Abstract
Online Social Networks (OSN) security issues have been extensively researched in the past decade. Information is posted and shared by individuals and organizations in social networks in huge quantities. One of the most important non-resolved topics is the Fake News propagation problem. Fake news propagates because of several reasons, one of which is non-trustworthy users. These users, some with malicious intentions, and some with low social media awareness, are the ones actually spreading misleading information. As this occurs, other users, that are valid reliable users, are exposed to false information. In our previous research we have devised a comprehensive Trust-based model that can handle this problem from the user Trust aspect. The model involves Access Control for the direct circle of friends and Flow Control for the friends’ networks. In this paper we use this model as a basis for the purpose of prevention of Fake News. We add context awareness and user profiling by analyzing the user’s activity in the network (posts, shares, etc.), and then use Machine Learning to detect these problematic users by analyzing data items that are fake or misleading. This addition creates a much more accurate picture of OSN users and their data and helps revealing the sources of the Fake News propagation and can prevent it. These aspects of the model create a strong reliable OSN data infrastructure.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 71–80. ACM (2005)
Krishnamurthy, B., Wills, C.E.: Characterizing privacy in online social networks. In: Proceedings of the first Workshop on Online Social Networks, pp. 37–42. ACM, August 2008
Misra, G., Such, J.M.: How socially aware are social media privacy controls? Computer 49(3), 96–99 (2016)
Voloch, N., Nissim, P., Elmakies, M., Gudes, E.: A role and trust access control model for preserving privacy and image anonymization in social networks. In: Meng, W., Cofta, P., Jensen, C.D., Grandison, T. (eds.) IFIPTM 2019. IAICT, vol. 563, pp. 19–27. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-33716-2_2
Voloch, N., Levy, P., Elmakies, M., Gudes, E.: An access control model for data security in online social networks based on role and user credibility. In: Dolev, S., Hendler, D., Lodha, S., Yung, M. (eds.) CSCML 2019. LNCS, vol. 11527, pp. 156–168. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-20951-3_14
Gudes, E., Voloch, N.: An information-flow control model for online social networks based on user-attribute credibility and connection-strength factors. In: Dinur, I., Dolev, S., Lodha, S. (eds.) CSCML 2018. LNCS, vol. 10879, pp. 55–67. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-94147-9_5
Voloch, N., Gudes, E.: An MST-based information flow model for security in online social networks. In: The 11th IEEE International Conference on Ubiquitous and Future Networks (2019)
Shu, K., Sliva, A., Wang, S., Tang, J., Liu, H.: Fake news detection on social media: a data mining perspective. ACM SIGKDD Explor. Newsl. 19(1), 22–36 (2017)
Tandoc, E.C., Jr., Lim, Z.W., Ling, R.: Defining ‘fake news’: a typology of scholarly definitions. Digit. Journal. 6(2), 137–153 (2018)
Kumar, K.P.K., Geethakumari, G.: Detecting misinformation in online social networks using cognitive psychology. HCIS 4(1), 1–22 (2014). https://doi.org/10.1186/s13673-014-0014-x
Levi, O., Hosseini, P., Diab, M., Broniatowski, D.A.: Identifying nuances in fake news vs. satire: using semantic and linguistic cues. arXiv preprint arXiv:1910.01160 (2019)
Vosoughi, S., Roy, D., Aral, S.: The spread of true and false news online. Science 359(6380), 1146–1151 (2018)
Li, Y., Li, Y., Yan, Q., Deng, R.H.: Privacy leakage analysis in online social networks. Comput. Secur. 49, 239–254 (2015)
Sayaf, R., Clarke, D.: Access control models for online social networks. Soc. Netw. Eng. Secure Web Data Serv. 32, 32–65 (2012)
Levy, S., Gudes, E., Gal-Oz, N.: Sharing-habits based privacy control in social networks. In: Ranise, S., Swarup, V. (eds.) DBSec 2016. LNCS, vol. 9766, pp. 217–232. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-41483-6_16
