinated by smart grids, healthcare services with electronic health records, traffic management with personal sensors, RFID in retail and logistics, or integration of individuals’ social network information into good, services, and resc...

متن کامل

xBook: Redesigning Privacy Control in Social Networking Platforms

Social networking websites have recently evolved from being service providers to platforms for running third party applications. Users have typically trusted the social networking sites with personal data, and assume that their privacy preferences are correctly enforced. However, they are now being asked to trust each third-party application they use in a similar manner. This has left the users...

متن کامل

Web 2.0 Technologies and Social Networking Security Fears in Enterprises

Web 2.0 systems have drawn the attention of corporation, many of which now seek to adopt Web 2.0 technologies and transfer its benefits to their organizations. However, with the number of different social networking platforms appearing, privacy and security continuously has to be taken into account and looked at from different perspectives. This paper presents the most common security risks fac...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013