Towards an Architecture-based Ensemble Methods for Online Social Network Sensitive Data Privacy Protection

Abstract - In 2014, the world woke up to a giant data breach that leveraged users’ personal information that was taken from one of the world’s biggest social network platform. Based on the literature, this was possible because of the Centralised Architectural-based Approach to protecting the privacy of users’ online data. Although the literature is inundated with decentralized approaches, there is none to the best of our knowledge that uses an ensemble of methods and draws on a consensus mechanism to address the challenges caused by the Centralised Architectural-based Approach. This paper presents a decentralized approach that adopts and adapts an ensemble of methods. These methods include cryptographic, hashing, and the plenum byzantine fault tolerance algorithms that present a consensus platform, protocol, and mechanism to use the technology of blockchain in a novel manner as a significant contribution. This paper adopts the descriptive approach in its presentation as the usable implementation of the presented proposal is near completion with issues of computational overhead addressed based on preliminary results that show promise of being able to support agreement up to ≈ 75% in terms of making changes by participants in the chain.

[1]  Jun Hu,et al.  Detecting and characterizing social spam campaigns , 2010, CCS '10.

[2]  Chenxu Wang,et al.  RPchain: A Blockchain-Based Academic Social Networking Service for Credible Reputation Building , 2018, ICBC.

[3]  Somanath Tripathy,et al.  InfoRest: Restricting Privacy Leakage to Online Social Network App , 2019, ArXiv.

[4]  Hamzeh Khazaei,et al.  Performance Evaluation of Blockchain Systems: A Systematic Survey , 2020, IEEE Access.

[5]  Emiliano De Cristofaro,et al.  Challenges in the Decentralised Web: The Mastodon Case , 2019, Internet Measurement Conference.

[6]  Mohcine Kodad Engagement and Performance Studies of Media Agencies Publications on Social Networks , 2020, Int. J. Recent Contributions Eng. Sci. IT.

[7]  Mehmet Hadi Gunes,et al.  POSN: A privacy preserving decentralized social network app for mobile devices , 2016, 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[8]  Catherine Dwyer Privacy in the Age of Google and Facebook , 2011, IEEE Technology and Society Magazine.

[9]  Akira Sato,et al.  ABnews: A Fast Private Social Messaging System Using Untrusted Storage and Attribute-Based Encryption , 2017, 2017 15th Annual Conference on Privacy, Security and Trust (PST).

[10]  Bernabe Batchakui,et al.  Reducing Disk Storage with SQLite into BitCoin Architecture , 2015, Int. J. Recent Contributions Eng. Sci. IT.

[11]  A. Srinivasan,et al.  Consensus-based modeling using distributed feature construction with ILP , 2018, Machine Learning.

[12]  Qassim Nasir,et al.  Performance Analysis of Hyperledger Fabric Platforms , 2018, Secur. Commun. Networks.

[13]  Jun Li,et al.  The Good Left Undone: Advances and Challenges in Decentralizing Online Social Networks , 2017, Comput. Commun..

[14]  Tatjana Welzer,et al.  A Model of Perception of Privacy, Trust, and Self-Disclosure on Online Social Networks , 2019, Entropy.

[15]  Yuan Tian,et al.  Anomaly detection over differential preserved privacy in online social networks , 2019, PloS one.

[16]  Benjamin Greschbach,et al.  The devil is in the metadata — New privacy challenges in Decentralised Online Social Networks , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops.

[17]  David Meerman Scott,et al.  The New Rules of Marketing & PR: How to Use Social Media, Online Video, Mobile Applications, Blogs, News Releases, and Viral Marketing to Reach Buyers Directly , 2011 .

[18]  Mohammad A. Hoque,et al.  Blockchain Consensus Algorithms: A Survey , 2020, 2001.07091.

[19]  Chul-Soo Kim,et al.  Privacy-aware blockchain for personal data sharing and tracking , 2019, Open Comput. Sci..

[20]  Tobias Dienlin,et al.  Control your Facebook: An analysis of online privacy literacy , 2016, Comput. Hum. Behav..

[21]  Bingfeng Ge,et al.  A consensus model for group decision making under interval type-2 fuzzy environment , 2016, Frontiers of Information Technology & Electronic Engineering.

