Risk analysis of online social networks

Social networks are used as the communication network among the groups of people. In past few years several fields use the structure of social network and utilize it. But there are many threats and challenges associated with these networks. These threats disclose the personal information of the users and use that information for unauthorized and malicious purposes. One of the great revolutions in the field of online social networking is online health social network, which is a sub branch of ordinary social network. OHSNs are used for enhancement in the field of health care issues and improvise the better solution for those issues. In this paper we discuss security issues and privacy risk which harm the online social network user. In addition we survey the existing defense mechanism and also propose the better protection and security ideas for online social network users. Furthermore we advise future research directions.

[1]  John Braun,et al.  Internet security , 2001 .

[2]  A. Acquisti,et al.  Privacy in the Age of Augmented Reality , 2011 .

[3]  Krishna P. Gummadi,et al.  You are who you know: inferring user profiles in online social networks , 2010, WSDM '10.

[4]  Bobby Bhattacharjee,et al.  Persona: an online social network with user-defined privacy , 2009, SIGCOMM '09.

[5]  Leyla Bilge,et al.  All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.

[6]  D. Boyd Social Network Sites: Public Private or What? , 2007 .

[7]  Wenke Lee,et al.  xBook: Redesigning Privacy Control in Social Networking Platforms , 2009, USENIX Security Symposium.

[8]  Deveeshree Nayak,et al.  Information privacy risk assessment of Facebook Graph Search , 2014, 2014 Science and Information Conference.

[9]  Jun Hu,et al.  Security Issues in Online Social Networks , 2011, IEEE Internet Computing.

[10]  Yan Lindsay Sun,et al.  Securing Digital Reputation in Online Social Media [Applications Corner] , 2014, IEEE Signal Processing Magazine.

[11]  Ronald J. Deibert,et al.  Hacking Networks of Terror , 2002 .

[12]  C.-C. Jay Kuo,et al.  Security and privacy in online social networks: A survey , 2011, 2011 IEEE International Conference on Multimedia and Expo.

[13]  Nour E. Oweis,et al.  A survey of Internet security risk over social networks , 2014, 2014 6th International Conference on Computer Science and Information Technology (CSIT).

[14]  Balachander Krishnamurthy,et al.  On the leakage of personally identifiable information via online social networks , 2009, CCRV.

[15]  Monis Akhlaq,et al.  Social networks and web security: Implications on open source intelligence , 2013, 2013 2nd National Conference on Information Assurance (NCIA).

[16]  Yada Zhu,et al.  Social Phishing , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..

[17]  Peter Pecho,et al.  Social Networks Security , 2009, 2009 Third International Conference on Emerging Security Information, Systems and Technologies.

[18]  Khaled El Emam,et al.  Risk-Based De-Identification of Health Data , 2010, IEEE Secur. Priv..

[19]  Mazdak Zamani,et al.  Security Threats in Online Social Networks , 2013, 2013 International Conference on Informatics and Creative Multimedia.

[20]  B. Yener,et al.  Internet Security , 2003 .

[21]  Yuval Elovici,et al.  Online Social Networks: Threats and Solutions , 2013, IEEE Communications Surveys & Tutorials.

[22]  Yin Pan,et al.  A social approach to security: Using social networks to help detect malicious web content , 2010, 2010 IEEE International Conference on Intelligent Systems and Knowledge Engineering.

[23]  John C. Mitchell,et al.  Client-Side Defense Against Web-Based Identity Theft , 2004, NDSS.

[24]  Xi Chen,et al.  Privacy Issues and Solutions in Social Network Sites , 2012, IEEE Technology and Society Magazine.

[25]  Shui Yu,et al.  Security and Privacy in Online Social Networks: A Survey , 2014, EAI Endorsed Trans. Ind. Networks Intell. Syst..

[26]  Alec Wolman,et al.  Lockr: better privacy for social networks , 2009, CoNEXT '09.

[27]  Michael Kaminsky,et al.  SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.

[28]  Yuguang Fang,et al.  Privacy and security for online social networks: challenges and opportunities , 2010, IEEE Network.

[29]  Abdul Halim Zaim,et al.  An Approach for Protecting Privacy on Social Networks , 2010, 2010 Fifth International Conference on Systems and Networks Communications.

[30]  Lorenzo Martino,et al.  Content Analysis of Privacy Policies for Health Social Networks , 2012, 2012 IEEE International Symposium on Policies for Distributed Systems and Networks.

[31]  Jingquan Li,et al.  Data Protection in Healthcare Social Networks , 2014, IEEE Software.

[32]  Wei Xu,et al.  Toward worm detection in online social networks , 2010, ACSAC '10.