Abstract
An Online Social Network (OSN) is a platform to build social networks or social relations among people. The OSN’s allow users to share interests, activities, social details and professional details. Some of the OSN’s that are currently being used are Facebook, Twitter, Orkut etc. The major problem of social networks is providing privacy to the users. Social privacy, institutional privacy and surveillance are the key problems that are being faced by the OSN users. We developed a novel method to provide institutional privacy and surveillance to the OSN users. We introduced a new algorithm HSurveillance, which effectively implements the surveillance in OSN. The institutional privacy is provided to the users using locking mechanism. We believe that the proposed method will resolve the key security and privacy problems experienced by the OSN users.
3rd International Conference on Frontiers in Intelligent Computing, Theory and Application (FICTA-2014), 14th-15th November, Bhubaneswar, India.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Pelkola, D.: A Framework for Managing Privacy-Enhancing Technology. IEEE Software 29(3) (June 2012)
Jamali, M., Abolhassani, H.: Different Aspects of Social Network Analysis. In: IEEE/WIC/ACM International Conference on Web Intelligence (2006)
Frank, O., Strauss, D.: Markov graphs. Journal of the American Statistical Association 81, 832–842 (1986)
Wasserman, S., Pattison, P.: Logit models and logistic regression for social networks: I. An introduction to Markov graphs and p! Psychometric Society 61, 401–425 (1994)
Anderson, C., Wasserman, S., Crouch, B.: A p! primer: logit models for social networks. Social Networks 21, 37–66 (1999)
Cutillo, L.A., Molva, R., Strufe, T.: Privacy Preserving Social Networking Through Decentralization. In: IEEE WONS 2009, Sixth International Conference on Wireless On-Demand Network Systems and Services, February 2-4 (2009)
Bilge, L., Strufe, T., Balzarotti, D., Kirda, E.: All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks. In: WWW, April 20-24 (2009)
Jagatic, T., Johnson, N., Jakobsson, M., Menczer, F.: Social phishing. Communications of the ACM 50(10), 94–100 (2007)
Cutillo, L.A., Molva, R., Onen, M.: Analysis of Privacy in Online Social Networks from the Graph Theory Perspective. In: IEEE, Global Telecommunications Conference (GLOBECOM 2011), December 5-9 (2011)
Mitzenmacher, M., Upfal, E.: Probability and Computing: Randomized Algorithms and Probabilistic Analysis. Cambridge University Press (2005)
Malik, A.K., Dustdar, S.: Sharing and Privacy-Aware RBAC in Online Social Networks. In: IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing (2011)
Acquisti, A., Gross, R.: Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 36–58. Springer, Heidelberg (2006)
Wang, Y., Komanduri, S., Leon, P.G., Acquisti, G.N.A., Cranor, L.F.: I regretted the minute I pressed share: A Qualitative Study of Regrets on Facebook. In: Symposium on Usable Privacy and Security (SOUPS), July 20-22 (2011)
Ferraiolo, D., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed nist standard for role-based access control. ACM Transactions on Information and System Security 4(3), 224–274 (2001)
Luo, W., Liu, J., Liu, J., Fan, C.: An Analysis of Security in Social Networks. In: Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, December 12-14 (2009)
Gross, R., Acquisti, A.: Information Revelation and Privacy in Online Social Networks. In: Workshop on Privacy in the Electronic Society (WPES), November 7 (2005)
Rajalingam, M., Alomari, S.A., Sumar, P.: Prevention of Phishing Attacks Based on Discriminative Key Point Features of WebPages. International Journal of Computer Science and Security (IJCSS) 6(1) (2012)
Jakobsson, M., Stamm, S.: Invasive Browser Sniffing and Countermeasures. In: 15th International World Wide Web Conference, May 23-26 (2006)
Wondracek, G., Holz, T., Kirda, E., Kruegel, C.: A Practical Attack to De-anonymize Social Network Users. In: IEEE Symposium on Security and Privacy (SP), May 16-19 (2010)
Novak, E., Li, Q.: A Survey of Security and Privacy in Online Social Networks. College of William and Mary Computer Science Technical Report (2012)
Lee, R., Nia, R., Hsu, J., Levitt, K.N., Rowe, J., Wu, S.F., Ye, S.: Design and implementation of faith, an experimental system to intercept and manipulate online social informatics. In: IEEE International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 195–202 (July 2011)
Banks, L., Wu, S.F.: All Friends Are Not Created Equal: An Interaction Intensity Based Approach to Privacy in Online Social Networks. In: IEEE International Conference on Computational Science and Engineering, August 29-31 (2009)
Gurses, S., Diaz, C.: Two tales of privacy in online social networks. IEEE Security & Privacy 11(3), 29–37 (2013)
Shostack, A.: Experiences Threat Modeling at Microsoft. Microsoft (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Yaramasa, T., Kishore, G.K. (2015). Enhanced Privacy and Surveillance for Online Social Networks. In: Satapathy, S., Biswal, B., Udgata, S., Mandal, J. (eds) Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014. Advances in Intelligent Systems and Computing, vol 328. Springer, Cham. https://doi.org/10.1007/978-3-319-12012-6_21
Download citation
DOI: https://doi.org/10.1007/978-3-319-12012-6_21
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-12011-9
Online ISBN: 978-3-319-12012-6
eBook Packages: EngineeringEngineering (R0)