Security and Privacy in Social Networks

2010 ◽  
pp. 1706-1717
Author(s):  
Barbara Carminati ◽  
Elena Ferrari ◽  
Andrea Perego

Web-based social networks (WBSNs) are online communities that allow users to publish resources (e.g., personal data, annotations, blogs) and to establish relationships, possibly of a different type (“friend,” “colleague,” etc.) for purposes that may concern business, entertainment, religion, dating, and so forth. In the last few years, the usage and diffusion of WBSNs has been increasing, with about 300 Web sites collecting the information of more than 400 million registered users. As a result, the “net model” is today used more and more to communicate, share information, make decisions, and ‘do business’ by companies and organizations (Staab et al., 2005). Regardless of the purpose of a WBSN, one of the main reasons for participating in social networking is to share and exchange information with other users. Recently, thanks to the adoption of Semantic Web technologies such as FOAF and other RDF-based vocabularies (Brickley & Miller, 2005; Davis & Vitiello, 2005; Golbeck, 2004), accessing and disseminating information over multiple WBSNs has been made simpler (Ding, Zhou, Finin, & Joshi, 2005). If this has been quite a relevant improvement towards an easier sharing of information, it makes more urgent that content owners have control over information access. In fact, making available possibly sensitive and private data and resources implies that they can be used by third parties for purposes different from the intended ones. As a matter of fact, users’ personal data and resources are regularly exploited not only by companies for marketing purposes, but also by governments and institutions for tracking persons’ behaviors and opinions, and in the worst case, by online predators (Barnes, 2006).

Author(s):  
Barbara Carminati ◽  
Elena Ferrari ◽  
Andrea Perego

Web-based social networks (WBSNs) are online communities that allow users to publish resources (e.g., personal data, annotations, blogs) and to establish relationships, possibly of a different type (“friend,” “colleague,” etc.) for purposes that may concern business, entertainment, religion, dating, and so forth. In the last few years, the usage and diffusion of WBSNs has been increasing, with about 300 Web sites collecting the information of more than 400 million registered users. As a result, the “net model” is today used more and more to communicate, share information, make decisions, and ‘do business’ by companies and organizations (Staab et al., 2005). Regardless of the purpose of a WBSN, one of the main reasons for participating in social networking is to share and exchange information with other users. Recently, thanks to the adoption of Semantic Web technologies such as FOAF and other RDF-based vocabularies (Brickley & Miller, 2005; Davis & Vitiello, 2005; Golbeck, 2004), accessing and disseminating information over multiple WBSNs has been made simpler (Ding, Zhou, Finin, & Joshi, 2005). If this has been quite a relevant improvement towards an easier sharing of information, it makes more urgent that content owners have control over information access. In fact, making available possibly sensitive and private data and resources implies that they can be used by third parties for purposes different from the intended ones. As a matter of fact, users’ personal data and resources are regularly exploited not only by companies for marketing purposes, but also by governments and institutions for tracking persons’ behaviors and opinions, and in the worst case, by online predators (Barnes, 2006). It is then a challenging issue to devise security mechanisms for social networks, able to protect private information and regulate access to shared resources. In this article, besides providing an overview of the characteristics of the WBSN environment and its protection requirements, we illustrate the current approaches and future trends to social network security, with particular attention paid to the emerging technologies related to the so-called Web 2.0.


2014 ◽  
pp. 451-484
Author(s):  
Rula Sayaf ◽  
Dave Clarke

Access control is one of the crucial aspects in information systems security. Authorizing access to resources is a fundamental process to limit potential privacy violations and protect users. The nature of personal data in online social networks (OSNs) requires a high-level of security and privacy protection. Recently, OSN-specific access control models (ACMs) have been proposed to address the particular structure, functionality and the underlying privacy issues of OSNs. In this survey chapter, the essential aspects of access control and review the fundamental classical ACMs are introduced. The specific OSNs features and review the main categories of OSN-specific ACMs are highlighted. Within each category, the most prominent ACMs and their underlying mechanisms that contribute enhancing privacy of OSNs are surveyed. Toward the end, more advanced issues of access control in OSNs are discussed. Throughout the discussion, different models and highlight open problems are contrasted. Based on these problems, the chapter is concluded by proposing requirements for future ACMs.


