Abstract
Social Network Services (SNS) are currently drastically revolutionizing the way people interact, thus becoming de facto a predominant service on the web, today.1 The impact of this paradigm change on socioeconomic and technical aspects of collaboration and interaction is comparable to that caused by the deployment of World Wide Web in the 1990s.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
This work has partially been funded by IT R&D program of MKE/KEIT under grant number 10035587, DFG FOR 733 (“QuaP2P”), and the EU SOCIALNETS project, grant no 217141.1According to reports, facebook.com. recently surpassed the previously most popular website google.com by both page visits and served bandwidth: http://www.hitwise.com/us/datacenter/main/dashboard-10133.htmlhttp://www.mercurynews.com/business/ci_14698296?nclick_check=1.
- 2.
- 3.
- 4.
- 5.
- 6.
Several of these attacks have been shown to be successful in the past. A short selection of examples can be found in [5, 9] as well as at http://www.sophos.com/pressoffice/news/articles/2007/08/facebook.html and http://www.blackhat.com/html/bh-usa-08/bh-usa-08-archive.html.
- 7.
- 8.
- 9.
- 10.
- 11.
- 12.
- 13.
- 14.
- 15.
- 16.
- 17.
- 18.
- 19.
- 20.
- 21.
One incident has been reported for facebook, where a multitude of groups have been fostered under general topics and concertedly renamed to support Silvio Berlusconi, in 2009 http://www.repubblica.it/2009/12/sezioni/politica/giustizia-21/gruppi-facebook/gruppi-facebook.html.
- 22.
- 23.
- 24.
- 25.
References
Modelling the Real Market Value of Social Networks. http://www.techcrunch.com/2008/06/23/modeling-the-real-market-value-of-social-networks/, 2008.
danah m. boyd. Facebook’s privacy trainwreck. Convergence: The International Journal of Research into New Media Technologies, 14(1):13–20, 2008.
A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 1(1):11–33, 2004.
M. Balduzzi, C. Platzer, T. Holz, E. Kirda, D. Balzarotti, and C. Kruegel. Abusing Social Networks for Automated User Profiling. Research Report RR-10-233, EURECOM, 2010. http://www.iseclab.org/papers/socialabuse-TR.pdf.
L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda. All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks. In 18th Intl. World Wide Web Conference, 2009.
d. m. boyd and N. B. Ellison. Social network sites: definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(1), 2007.
D. Florencio and C. Herley. A Large-Scale Study of Web Password Habits. In 16th International Conference on World Wide Web (WWW 2007), pages 657–666. ACM, 2007.
R. Gross and A. Acquisti. Information Revelation and Privacy in Online Social Networks. In ACM Workshop on Privacy in the Electronic Society, pages 71–80, 2005.
T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer. Social phishing. Communications of the ACM, 94–100, 2007.
A. Mislove, B. Viswanath, K. P. Gummadi, and P. Druschel. You Are Who You Know: Inferring User Profiles in Online Social Networks. In ACM International Conference on Web Search and Data Mining (WSDM 2010), pages 251–260. ACM, 2010.
T. J. Nathaniel, N. Johnson, and M. Jakobsson. Social phishing. Communications of the ACM. Retrieved March, 7, 2006.
J. Park and R. Sandhu. Towards Usage Control Models: Beyond Traditional Access Control. In SACMAT ’02: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, pages 57–64. ACM, New York, NY, USA, 2002.
F. Schneider, A. Feldmann, B. Krishnamurthy, and W. Willinger. Understanding Online Social Network Usage from a Network Perspective. In ACM SIGCOMM conference on Internet measurement, 2009.
L. von Ahn, M. Blum, N. J. Hopper, and J. Langford. CAPTCHA: Using Hard AI Problems for Security. In EUROCRYPT 2003. LNCS, vol 2656, pages 294–311. Springer, Heidelberg, 2003.
S. D. Warren and L. D. Brandeis. The right to privacy. Harward Law Review, 4(5):193–220, December 1890.
G. Wondracek, T. Holz, E. Kirda, and C. Kruegel. A Practical Attack to De-Anonymize Social Network Users. In IEEE Symposium on Security and Privacy. IEEE CS, 2010. http://www.iseclab.org/papers/sonda.pdf.
W. Zhao, R. Chellappa, P. J. Phillips, and A. Rosenfeld. Face recognition: a literature survey. ACM Computing Surveys, 35(4):399–458, 2003.
E. Zheleva and L. Getoor. To Join or Not to Join: The Illusion of Privacy in Social Networks with Mixed Public and Private User Profiles. In WWW 2009, pages 531–540. ACM, 2009.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Cutillo, L.A., Manulis, M., Strufe, T. (2010). Security and Privacy in Online Social Networks. In: Furht, B. (eds) Handbook of Social Network Technologies and Applications. Springer, New York, NY. https://doi.org/10.1007/978-1-4419-7142-5_23
Download citation
DOI: https://doi.org/10.1007/978-1-4419-7142-5_23
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4419-7141-8
Online ISBN: 978-1-4419-7142-5
eBook Packages: Computer ScienceComputer Science (R0)