[22]  Sonja Buchegger,et al.  A case for P2P infrastructure for social networks - opportunities & challenges , 2009, 2009 Sixth International Conference on Wireless On-Demand Network Systems and Services.

[23]  Renato J. O. Figueiredo,et al.  SAND: Social-aware, network-failure resilient, and decentralized microblogging system , 2019, Future Gener. Comput. Syst..

[24]  G. Nalinipriya,et al.  A survey on vulnerable attacks in online social networks , 2015, International Confernce on Innovation Information in Computing Technologies.

[26]  Fei Chao,et al.  A framework of blockchain-based secure and privacy-preserving E-government system , 2018, Wireless Networks.

[27]  Laura Ricci,et al.  A survey on privacy in decentralized online social networks , 2018, Comput. Sci. Rev..

[28]  S. Hudson,et al.  The influence of social media interactions on consumer–brand relationships: A three-country study of brand perceptions and marketing behaviors , 2016 .

[29]  Suporn Pongnumkul,et al.  Performance Analysis of Private Blockchain Platforms in Varying Workloads , 2017, 2017 26th International Conference on Computer Communication and Networks (ICCCN).

[30]  Charu Virmani,et al.  Blockchain-Based Social Network Infrastructure , 2020 .

[31]  Michael Friedewald,et al.  Citizens' perceptions of data protection and privacy in Europe , 2012, Comput. Law Secur. Rev..

[32]  Laura Ricci,et al.  Managing social contents in Decentralized Online Social Networks: A survey , 2018, Online Soc. Networks Media.

[33]  Brij B. Gupta,et al.  Social media security and trustworthiness: Overview and new direction , 2016, Future Gener. Comput. Syst..

[34]  Mohsen Guizani,et al.  Privacy and Security Issues in Online Social Networks , 2018, Future Internet.

[35]  Deepali Bhardwaj,et al.  The new rules of marketing and PR: How to use social media, online video, mobile applications, blogs, news releases, and viral marketing to reach buyers directly by David Merman Scott , 2017 .

[36]  Adriana Iamnitchi,et al.  A Survey on Privacy and Security in Online Social Networks , 2015, Online Soc. Networks Media.

[37]  Cynthia Alvarado,et al.  It’s Your Data: A Blockchain Solution to Facebook’s Data Stewardship Problem , 2018 .

[38]  Helena Rifà-Pous,et al.  Privacy Analysis on Microblogging Online Social Networks , 2019, ACM Comput. Surv..

[39]  Barbara Carminati,et al.  Decentralized privacy preserving services for Online Social Networks , 2018, Online Soc. Networks Media.

[40]  Shilpi Sharma,et al.  EncryptPost: A Framework for User Privacy on Social Networking Sites , 2016 .

[41]  Kesheng Wu,et al.  Consensus Ensemble System for Traffic Flow Prediction , 2018, IEEE Transactions on Intelligent Transportation Systems.

[42]  Jian-Ping Li,et al.  Simulation Model for Blockchain Systems Using Queuing Theory , 2019, Electronics.

[43]  Mohsen Guizani,et al.  A Survey of Blockchain Enabled Cyber-Physical Systems , 2020, Sensors.

[44]  Javier García-Zubía,et al.  Development of a Remote Laboratory Management System and Integration with Social Networks , 2014, Int. J. Recent Contributions Eng. Sci. IT.

[45]  Yuval Elovici,et al.  Online Social Networks: Threats and Solutions , 2013, IEEE Communications Surveys & Tutorials.

[46]  Balaji Palanisamy,et al.  Incentivized Blockchain-based Social Media Platforms: A Case Study of Steemit , 2019, WebSci.

[47]  D. Boyd,et al.  Sociality Through Social Network Sites , 2013 .

[48]  Hani Salah,et al.  Lilliput: A Storage Service for Lightweight Peer-to-Peer Online Social Networks , 2017, 2017 26th International Conference on Computer Communication and Networks (ICCCN).

[49]  Refik Molva,et al.  Analysis of Privacy in Online Social Networks from the Graph Theory Perspective , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.