2018 ◽  
pp. 978-1003
Author(s):  
Asmae El Kassiri ◽  
Fatima-Zahra Belouadha

The Online Social Networks (OSN) have a positive evolution due to the diversity of social media and the increase in the number of users. The revenue of the social media organizations is generated from the analysis of users' profiles and behaviors, knowing that surfers maintain several accounts on different OSNs. To satisfy its users, the social media organizations have initiated projects for ensuring interoperability to allow for users creating other accounts on other OSN using an initial account, and sharing content from one media to others. Believing that the future generations of Internet will be based on the semantic web technologies, multiple academic and industrial projects have emerged with the objective of modeling semantically the OSNs to ensure interoperability or data aggregation and analysis. In this chapter, we present related works and argue the necessity of a unified semantic model (USM) for OSNs; we introduce a kernel of a USM using standard social ontologies to support the principal social media and it can be extended to support other future social media.


Author(s):  
Federico Bergenti ◽  
Enrico Franchi ◽  
Agostino Poggi

In this chapter, the authors describe the relationships between multi-agent systems, social networks, and the Semantic Web within collaborative work; they also review how the integration of multi-agent systems and Semantic Web technologies and techniques can be used to enhance social networks at all scales. The chapter first provides a review of relevant work on the application of agent-based models and abstractions to the key ingredients of our work: collaborative systems, the Semantic Web, and social networks. Then, the chapter discusses the reasons current multi-agent systems and their foreseen evolution might be a fundamental means for the realization of the future Semantic Social Networks. Finally, some conclusions are drawn.


Author(s):  
Ralf Bruns ◽  
Jürgen Dunkel

We propose the software architecture of a new generation of advisory systems using Intelligent Agent and Semantic Web technologies. Multi-agent systems provide a well-suited paradigm to implement negotiation processes in consultancy situations. Intelligent software agents act as clients and advisors using their knowledge in order to assist human users. In the proposed architecture the domain knowledge is semantically modeled by means of XML-based ontology languages such as OWL. Using an inference engine the agents reason on base of their knowledge to make decisions or proposals. The agent knowledge consists of different types of data: on the one hand private data, which has to be protected against unauthorized access, and on the other hand publicly accessible data spread over different web sites. Comparable to a real consultancy situation, an agent only reveals sensitive private data if it is indispensable for finding a solution. In addition, depending on the actual consultancy situation each agent dynamically expands its knowledge base by accessing OWL knowledge sources from the Internet. The usefulness of our approach is proved by the implementation of an advisory system whose objective is to develop virtual student advisers that render support to university students in order to successfully organize und perform their studies.


Author(s):  
Rama Bastola ◽  
Subarna Shakya

Most of the existing software systems are web-based and interactive. Semantic Web Technologies further allows for organizing and encoding information meaningfully. It enables software agents to interpret the information. However, the representation of information in different format has made challenging to interoperate among the heterogeneous systems. The representation of heterogeneous system with common standards and vocabularies is an effective solution for interoperability. For this, development of domain ontology is required for common understanding of the concept. The research work is mainly focused on development of domain ontology for issuing Citizenship of Nepal as e-government is widely considered as a good example of heterogeneous system. Protégé is used as ontology editor and Web Ontology Language (OWL) is used for representation of the concepts. A hybrid methodology with Unified Modelling Language (UML) is used to get in-depth concept of the domain. The domain ontology is verified using built-in reasoner of Protégé and validated with answering competency questions of the domain using SPARQL query.


Author(s):  
José Moura ◽  
Carlos Serrão

This chapter revises the most important aspects in how computing infrastructures should be configured and intelligently managed to fulfill the most notably security aspects required by Big Data applications. One of them is privacy. It is a pertinent aspect to be addressed because users share more and more personal data and content through their devices and computers to social networks and public clouds. So, a secure framework to social networks is a very hot topic research. This last topic is addressed in one of the two sections of the current chapter with case studies. In addition, the traditional mechanisms to support security such as firewalls and demilitarized zones are not suitable to be applied in computing systems to support Big Data. SDN is an emergent management solution that could become a convenient mechanism to implement security in Big Data systems, as we show through a second case study at the end of the chapter. This also discusses current relevant work and identifies open issues.


Sign in / Sign up

Export Citation Format

Share Document