A Secure and Privacy-Preserving Approach to Protect User Data across Cloud based Online Social Networks

Author(s):  
Neelu khare ◽  
Kumaran U.

The tremendous growth of social networking systems enables the active participation of a wide variety of users. This has led to an increased probability of security and privacy concerns. In order to solve the issue, the article defines a secure and privacy-preserving approach to protect user data across Cloud-based online social networks. The proposed approach models social networks as a directed graph, such that a user can share sensitive information with other users only if there exists a directed edge from one user to another. The connectivity between data users data is efficiently shared using an attribute-based encryption (ABE) with different data access levels. The proposed ABE technique makes use of a trapdoor function to re-encrypt the data without the use of proxy re-encryption techniques. Experimental evaluation states that the proposed approach provides comparatively better results than the existing techniques.

Author(s):  
Neelu khare ◽  
Kumaran U.

The tremendous growth of social networking systems enables the active participation of a wide variety of users. This has led to an increased probability of security and privacy concerns. In order to solve the issue, the article defines a secure and privacy-preserving approach to protect user data across Cloud-based online social networks. The proposed approach models social networks as a directed graph, such that a user can share sensitive information with other users only if there exists a directed edge from one user to another. The connectivity between data users data is efficiently shared using an attribute-based encryption (ABE) with different data access levels. The proposed ABE technique makes use of a trapdoor function to re-encrypt the data without the use of proxy re-encryption techniques. Experimental evaluation states that the proposed approach provides comparatively better results than the existing techniques.


2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Baodong Wen ◽  
Yujue Wang ◽  
Yong Ding ◽  
Haibin Zheng ◽  
Hai Liang ◽  
...  

Data supervision is an effective method to ensure the legality of user data on blockchain. However, the massive growth of data makes it difficult to achieve data supervision in existing blockchain applications. Also, data supervision often leads to problems such as disclosure of transaction data and user privacy information. To address these issues, this paper proposes a privacy-preserving blockchain supervision system (BSS) in the multiparty setting, where a supervision chain is introduced to realize data supervision on blockchain. All sensitive information such as user information in the supervising data is encrypted by the attribute-based encryption (ABE) technology, so that both privacy protection and access control on user data can be achieved. Theoretical analysis and comparison show that the proposed BSS scheme is efficient, and experimental analysis indicates the practicality of our BSS scheme.


2019 ◽  
Vol 8 (2) ◽  
pp. 6-8
Author(s):  
K. Jayabalan ◽  
B. Subramani

Online social networks (OSNs) are playing crucial role in digital world today. OSNs are web applications that allow users to share their personal information, digital images and videos, and to inform others about online or real time world activities and events with people in their network. OSN’s are decentralized and distributed computer networks where users communicate with their friends and relatives through Internet services. The Smartphone has increase the situation for hacker’s to attacks end user data from OSNs. Behaviors of OSN users has been monitored for data analytics[1]. In this paper, we represent full review of the applications, different security level threats and privacy issues, which threaten the well-being of OSN users in general, and children in particular. In addition, we present an overview of existing solutions that can provide better protection, security, and privacy for OSN users[2]. We also offer few recommendations for OSN users, which can improve their security and privacy when using the online social networks.


Author(s):  
Balamurugan. R ◽  
Dhivakar. M ◽  
Muruganantham. G ◽  
Ramprakash. S

This survey places of interest the major issues concerning privacy and security in online social networks. Firstly, we discuss investigate that aims to protect user data from the an assortment of attack vantage points together with other users, advertisers, third party request developers, and the online social arrangement provider itself. Next we cover social network supposition of user attributes, locate hubs, and link prediction. Because online social networks are so saturated with sensitive information, network inference plays a major privacy role. Social Networking sites go upwards since of all these reasons. In recent years indicates that for many people they are now the mainstream communication knowledge. Social networking sites come under few of the most frequently browsed categories websites in the world. Nevertheless Social Networking sites are also vulnerable to various problems threats and attacks such as revelation of information, identity thefts etc. Privacy practice in social networking sites often appear convoluted as in sequence sharing stands in discord with the need to reduce disclosure-related abuses. Facebook is one such most popular and widely used Social Networking sites which have its own healthy set of Privacy policy.


Author(s):  
P. Sudheer ◽  
T. Lakshmi Surekha

Cloud computing is a revolutionary computing paradigm, which enables flexible, on-demand, and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns emerge from it. Various schemes based on the attribute-based encryption have been to secure the cloud storage. Data content privacy. A semi anonymous privilege control scheme AnonyControl to address not only the data privacy. But also the user identity privacy. AnonyControl decentralizes the central authority to limit the identity leakage and thus achieves semi anonymity. The  Anonymity –F which fully prevent the identity leakage and achieve the full anonymity.


2018 ◽  
Vol 10 (12) ◽  
pp. 114 ◽  
Author(s):  
Shaukat Ali ◽  
Naveed Islam ◽  
Azhar Rauf ◽  
Ikram Din ◽  
Mohsen Guizani ◽  
...  

The advent of online social networks (OSN) has transformed a common passive reader into a content contributor. It has allowed users to share information and exchange opinions, and also express themselves in online virtual communities to interact with other users of similar interests. However, OSN have turned the social sphere of users into the commercial sphere. This should create a privacy and security issue for OSN users. OSN service providers collect the private and sensitive data of their customers that can be misused by data collectors, third parties, or by unauthorized users. In this paper, common security and privacy issues are explained along with recommendations to OSN users to protect themselves from these issues whenever they use social media.


2021 ◽  
Vol 29 (6) ◽  
pp. 0-0

Research on online social networks (OSNs) has focused overwhelmingly on their benefits and potential, with their negative effects overlooked. This study builds on the limited existing work on the so-called ‘dark side’ of using OSNs. The authors conducted a systematic review of selected databases and identified 46 negative effects of using OSNs from the users’ perspective, which is a rich spectrum of users’ negative experiences. This article then proposed nomenclature and taxonomy for the dark side of using OSNs by grouping these negative effects into six themes: cost of social exchange, cyberbullying, low performance, annoying content, privacy concerns and security threats. This study then conducted structured interviews with experts to confirm the sense-making and validity of the proposed taxonomy. This study discusses the confirmed taxonomy and outlines directions for future research.


2015 ◽  
Vol 19 (2) ◽  
pp. 58-63 ◽  
Author(s):  
Kaitai Liang ◽  
Joseph K. Liu ◽  
Rongxing Lu ◽  
Duncan S. Wong

Sign in / Sign up

Export Citation Format

Share Document