Skip to main content

Preventing Fake News Propagation in Social Networks Using a Context Trust-Based Security Model

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 13041))

Abstract

Online Social Networks (OSN) security issues have been extensively researched in the past decade. Information is posted and shared by individuals and organizations in social networks in huge quantities. One of the most important non-resolved topics is the Fake News propagation problem. Fake news propagates because of several reasons, one of which is non-trustworthy users. These users, some with malicious intentions, and some with low social media awareness, are the ones actually spreading misleading information. As this occurs, other users, that are valid reliable users, are exposed to false information. In our previous research we have devised a comprehensive Trust-based model that can handle this problem from the user Trust aspect. The model involves Access Control for the direct circle of friends and Flow Control for the friends’ networks. In this paper we use this model as a basis for the purpose of prevention of Fake News. We add context awareness and user profiling by analyzing the user’s activity in the network (posts, shares, etc.), and then use Machine Learning to detect these problematic users by analyzing data items that are fake or misleading. This addition creates a much more accurate picture of OSN users and their data and helps revealing the sources of the Fake News propagation and can prevent it. These aspects of the model create a strong reliable OSN data infrastructure.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   64.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 71–80. ACM (2005)

    Google Scholar 

  2. Krishnamurthy, B., Wills, C.E.: Characterizing privacy in online social networks. In: Proceedings of the first Workshop on Online Social Networks, pp. 37–42. ACM, August 2008

    Google Scholar 

  3. Misra, G., Such, J.M.: How socially aware are social media privacy controls? Computer 49(3), 96–99 (2016)

    Article  Google Scholar 

  4. Voloch, N., Nissim, P., Elmakies, M., Gudes, E.: A role and trust access control model for preserving privacy and image anonymization in social networks. In: Meng, W., Cofta, P., Jensen, C.D., Grandison, T. (eds.) IFIPTM 2019. IAICT, vol. 563, pp. 19–27. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-33716-2_2

    Chapter  Google Scholar 

  5. Voloch, N., Levy, P., Elmakies, M., Gudes, E.: An access control model for data security in online social networks based on role and user credibility. In: Dolev, S., Hendler, D., Lodha, S., Yung, M. (eds.) CSCML 2019. LNCS, vol. 11527, pp. 156–168. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-20951-3_14

    Chapter  Google Scholar 

  6. Gudes, E., Voloch, N.: An information-flow control model for online social networks based on user-attribute credibility and connection-strength factors. In: Dinur, I., Dolev, S., Lodha, S. (eds.) CSCML 2018. LNCS, vol. 10879, pp. 55–67. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-94147-9_5

    Chapter  Google Scholar 

  7. Voloch, N., Gudes, E.: An MST-based information flow model for security in online social networks. In: The 11th IEEE International Conference on Ubiquitous and Future Networks (2019)

    Google Scholar 

  8. Shu, K., Sliva, A., Wang, S., Tang, J., Liu, H.: Fake news detection on social media: a data mining perspective. ACM SIGKDD Explor. Newsl. 19(1), 22–36 (2017)

    Article  Google Scholar 

  9. Tandoc, E.C., Jr., Lim, Z.W., Ling, R.: Defining ‘fake news’: a typology of scholarly definitions. Digit. Journal. 6(2), 137–153 (2018)

    Google Scholar 

  10. Kumar, K.P.K., Geethakumari, G.: Detecting misinformation in online social networks using cognitive psychology. HCIS 4(1), 1–22 (2014). https://doi.org/10.1186/s13673-014-0014-x

    Article  Google Scholar 

  11. Levi, O., Hosseini, P., Diab, M., Broniatowski, D.A.: Identifying nuances in fake news vs. satire: using semantic and linguistic cues. arXiv preprint arXiv:1910.01160 (2019)

  12. Vosoughi, S., Roy, D., Aral, S.: The spread of true and false news online. Science 359(6380), 1146–1151 (2018)

    Article  Google Scholar 

  13. Li, Y., Li, Y., Yan, Q., Deng, R.H.: Privacy leakage analysis in online social networks. Comput. Secur. 49, 239–254 (2015)

    Article  Google Scholar 

  14. Sayaf, R., Clarke, D.: Access control models for online social networks. Soc. Netw. Eng. Secure Web Data Serv. 32, 32–65 (2012)‏

    Google Scholar 

  15. Levy, S., Gudes, E., Gal-Oz, N.: Sharing-habits based privacy control in social networks. In: Ranise, S., Swarup, V. (eds.) DBSec 2016. LNCS, vol. 9766, pp. 217–232. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-41483-6_16

    Chapter  Google Scholar 

  16. Cheng, Y., Park, J., Sandhu, R.: An access control model for online social networks using user-to-user relationships. IEEE Trans. Dependable Secure Comput. 13(4), 424–436 (2016)