Cheng, Y., Park, J., Sandhu, R.: An access control model for online social networks using user-to-user relationships. IEEE Trans. Dependable Secure Comput. 13(4), 424–436 (2016)
Cohen, Y., Gordon, D., Hendler, D.: Early detection of spamming accounts in large-scale service provider networks. Knowl.-Based Syst. 142, 241–255 (2017)
Zheng, X., Zeng, Z., Chen, Z., Yu, Y., Rong, C.: Detecting spammers on social networks. Neurocomputing 159, 27–34 (2015)
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer 29(2), 38–47 (1996)
Lavi, T., Gudes, E.: Trust-based Dynamic RBAC. In: Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP), pp. 317–324 (2016)
Patil, V.T., Shyamasundar, R.K.: Undoing of privacy policies on Facebook. In: Livraga, G., Zhu, S. (eds.) DBSec 2017. LNCS, vol. 10359, pp. 239–255. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-61176-1_13
Ali, B., Villegas, W., Maheswaran, M.: A trust based approach for protecting user data in social networks. In: Proceedings of the 2007 Conference of the Center for Advanced Studies on Collaborative Research, pp. 288–293. IBM Corp. (2007)
Misra, G., Such, J.M., Balogun, H.: IMPROVE-Identifying Minimal PROfile VEctors for similarity-based access control. In: Trustcom/BigDataSE/ISPA, pp. 868–875. IEEE (2016)
Atallah, M.J., McDonough, C.J., Raskin, V., Nirenburg, S.: Natural language processing for information assurance and security: an overview and implementations. In: NSPW, pp. 51–65, September 2000
Tsoumas, B., Gritzalis, D.: Towards an ontology-based security management. In: 20th International Conference on Advanced Information Networking and Applications-Volume 1 (AINA’06), vol. 1, pp. 985–992. IEEE, April 2006
Wang, X., Tokarchuk, L., Poslad, S.: Identifying relevant event content for real-time event detection. In: 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014), Beijing, pp. 395–398 (2014)
May, C., Ferraro, F., McCree, A., Wintrode, J., Garcia-Romero, D., Van Durme, B.: Topic identification and discovery on text and speech. In: Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, pp. 2377–2387, September 2015
Choudhary, A., Arora, A.: Linguistic feature based learning model for fake news detection and classification. Expert Syst. Appl. 169, 114171 (2021)
Monti, F., Frasca, F., Eynard, D., Mannion, D., Bronstein, M.M.: Fake news detection on social media using geometric deep learning. arXiv preprint arXiv:1902.06673 (2019)
Helmstetter, S., Paulheim, H.: Weakly supervised learning for fake news detection on Twitter. In: 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 274–277. IEEE, August 2018
Pierri, F., Ceri, S.: False news on social media: a data-driven survey. ACM SIGMOD Rec. 48(2), 18–27 (2019)
Voloch, N.: Using sentiment analysis and context evaluation for preserving trust-based privacy in social networks (2020). https://www.cs.bgu.ac.il/~voloch/FinalProjectReport.pdf
Collomb, A., Costea, C., Joyeux, D., Hasan, O., Brunie, L.: A study and comparison of sentiment analysis methods for reputation evaluation. Rapport de recherche RR-LIRIS-2014-002 (2014)
Alahmadi, D.H., Zeng, X.J.: Twitter-based recommender system to address cold-start: a genetic algorithm-based trust modelling and probabilistic sentiment analysis. In: 2015 IEEE 27th International Conference on Tools with Artificial Intelligence (ICTAI), pp. 1045–1052). IEEE, November 2015
Cui, L., Wang, S., Lee, D.: SAME: sentiment-aware multi-modal embedding for detecting fake news. In: Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 41–48, August 2019
Watkins, C.J., Dayan, P.: Q-learning. Mach. Learn. 8(3–4), 279–292 (1992)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Voloch, N., Gudes, E., Gal-Oz, N. (2021). Preventing Fake News Propagation in Social Networks Using a Context Trust-Based Security Model. In: Yang, M., Chen, C., Liu, Y. (eds) Network and System Security. NSS 2021. Lecture Notes in Computer Science(), vol 13041. Springer, Cham. https://doi.org/10.1007/978-3-030-92708-0_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-92708-0_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-92707-3
Online ISBN: 978-3-030-92708-0
eBook Packages: Computer ScienceComputer Science (R0)