Security and Privacy in Online Social Networks: A Survey
Journal Title: EAI Endorsed Transactions on Industrial Networks and Intelligent Systems - Year 2014, Vol 1, Issue 1
Abstract
The Online Social Networks (OSN) open a new vista serving millions of users and have reshaped the way people interacts. Unfortunately these networks are an emerging platform for cybercrimes such as sending malicious URLs, spams, etc. which causes a huge financial loss and social damage. In this paper, it is reviewed that OSN is a new cybercrime platform for threating agents because of the security pit falls in the existing centralised architecture and their driven functionalities. This article surveys the detailed analysis of the current state of the Online Social Networks in perspective of security and privacy issues. Additionally in this paper we presents various types of attacks that can be mounted via OSN and the defence measures against each of the attack. This literature also highlights on the types of vulnerabilities and threats in OSN. Significant threat categories and risks associated as well as a scope to circumventing these threats and vulnerabilities are also introduced.
Authors and Affiliations
Sudarshan Kudlur Satyanarayana, Keshav Sood, Yuan Tao, Shui Yu
Improving Customer Behaviour Prediction with the Item2Item model in Recommender Systems
Recommender Systems are the most well-known applications in E-commerce sites. However, the trade-off between runtime and the accuracy in making recommendations is a big challenge. This work combines several traditional t...
Tele-Monitoring the Battery of an Electric Vehicle
Nowadays, transportation is one of the main air pollution sources and has a significant impact on human health and environmental quality. The electric vehicle is a zero emission vehicle powered by an electric motor with...
SMC-I with Approach Angle Method for Slip Suppression of Electric Vehicles
This study presents SMC-I (sliding mode control with integral action) with approach angle method applied to slip suppression problem of electric vehicles (EVs). In SMC, chattering phenomenon always occurs through high fr...
An Investigation of Performance Analysis of Anomaly Detection Techniques for Big Data in SCADA Systems
Anomaly detection is an important aspect of data mining, where the main objective is to identify anomalous or unusual data from a given dataset. However, there is no formal categorization of application-specific anomaly...
Cloud Based Mobile Network Sharing: A New Model
The tradition network sharing models on existing mobile architecture is a challenging for the mobile operator to cope the future competitive market while increasing average revenue per user. In fact, to sustain the futur...