Security and Privacy in Online Social Networks: A Survey
Journal Title: EAI Endorsed Transactions on Industrial Networks and Intelligent Systems - Year 2014, Vol 1, Issue 1
Abstract
The Online Social Networks (OSN) open a new vista serving millions of users and have reshaped the way people interacts. Unfortunately these networks are an emerging platform for cybercrimes such as sending malicious URLs, spams, etc. which causes a huge financial loss and social damage. In this paper, it is reviewed that OSN is a new cybercrime platform for threating agents because of the security pit falls in the existing centralised architecture and their driven functionalities. This article surveys the detailed analysis of the current state of the Online Social Networks in perspective of security and privacy issues. Additionally in this paper we presents various types of attacks that can be mounted via OSN and the defence measures against each of the attack. This literature also highlights on the types of vulnerabilities and threats in OSN. Significant threat categories and risks associated as well as a scope to circumventing these threats and vulnerabilities are also introduced.
Authors and Affiliations
Sudarshan Kudlur Satyanarayana, Keshav Sood, Yuan Tao, Shui Yu
Bandit Learning with Concurrent Transmissions for Energy-Efficient Flooding in Sensor Networks
Concurrent transmissions, a novel communication paradigm, has been shown to eectively accomplish a reliable and energy-eÿcient flooding in low-power wireless networks. With multiple nodes exploiting a receive-and-forwar...
A Critical Review of the Routing Protocols in Opportunistic Networks
The goal of Opportunistic Networks (OppNets) is to enable message transmission in an infrastructure less environment where a reliable end-to-end connection between the hosts in not possible at all times. The role of OppN...
Mobile Application Search: A QoS-Aware and Tag-Based Approach
The availability of enormous numbers of mobile applications (apps) is driving demand for the means to search for, recommend, and manage apps. Existing search engines provide basic search functionalities that enable users...
Cloud Based Mobile Network Sharing: A New Model
The tradition network sharing models on existing mobile architecture is a challenging for the mobile operator to cope the future competitive market while increasing average revenue per user. In fact, to sustain the futur...
Comparative Study on Power Gating Techniques for Lower Power Delay Product, Smaller Power Loss, Faster Wakeup Time
The power gating is one of the most popular reduction leakage techniques. We make comparison among various power gating schemes in terms of power delay product, energy loss, and wake-up time using the 45-nm Predictive Te...