A Critical Analysis of Privacy and Security On Social Media: April 2015
A Critical Analysis of Privacy and Security On Social Media: April 2015
net/publication/281711350
CITATION READS
1 10,795
2 authors:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Shailendra Singh on 13 September 2015.
Abstract- Privacy and security are the main concern of any growing proliferation and capabilities of mobile devices
social media network sites such as Facebook, Twitter, and may affect privacy [3].
LinkedIn etc. The primary purpose of these sites is to allow
people to share interests, activities, real-life connections. Lack Smartphone enables increasing number of users to
of attention to privacy and security on social media does seem have access to social networking sites where they use 4G
to be odds with the belief as individual responsibility. Network connections to store the data, provide/receive data to/from
virtualization, media independence and FAME etc., are the
social networking sites [4]. In business process modelling,
technologies which are used for protecting WKH XVHU¶V
insider threat harms the organization through the operated
information over the internet. In this paper, we describe
various methods for securing the data with some threats and process. There are various approaches for detecting the
solution. Finally, concludes with a few suggestions as future insider threat like track business processes and provide
research direction. logging information about them. Online monitoring can
facilitate the insider threat mitigation since, unlike other
Keywords: SWT, UsiXML UIDL, GPS, VPSM, FAME, technical approaches [5], it also takes the human factor
threats and solution. into account [5]. In online social media, there is a term
called cross-pollination, in this process pollen is delivered
I. INTRODUCTION
to a flower from different plants, with the plants that are
Now a day, online social websites such as Facebook, different in their genesis [6], in the same way it helps
Twitter and LinkedIn all are the prime sites that are widely social media providers to improve their systems and
accessed on the Internet. Privacy and security are the major develop updated tools for exchange of information across
concerns in IT application like run or install software. The networks. Cross-pollinated networks follow temporal and
LPSRUWDQWFKDOOHQJHLVWRSURWHFW XVHU¶VSHUVRQDOGDWD IURP topological characteristics of the diffusion on online
the unauthorized persons as per law of the land and policies social media [6]. Network virtualization and media
for data rights. The social media network must not disclose independence technology is used to secure the data over
personal data of end-users profile. The privacy challenge is the internet. By means of media independence, there is a
XVXDOO\ VHHQ RQO\ LQ RQH GLUHFWLRQ EHFDXVH D SHUVRQ¶V set of abstract services which is defined for simplifying
privacy is not only attacked from the outside, but in reality network operations to provide mobility aware applications
80% chance of attacks found to be due to human errors. [18].
This happens because the users themselves do not
For mobile device FAME (Face Authentication for
understand the consequences of personal data they have
Mobile Encounters) is an embedded application that
provided. There is a need to develop methodologies for
provides both verification and identification, including
SURWHFWLQJXVHU¶VSHUVRQDOGDWD, like, GPS which is used to
identity management to support social activities [7].
capture the surroundings such as location, motion,
temperature and also other people in the vicinity. Location There are many methods which we are defined in our
awareness plays an important role in context-aware system related work for privacy and security of the data.
such as cameras, gyroscopes, accelerometers,
microphones etc. [1]. II. RELATED WORK
Resource-sharing is very common in social media. In social media, many techniques are existing for the
Users are able to see all the resources for access but some better privacy and security.
are private or public. User Interface Description Language
(UIDL) allows the designers to develop multi-modal and A. Preserving Privacy in Context-Aware Systems
multi-platform User Interfaces UIs [2]. In social media
603
the clientele who wish to protect their online way that insider attacks are detected in a short
privacy. time period.
x The second type of watchdog does not require a x Combine technical and behavioural
user account to do search and can be queried monitoring: It increases the effectiveness of
anonymously. It would have smaller scope and can insider threat detection. Alert sharing and
only access publicly available media. trusted teams that are authorized to access all
x Third type would be stand-alone service which can data within the organization.
be operated by a third party like an indexing, x Use external source of information: It suggests
search machine, which crawls publicly available the use of external information sources.
media and is metadata and allows this database to
query. They focus on further enhancing existing monitoring
tools by combining external sources of information (such
These different types of watchdog service are used to as social media) with technical and behavioral patterns.
reduce the number of relevant pieces of media a user needs
to keep an eye on if they dRQ¶WZDQWXQFRQWUROOHGPHGLDRI
themselves to be online [3].
Social media
D. Privacy-Preserving Mobile Accesses for Virtual
Private Social Media
604
training set would have [9] been twice the size of a number
Face Matching Acquisition
of existing links in each community.