    Article  Google Scholar 

  17. Cohen, Y., Gordon, D., Hendler, D.: Early detection of spamming accounts in large-scale service provider networks. Knowl.-Based Syst. 142, 241–255 (2017)

    Article  Google Scholar 

  18. Zheng, X., Zeng, Z., Chen, Z., Yu, Y., Rong, C.: Detecting spammers on social networks. Neurocomputing 159, 27–34 (2015)

    Article  Google Scholar 

  19. Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer 29(2), 38–47 (1996)

    Article  Google Scholar 

  20. Lavi, T., Gudes, E.: Trust-based Dynamic RBAC. In: Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP), pp. 317–324 (2016)

    Google Scholar 

  21. Patil, V.T., Shyamasundar, R.K.: Undoing of privacy policies on Facebook. In: Livraga, G., Zhu, S. (eds.) DBSec 2017. LNCS, vol. 10359, pp. 239–255. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-61176-1_13

    Chapter  Google Scholar 

  22. Ali, B., Villegas, W., Maheswaran, M.: A trust based approach for protecting user data in social networks. In: Proceedings of the 2007 Conference of the Center for Advanced Studies on Collaborative Research, pp. 288–293. IBM Corp. (2007)

    Google Scholar 

  23. Misra, G., Such, J.M., Balogun, H.: IMPROVE-Identifying Minimal PROfile VEctors for similarity-based access control. In: Trustcom/BigDataSE/ISPA, pp. 868–875. IEEE (2016)

    Google Scholar 

  24. Atallah, M.J., McDonough, C.J., Raskin, V., Nirenburg, S.: Natural language processing for information assurance and security: an overview and implementations. In: NSPW, pp. 51–65, September 2000

    Google Scholar 

  25. Tsoumas, B., Gritzalis, D.: Towards an ontology-based security management. In: 20th International Conference on Advanced Information Networking and Applications-Volume 1 (AINA’06), vol. 1, pp. 985–992. IEEE, April 2006

    Google Scholar 

  26. Wang, X., Tokarchuk, L., Poslad, S.: Identifying relevant event content for real-time event detection. In: 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014), Beijing, pp. 395–398 (2014)

    Google Scholar 

  27. May, C., Ferraro, F., McCree, A., Wintrode, J., Garcia-Romero, D., Van Durme, B.: Topic identification and discovery on text and speech. In: Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, pp. 2377–2387, September 2015

    Google Scholar 

  28. Choudhary, A., Arora, A.: Linguistic feature based learning model for fake news detection and classification. Expert Syst. Appl. 169, 114171 (2021)

    Article  Google Scholar 

  29. Monti, F., Frasca, F., Eynard, D., Mannion, D., Bronstein, M.M.: Fake news detection on social media using geometric deep learning. arXiv preprint arXiv:1902.06673 (2019)‏

  30. Helmstetter, S., Paulheim, H.: Weakly supervised learning for fake news detection on Twitter. In: 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 274–277. IEEE, August 2018‏

    Google Scholar 

  31. Pierri, F., Ceri, S.: False news on social media: a data-driven survey. ACM SIGMOD Rec. 48(2), 18–27 (2019)

    Article  Google Scholar 

  32. Voloch, N.: Using sentiment analysis and context evaluation for preserving trust-based privacy in social networks (2020).‏ https://www.cs.bgu.ac.il/~voloch/FinalProjectReport.pdf

  33. Collomb, A., Costea, C., Joyeux, D., Hasan, O., Brunie, L.: A study and comparison of sentiment analysis methods for reputation evaluation. Rapport de recherche RR-LIRIS-2014-002 (2014)

    Google Scholar 

  34. Alahmadi, D.H., Zeng, X.J.: Twitter-based recommender system to address cold-start: a genetic algorithm-based trust modelling and probabilistic sentiment analysis. In: 2015 IEEE 27th International Conference on Tools with Artificial Intelligence (ICTAI), pp. 1045–1052). IEEE, November 2015

    Google Scholar 

  35. Cui, L., Wang, S., Lee, D.: SAME: sentiment-aware multi-modal embedding for detecting fake news. In: Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 41–48, August 2019

    Google Scholar 

  36. Watkins, C.J., Dayan, P.: Q-learning. Mach. Learn. 8(3–4), 279–292 (1992)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nadav Voloch .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Voloch, N., Gudes, E., Gal-Oz, N. (2021). Preventing Fake News Propagation in Social Networks Using a Context Trust-Based Security Model. In: Yang, M., Chen, C., Liu, Y. (eds) Network and System Security. NSS 2021. Lecture Notes in Computer Science(), vol 13041. Springer, Cham. https://doi.org/10.1007/978-3-030-92708-0_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-92708-0_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-92707-3

  • Online ISBN: 978-3-030-92708-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics