Security and Privacy in Online Social Networks: A Survey
Journal Title: EAI Endorsed Transactions on Industrial Networks and Intelligent Systems - Year 2014, Vol 1, Issue 1
Abstract
The Online Social Networks (OSN) open a new vista serving millions of users and have reshaped the way people interacts. Unfortunately these networks are an emerging platform for cybercrimes such as sending malicious URLs, spams, etc. which causes a huge financial loss and social damage. In this paper, it is reviewed that OSN is a new cybercrime platform for threating agents because of the security pit falls in the existing centralised architecture and their driven functionalities. This article surveys the detailed analysis of the current state of the Online Social Networks in perspective of security and privacy issues. Additionally in this paper we presents various types of attacks that can be mounted via OSN and the defence measures against each of the attack. This literature also highlights on the types of vulnerabilities and threats in OSN. Significant threat categories and risks associated as well as a scope to circumventing these threats and vulnerabilities are also introduced.
Authors and Affiliations
Sudarshan Kudlur Satyanarayana, Keshav Sood, Yuan Tao, Shui Yu
Hybrid Simulation Using SAHISim Framework
Hybrid systems such as Cyber Physical Systems (CPS) are becoming more important with time. Apart from CPS there are many hybrid systems in nature. To perform a simulation based analysis of a hybrid system, a simulation f...
A Proposal for a Multi-Agent based Synchronization Method for Distributed Generators in Micro-Grid Systems
A synchronization technique based on the Multi-Agent Systems approach, is proposed for a group of Distributed Generators belonging to a Micro-Grid. The Average Time Synchronization consensus algorithm is used. A detailed...
A Machine Vision Based Automatic Optical Inspection System for Detecting Defects of Rubber Keypads of Scanning Machine
In order to detect defective rubber keypads, factories have to devote massive manpower and financial resources. In this paper, a vision-based system for the detection of a number of rubber keypad defects is designed and...
An Investigation of Performance Analysis of Anomaly Detection Techniques for Big Data in SCADA Systems
Anomaly detection is an important aspect of data mining, where the main objective is to identify anomalous or unusual data from a given dataset. However, there is no formal categorization of application-specific anomaly...
Towards Data-Driven On-Demand Transport
On-demand transport has been disrupted by Uber and other providers, which are challenging the traditional approach adopted by taxi services. Instead of using fixed passenger pricing and driver payments, there is now the...