Feature Segmentation
Extraction
605
J. Social Networks and Web Security: Implications on III. THREATS AND SOLUTION IN
Open Source Intelligence. ONLINE SOCIAL MEDIA NETWORK
In this paper [11] they highlighted the intelligence aspect In a social media network, threats and the solution
of social media networking and also analysis the events signify are used to protect our data from the fake users and
the influential competence of social media network and improve the privacy solution. There are two types of
additionally they focused on the foundation and the significance threats, one is classic threat and other is modern threats.
of security risks with social networks to protect the confidential Today's attackers can combine these two threats to make
and personal data. the user's privacy more venerable to lethal attack.
N. A Data-Reachability Model for Elucidating Privacy Figure 5. Threats to Online Social Media Networks Users [16].
and Security Risks Related to the Use of Online Social
Networks.
The above Figure 5. shows all the threats which
In this paper [15] authors proposed a data reachability divided into mainly four categories:
model to understand the potential risks in online social
networks. The model easily captured the data extraction x Classic Threats &ODVVLFDO WKUHDWV XVH WKH XVHU¶V
methods through the encoding of a data-reachability matrix in personal information published on social
which each row represents an inference or a data derivation networks WR DWWDFN DQG DOVR DWWDFN WKHLU IULHQG¶V
step. And the model elucidates potential linkages between data personal information. It spreads very fast among
typically exposed within social-media and networking sites. user network [16].
x Modern Threats: It especially targets WRWKH XVHU¶V
606
personal information. For example, it collects to protect the children from harmful content. There are
information to make fake profile and send request NoScript Security Suite, privacy scanner for Facebook,
to another target user [16]. defensio, algorithm for detecting video spammer from
x Combination Threats: It is a combination of both YouTube, preventing information and location leakage etc.,
classical and modern threats. For example, use all are the solution for threats.
SKLVKLQJDWWDFNWRFROOHFWWKHXVHU¶VSDVVZRUGDQG
posted to another target user by using clickjacking.
There is hidden virus, so when the target user click IV. FUTURE ASPECTS OF SOCIAL MEDIA
on the posted message, it installs [16]. NETWORK WITH CONCLUSION
x Threats Targeting Children: Its targets for the
younger children by chatting with stranger Here, the Table 1 shows, the 5 most popular social
person etc. [16]. networking sites, the number of monthly visitors in
compete rank order [17].
Use the Trojan that contain hidden click jacking attack TABLE 1. FEATURES OF SOCIAL MEDIA NETWORKING
in which hidden virus are activated, and thus collects the SITES [17].
P
Preventing information &
Location leakage In the future, the internet has evolved towards high-
bandwidth network architecture offering transparent
Commercial transport services for fixed and mobile applications to
cope with several concerns on different aspects such as
scalability, transparency, mobility, robustness, security,
heterogeneity, quality of service [18], re-configurability,
context-awareness, manageability, data centric,
Internet
Inte N
Norton
orton safee Websense
ebse content
cont Infoglide
Infog united parents
pare economics, etc. [18]. For privacy and security, we built an
Security w
web defense watches net minor child protection
Solution nanny monitor evolutionary solution on current internet architecture for
VG
AVG
Privacy Fix
the upcoming limitations. Loss of intellectual property
McAfee social
cial pprotection and proprietary information may be risks for an
organization [19].
607
[2] Mohamed Bourimi, Ricardo Tesoriero, Pedro G. Villanueva, Fatih Service Attributes for 3D Future Internet Multimedia," Fourth IEEE
Karatas and Philipp Schwarte, "Privacy and Security in Multi-modal User International Conference on Cognitive Infocommunication,Dec
Interface Modeling for Social Media," IEEE International Conference on 2013,pp.641-646.
Privacy, Security ,Risk, and Trust, and IEEE International Conference on
Social Computing2011,pp.1364-1371.
[3] Matthew Smith, Christian Szongott, Benjamin Henne and Gabriele von
Voigt, "Big Data Privacy Issues in Public Social Media,´,(((, 2013.
[4] Jong P. Yoon, Christopher M. Frenz, Zhixiong Chen and David Wang,
"Privacy-Preserving Mobile Accesses for Virtual Private Social Media,´
IEEE Eighth World Congress on Services, 2012, pp.192-198.
[5] Dimitris Gritzalis, Vasilis Stavrou, Miltiadis Kandias and George
6WHUJLRSRXORV ,QVLGHU 7KUHDW (QKDQFLQJ %30 WKURXJK 6RFLDO 0HGLD´
IEEE, 2014.
