Research Article | Open Access | Download PDF
Volume 2 | Issue 1 | Year 2012 | Article Id. IJPTT-V2I1P405 | DOI : https://doi.org/10.14445/22492615/IJPTT-V2I1P405An Overview of Privacy and Security in SNS
Rashmi A.Zilpelwar, Rajneeshkaur K.Bedi, Vijay M.Wadhai
Citation :
Rashmi A.Zilpelwar, Rajneeshkaur K.Bedi, Vijay M.Wadhai, "An Overview of Privacy and Security in SNS," International Journal of P2P Network Trends and Technology (IJPTT), vol. 2, no. 1, pp. 14-17, 2012. Crossref, https://doi.org/10.14445/22492615/IJPTT-V2I1P405
Abstract
The use of Social Networking web sites and
applications is rising day by day, many users are not properly informed of the
risks associated with using these sites and application. User should understand
these risks and challenges to avoid potential loss of private and personal
information. Here we are examining the issues of security and privacy. There
are many attacks possible on social networking sites and those can be used to
collect social data in an automated fashion. Attackers can then make use of this
data for large-scale attacks using context-aware spam and social phishing. Here
we are discussing the feasibility of such attacks and simulate the impact on
social networking sites. Frighteningly, all major social networking sites are
susceptible to this attack because they fail to appropriately secure the
network layer.
Keywords
Social Networking Sites.
References
[1] Boyd, D., Ellison, N., ―Social network sites: Definition,
history, and scholarship, Journal of Computer Mediated Communication, Oct 2007,
Vol 13, no 1, pp. 210-230. http:
//jcmc.indiana.edu/vol13/issue1/boyd.ellison.html
[2] http://topsitesblog.com/list-of-social-networking-sites/
[3] http://medicallabtechnicianschool.org/2009/top-25-
social-networking-sites-for-healthcare-medicalprofessionals/
[4] http://mp3.about.com/od/digitalmusicdelivery/tp/TopSocial-Music-Sites.html
[5] http://www.smashblogtips.com/10-top-business-socialnetworking-sites-on-the-web/
[6] Wikipedia, ―Social Network Service,‖ 2010; http://en.wikipedia.org/wiki/Social_network_service
[7] Zhang, C., Sun, J., Zhu, X., Fang, Y., ―Privacy and Security for online
Social Networks: Challenges and Opportunities‖ , IEEE Network , July/August,
2010, pp 13-18.
[8] Furnell, S., Botha, R., ―Social networks – access all Areas?‖,
Communications and Network Research, South Africa, May, 2011,pp 14-19.
[9] ―Facebook privacy settings to be made simpler‖. BBC News Online, 26 May,
2010.
[10] McKeon, M. ‗The Evolution of
Privacy on Facebook‘. 2010. Accessed
Feb 2011. http://mattmckeon.com/ facebook-privacy
[11] Freiert, M., ―Facebook
vs LinkedIn –Network, Socialize, Be Professional?‖, Compete Pulse, 22 July 2008
, Accessed Feb 2011.
[12] Huber, M.,
Mulazzani, M., Kitzler, G., Gulch,S., Weippl,E. ―Friend-in-the-Middle
Attacks-Exploiting Social Networking Sites for Spam.‖ IEEE Internet Computing,
May/June, 2011, pp 28-34.
[13] Jones, H., Soltren,J., "Facebook: Threats to Privacy,", Dec,
2005, http://citeseerx.ist.psu.edu/viewdoc/summary?
[14] Brown, G., ―Social Networks and Context-Aware Spam,‖ Proc. ACM 2008 Conf.
Computer Supported Cooperative Work, ACM Press, 2008, pp. 403–412.
[15] Huber, M., ―Friend-in-the-Middle Attacks‖, tech. report
TR-SBA-Research-0710-01, SBA Research, 2010;
www.sba-research.org/wp-content/uploads/publications/
FITM_TR-SBA-Research-0710-01.pdf.
[16] Kritzinger, E., Smith, E., "Information security management: An
information security retrieval and awareness model for industry‖, Computers
& Security, 2008, vol. 27, pp. 224-231.
[17] Rezgui,Y.,Marks,A. "Information security awareness in higher
education: An exploratory study," Computers & Security, 2008,vol. 27,
pp. 241-253
[18] Vorakulpipat, C., Marks, A., Rezgui, Y., Siwamogsatham, S., ‖Security and
privacy Issues in Social Networking Sites from User's Viewpoint‖, IEEE, 2011.
[19] Vaidhyanathan, S., Welcome to the Surveillance Society‖, IEEE SPECTRUM.
IEEE.ORG., June,2011, pp 49-51.
[20] Cutillo, L., Molva, R., ―Safebook: A Privacy-Preserving Online Social
Network Leveraging on Real-Life Trust‖ IEEE Communications Magazine, December,
2009, pp 94-101.
[21] Black Hat; http://www.blackhat.com/html/bh-usa08/bhusa-08-archive.html
[22] Bilge, L., ―All Your Contacts Are Belong to Us: Automated Identity Theft
Attacks on Social Networks,‖ 18th Int‘l. W3C, 2009.
[23] Boyd, D., ―Facebook‘s Privacy Trainwreck,‖ Convergence: Int‘l J. Research
into New Media Tech., 2008, vol. 14, no. 1, pp. 13–20.
[24] Talukder, N., Ouzzani, M., Elmagarmid, A., Elmeleegy, H., Yakout, M.,
―Privometer: Privacy Protection in Social Networks‖ ICDE Workshops, USA., 2010
IEEE, pp 266-269.
[25] Ghani, N., Sidek, Z., ―Hippocratic Database: A PrivacyAware Database‖
World Academy of Science, Engineering and Technology 42 2008, pp 549-543.