Security and Privacy in Online Social Networks: A Survey
Journal Title: EAI Endorsed Transactions on Industrial Networks and Intelligent Systems - Year 2014, Vol 1, Issue 1
Abstract
The Online Social Networks (OSN) open a new vista serving millions of users and have reshaped the way people interacts. Unfortunately these networks are an emerging platform for cybercrimes such as sending malicious URLs, spams, etc. which causes a huge financial loss and social damage. In this paper, it is reviewed that OSN is a new cybercrime platform for threating agents because of the security pit falls in the existing centralised architecture and their driven functionalities. This article surveys the detailed analysis of the current state of the Online Social Networks in perspective of security and privacy issues. Additionally in this paper we presents various types of attacks that can be mounted via OSN and the defence measures against each of the attack. This literature also highlights on the types of vulnerabilities and threats in OSN. Significant threat categories and risks associated as well as a scope to circumventing these threats and vulnerabilities are also introduced.
Authors and Affiliations
Sudarshan Kudlur Satyanarayana, Keshav Sood, Yuan Tao, Shui Yu
Hybrid Simulation Using SAHISim Framework
Hybrid systems such as Cyber Physical Systems (CPS) are becoming more important with time. Apart from CPS there are many hybrid systems in nature. To perform a simulation based analysis of a hybrid system, a simulation f...
Modelling of stress field during Submerged Arc Weld surfacing taking into account heat of the weld and phase transformation effect
In work the model of stress calculation and analysis of stress field during single-pass SAW (Submerged Arc Welding) surfacing have been presented. In temperature field solution the temperature changes caused by the heat...
Merging OMG Standards in a General Modeling, Transformation, and Simulation Framework
Test-driven Agile Simulation (TAS) is a general-purpose approach that combines model-driven engineering, simulation, and testing techniques to improve overall quality for the development process. TAS focuses on the const...
Security-Reliability Analysis of Multi-hop LEACH Protocol with Fountain Codes and Cooperative Jamming
In this paper, we investigate trade-off between security and reliability of Fountain codes (FCs) based low-energy adaptive clustering hierarchy (LEACH) networks, where the encoded packets are sent to the destination by u...
Surfing the Internet-of-Things: Lightweight Access and Control ofWireless Sensor Networks Using Industrial Low Power Protocols
Internet-of-Things (IoT) is emerging to play an important role in the continued advancement of information and communication technologies. To accelerate industrial application developments, the use of web services for ne...