[6] Paridhi Jain, Tiago Rodrigues, Gabriel Magno, Ponnurangam
Kumaraguru and Virgilio Almeida, "Cross-Pollination of Information in
2QOLQH 6RFLDO 0HGLD $ &DVH 6WXG\ RQ 3RSXODU 6RFLDO 1HWZRUNV´ ,(((
International Conference on Privacy, Security, Risk, and Trust, and IEEE
International Conference on Social Computing, 2011, pp.477-482.
[7] Silvio Barra, Chiara Galdi, Maria De Marsico and Daniel Riccio,
)$0()DFH$XWKHQWLFDWLRQIRU0RELOH(QFRXQWHU´,(((, 2013.
[8] Mohamed Bourimi,Dhiah el Diehn I. Abou-Tair, Dogan
Kesdogan,Thomas Barth and KaWKULQ +RINH ´(YDOXDWLQJ SRWHQWLDOV RI
Internet and Web-EDVHG 6RFLDO79 LQ WKH OLJKW RI SULYDF\´,IEEE
International Conference on Social Computing/IEEE International
Conference on Privacy,Security,Risk and Trust,2010.pp.1135-1140.
[9] Michael Fire, Gilad .DW] /LRU 5RNDFK DQG <XYDO (ORYLFL´/LQNV
Reconstruction Attack: Using Link Prediction Algorithms to Compromise
6RFLDO1HWZRUNV3ULYDF\´ Springer New York 2013, pp.181-196.
[10] Giacomo Bachi,Michele Coscia,Anna Monreale and Fosca Giannotti,
´&ODVVLI\LQg Trust/Distrust Relationships in Online Social
1HWZRUNV´ASE/IEEE International Conference on Social Computing and
ASE/IEEE International Conference on Privacy,Security,Risk and
Trust,2012,pp.552-557.
>@)DKDG$QVDUL0RQLV$NKODTDQG$5DXI³6RFLDO1etworks and Web
6HFXULW\ ,PSOLFDWLRQV RQ 2SHQ 6RXUFH ,QWHOOLJHQFH´ Second National
Conference on Information Assurance (NCIA), IEEE, 2013,pp.79-82.
>@ $OH[DQGUD 0,&+27$ DQG 6RNUDWLV .DWVLNDV´&RPSOLDQFH RI WKH
Facebook Data Use Policy with the principles of ISO 29100:2011´,(((
2014.
[13] Wu-&KHQ 6X´,QWHJUDWLQJ DQG 0LQLQJ 9LUWXDO &RPPXQLWLHV DFURVV
0XOWLSOH 2QOLQH 6RFLDO 1HWZRUNV FRQFHSWV $SSURDFKHV DQG &KDOOHQJHV´
IEEE, 2014, pp.199-204.
[14] Ahmed Kadhim Noor and Mohammad Abdur 5D]]DTXH´$QDO\VLV RI
WKUHHWUXVWHG)ULHQGV¶YXOQHUDELOLW\LQ)DFHERRN´ International Conference
on Advanced Computer Science Applications and Technologies, IEEE,
2013, pp.300-303.
[15] Sadie Creese,Michael Goldsmith,Jason R.C. Nurse and Elizabeth
PhillipV´$ 'DWD-Reachability Model for Elucidating Privacy and Security
Risks Related to the Use of Online Social Networks´ (OHYHQWK
International Conference on Trust, Security and Privacy in Computing and
Communications,IEEE,2012,pp.1124-1131.
[16] Michael Fire, Roy Goldschmidt and Yuval Elovici´ Online Social
1HWZRUNV 7KUHDWV DQG 6ROXWLRQV´, IEEE Communication Surveys &
Tutorials, Fourth Quarter 2014, pp.2019-2036.
[17] (2015) the eBusiness MBA Guide Social Networking Sites [Online].
[18] Jesus Alcober,Xavier Hesselbach,Antonio de la Oliva,Andres
Garcia-Saavedra , David Roldan and Carlos Bock, "Internet Future
Architectures for Network and Media Independent Services and
Protocols,"(ICTON)IEEE, 2013,pp.1-4.
[19] Santosh Krishna Putchala and Krishna Bhat and Anitha R,
"Information Security Challenges in Social Media Interactions,´ ,(((,
July 2013, pp.1-4.
[20] Ivett Kulik, Peter Andras Kara, Tuan Anh Trinh and Laszlo
Bokor, "Analysis of the Relationship between Quality of Experience and
608