Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 328))

  • 2265 Accesses

Abstract

An Online Social Network (OSN) is a platform to build social networks or social relations among people. The OSN’s allow users to share interests, activities, social details and professional details. Some of the OSN’s that are currently being used are Facebook, Twitter, Orkut etc. The major problem of social networks is providing privacy to the users. Social privacy, institutional privacy and surveillance are the key problems that are being faced by the OSN users. We developed a novel method to provide institutional privacy and surveillance to the OSN users. We introduced a new algorithm HSurveillance, which effectively implements the surveillance in OSN. The institutional privacy is provided to the users using locking mechanism. We believe that the proposed method will resolve the key security and privacy problems experienced by the OSN users.

3rd International Conference on Frontiers in Intelligent Computing, Theory and Application (FICTA-2014), 14th-15th November, Bhubaneswar, India.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Pelkola, D.: A Framework for Managing Privacy-Enhancing Technology. IEEE Software 29(3) (June 2012)

    Google Scholar 

  2. Jamali, M., Abolhassani, H.: Different Aspects of Social Network Analysis. In: IEEE/WIC/ACM International Conference on Web Intelligence (2006)

    Google Scholar 

  3. Frank, O., Strauss, D.: Markov graphs. Journal of the American Statistical Association 81, 832–842 (1986)

    Article  MathSciNet  MATH  Google Scholar 

  4. Wasserman, S., Pattison, P.: Logit models and logistic regression for social networks: I. An introduction to Markov graphs and p! Psychometric Society 61, 401–425 (1994)

    Article  MathSciNet  Google Scholar 

  5. Anderson, C., Wasserman, S., Crouch, B.: A p! primer: logit models for social networks. Social Networks 21, 37–66 (1999)

    Article  Google Scholar 

  6. Cutillo, L.A., Molva, R., Strufe, T.: Privacy Preserving Social Networking Through Decentralization. In: IEEE WONS 2009, Sixth International Conference on Wireless On-Demand Network Systems and Services, February 2-4 (2009)

    Google Scholar 

  7. Bilge, L., Strufe, T., Balzarotti, D., Kirda, E.: All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks. In: WWW, April 20-24 (2009)

    Google Scholar 

  8. Jagatic, T., Johnson, N., Jakobsson, M., Menczer, F.: Social phishing. Communications of the ACM 50(10), 94–100 (2007)

    Article  Google Scholar 

  9. Cutillo, L.A., Molva, R., Onen, M.: Analysis of Privacy in Online Social Networks from the Graph Theory Perspective. In: IEEE, Global Telecommunications Conference (GLOBECOM 2011), December 5-9 (2011)

    Google Scholar 

  10. Mitzenmacher, M., Upfal, E.: Probability and Computing: Randomized Algorithms and Probabilistic Analysis. Cambridge University Press (2005)

    Google Scholar 

  11. Malik, A.K., Dustdar, S.: Sharing and Privacy-Aware RBAC in Online Social Networks. In: IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing (2011)

    Google Scholar 

  12. Acquisti, A., Gross, R.: Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 36–58. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  13. Wang, Y., Komanduri, S., Leon, P.G., Acquisti, G.N.A., Cranor, L.F.: I regretted the minute I pressed share: A Qualitative Study of Regrets on Facebook. In: Symposium on Usable Privacy and Security (SOUPS), July 20-22 (2011)

    Google Scholar 

  14. Ferraiolo, D., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed nist standard for role-based access control. ACM Transactions on Information and System Security 4(3), 224–274 (2001)

    Article  Google Scholar 

  15. Luo, W., Liu, J., Liu, J., Fan, C.: An Analysis of Security in Social Networks. In: Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, December 12-14 (2009)

    Google Scholar 

  16. Gross, R., Acquisti, A.: Information Revelation and Privacy in Online Social Networks. In: Workshop on Privacy in the Electronic Society (WPES), November 7 (2005)

    Google Scholar 

  17. Rajalingam, M., Alomari, S.A., Sumar, P.: Prevention of Phishing Attacks Based on Discriminative Key Point Features of WebPages. International Journal of Computer Science and Security (IJCSS) 6(1) (2012)

    Google Scholar 

  18. Jakobsson, M., Stamm, S.: Invasive Browser Sniffing and Countermeasures. In: 15th International World Wide Web Conference, May 23-26 (2006)

    Google Scholar 

  19. Wondracek, G., Holz, T., Kirda, E., Kruegel, C.: A Practical Attack to De-anonymize Social Network Users. In: IEEE Symposium on Security and Privacy (SP), May 16-19 (2010)

    Google Scholar 

  20. Novak, E., Li, Q.: A Survey of Security and Privacy in Online Social Networks. College of William and Mary Computer Science Technical Report (2012)

    Google Scholar 

  21. Lee, R., Nia, R., Hsu, J., Levitt, K.N., Rowe, J., Wu, S.F., Ye, S.: Design and implementation of faith, an experimental system to intercept and manipulate online social informatics. In: IEEE International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 195–202 (July 2011)

    Google Scholar 

  22. Banks, L., Wu, S.F.: All Friends Are Not Created Equal: An Interaction Intensity Based Approach to Privacy in Online Social Networks. In: IEEE International Conference on Computational Science and Engineering, August 29-31 (2009)

    Google Scholar 

  23. Gurses, S., Diaz, C.: Two tales of privacy in online social networks. IEEE Security & Privacy 11(3), 29–37 (2013)

    Article  Google Scholar 

  24. Shostack, A.: Experiences Threat Modeling at Microsoft. Microsoft (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Teja Yaramasa .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Yaramasa, T., Kishore, G.K. (2015). Enhanced Privacy and Surveillance for Online Social Networks. In: Satapathy, S., Biswal, B., Udgata, S., Mandal, J. (eds) Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014. Advances in Intelligent Systems and Computing, vol 328. Springer, Cham. https://doi.org/10.1007/978-3-319-12012-6_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-12012-6_21

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-12011-9

  • Online ISBN: 978-3-319-12012-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics