International Journal of P2P
Network Trends and Technology

Research Article | Open Access | Download PDF
Volume 2 | Issue 1 | Year 2012 | Article Id. IJPTT-V2I1P405 | DOI : https://doi.org/10.14445/22492615/IJPTT-V2I1P405

An Overview of Privacy and Security in SNS


Rashmi A.Zilpelwar, Rajneeshkaur K.Bedi, Vijay M.Wadhai

Citation :

Rashmi A.Zilpelwar, Rajneeshkaur K.Bedi, Vijay M.Wadhai, "An Overview of Privacy and Security in SNS," International Journal of P2P Network Trends and Technology (IJPTT), vol. 2, no. 1, pp. 14-17, 2012. Crossref, https://doi.org/10.14445/22492615/IJPTT-V2I1P405

Abstract

The use of Social Networking web sites and applications is rising day by day, many users are not properly informed of the risks associated with using these sites and application. User should understand these risks and challenges to avoid potential loss of private and personal information. Here we are examining the issues of security and privacy. There are many attacks possible on social networking sites and those can be used to collect social data in an automated fashion. Attackers can then make use of this data for large-scale attacks using context-aware spam and social phishing. Here we are discussing the feasibility of such attacks and simulate the impact on social networking sites. Frighteningly, all major social networking sites are susceptible to this attack because they fail to appropriately secure the network layer.

Keywords

Social Networking Sites.

References

[1] Boyd, D., Ellison, N., ―Social network sites: Definition, history, and scholarship, Journal of Computer Mediated Communication, Oct 2007, Vol 13, no 1, pp. 210-230. http: //jcmc.indiana.edu/vol13/issue1/boyd.ellison.html
[2] http://topsitesblog.com/list-of-social-networking-sites/
[3] http://medicallabtechnicianschool.org/2009/top-25- social-networking-sites-for-healthcare-medicalprofessionals/
[4] http://mp3.about.com/od/digitalmusicdelivery/tp/TopSocial-Music-Sites.html
[5] http://www.smashblogtips.com/10-top-business-socialnetworking-sites-on-the-web/
[6] Wikipedia, ―Social Network Service,‖ 2010; http://en.wikipedia.org/wiki/Social_network_service
[7] Zhang, C., Sun, J., Zhu, X., Fang, Y., ―Privacy and Security for online Social Networks: Challenges and Opportunities‖ , IEEE Network , July/August, 2010, pp 13-18.
[8] Furnell, S., Botha, R., ―Social networks – access all Areas?‖, Communications and Network Research, South Africa, May, 2011,pp 14-19.
[9] ―Facebook privacy settings to be made simpler‖. BBC News Online, 26 May, 2010.
[10] McKeon, M.
The Evolution of Privacy on Facebook. 2010. Accessed Feb 2011. http://mattmckeon.com/ facebook-privacy
[11] Freiert, M., ―Facebook vs LinkedIn –Network, Socialize, Be Professional?‖, Compete Pulse, 22 July 2008 , Accessed Feb 2011.
[12] Huber, M., Mulazzani, M., Kitzler, G., Gulch,S., Weippl,E. ―Friend-in-the-Middle Attacks-Exploiting Social Networking Sites for Spam.‖ IEEE Internet Computing, May/June, 2011, pp 28-34.
[13] Jones, H., Soltren,J., "Facebook: Threats to Privacy,", Dec, 2005, http://citeseerx.ist.psu.edu/viewdoc/summary?
[14] Brown, G., ―Social Networks and Context-Aware Spam,‖ Proc. ACM 2008 Conf. Computer Supported Cooperative Work, ACM Press, 2008, pp. 403–412.
[15] Huber, M., ―Friend-in-the-Middle Attacks‖, tech. report TR-SBA-Research-0710-01, SBA Research, 2010; www.sba-research.org/wp-content/uploads/publications/ FITM_TR-SBA-Research-0710-01.pdf.
[16] Kritzinger, E., Smith, E., "Information security management: An information security retrieval and awareness model for industry‖, Computers & Security, 2008, vol. 27, pp. 224-231.
[17] Rezgui,Y.,Marks,A. "Information security awareness in higher education: An exploratory study," Computers & Security, 2008,vol. 27, pp. 241-253
[18] Vorakulpipat, C., Marks, A., Rezgui, Y., Siwamogsatham, S., ‖Security and privacy Issues in Social Networking Sites from User's Viewpoint‖, IEEE, 2011.
[19] Vaidhyanathan, S., Welcome to the Surveillance Society‖, IEEE SPECTRUM. IEEE.ORG., June,2011, pp 49-51.
[20] Cutillo, L., Molva, R., ―Safebook: A Privacy-Preserving Online Social Network Leveraging on Real-Life Trust‖ IEEE Communications Magazine, December, 2009, pp 94-101.
[21] Black Hat; http://www.blackhat.com/html/bh-usa08/bhusa-08-archive.html
[22] Bilge, L., ―All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks,‖ 18th Int‘l. W3C, 2009.
[23] Boyd, D., ―Facebook‘s Privacy Trainwreck,‖ Convergence: Int‘l J. Research into New Media Tech., 2008, vol. 14, no. 1, pp. 13–20.
[24] Talukder, N., Ouzzani, M., Elmagarmid, A., Elmeleegy, H., Yakout, M., ―Privometer: Privacy Protection in Social Networks‖ ICDE Workshops, USA., 2010 IEEE, pp 266-269.
[25] Ghani, N., Sidek, Z., ―Hippocratic Database: A PrivacyAware Database‖ World Academy of Science, Engineering and Technology 42 2008, pp 549-543.