Skip to main content

Security and Privacy Issues in Social Networks

  • Chapter
Data Management in Pervasive Systems

Part of the book series: Data-Centric Systems and Applications ((DCSA))

Abstract

Online social networks (OSNs) have become extremely popular in recent years, and their widespread adoption has led to the presence of huge volumes of users’ personal information on the Internet. The ever-increasing number of social networks’ users on one hand and the massive amount of information being shared daily on the other hand have encouraged attackers to develop and use different techniques to collect and analyze such information for a number of malicious purposes, including spear-phishing attacks and identity theft. Clearly, this trend represents a significant challenge for both users and administrators. In fact, the widespread adoption of OSNs has raised a wide range of security and privacy concerns, which have not been fully addressed yet. In many cases, users are not even aware of the disclosure of their personal information through their profiles. Leakage of a user’s private information can happen in different ways. In this chapter, we discuss the main security and privacy issues associated with online social networks and investigate some attack models used to reveal a user’s private information. We also discuss different strategies and regulations that can prevent disclosure of private information through OSNs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ashford, W.: RSA discloses phishing-attack data breach details. Online at http://www.computerweekly.com/news/1280095593/RSA-discloses-phishing-attack-data-breach-details (2011)

  2. Benevenuto, F., Rodrigues, T., Almeida, V., Almeida, J., Zhang, C., Ross, K.: Identifying video spammers in online social networks. In: Proceedings of the 4th International Workshop on Adversarial Information Retrieval on the Web, pp. 45–52 (2008)

    Google Scholar 

  3. Brenner, J., Smith, A.: 72% of online adults are social networking site users. Online at http://www.pewinternet.org/ (2013)

  4. Cutillo, L.A., Molva, R., Strufe, T.: Safebook: a privacy-preserving online social network leveraging on real-life trust. IEEE Commun. Mag. 47(12), 94–101 (2009)

    Article  Google Scholar 

  5. Dhamija, R., Tygar, J.D.: The battle against phishing: dynamic security skins. In: Proceedings of the Symposium on Usable Privacy and Security (SOUPS 2005), Pittsburgh, pp. 77–88 (2005)

    Google Scholar 

  6. Faghani, M.R., Saidi, H.: Malware propagation in online social networks. In: Proceedings of the 4th International Conference on Malicious and Unwanted Software (MALWARE 2009), Montreal, pp. 8–14 (2009)

    Google Scholar 

  7. Fire, M., Goldschmidt, R., Elovici, Y.: Online social networks: threats and solutions. IEEE Commun. Surv. Tutorials. 16(4), 2019–2036 (2014)

    Article  Google Scholar 

  8. Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM workshop on Privacy in the electronic society, pp. 71–80, (2005)

    Google Scholar 

  9. Heatherly, R., Kantarcioglu, M., Thuraisingham, B.: Preventing private information inference attacks on social networks. IEEE Trans. Knowl. Data Eng. 25(8), 1849–1862 (2013)

    Article  Google Scholar 

  10. Irani, D., Balduzzi, M., Balzarotti, D., Kirda, E., Pu, C.: Reverse social engineering attacks in online social networks. In: Detection of Intrusions and Malware, and Vulnerability Assessment. Lecture Notes in Computer Science, vol. 6739, pp. 55–74. Springer, New York (2011)

    Google Scholar 

  11. Jin, L., Long, X., Takabi, H., Joshi, J.B.: Sybil attacks vs identity clone attacks in online social networks. In: Proceedings of the 6th International Conference on Information Security and Assurance (ISA 2012), Shanghai, pp. 125–127 (2012)

    Google Scholar 

  12. Mislove, A., Marcon, M., Gummadi, K.P., Druschel, P., Bhattacharjee, B.: Measurement and analysis of online social networks. In: Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, pp. 29–42 (2007)

    Google Scholar 

  13. Potharaju, R., Carbunar, B., Nita-Rotaru, C.: 3-clique attacks in online social networks. Tech. Rep. CERIAS TR 2011-08, Purdue University (2011)

    Google Scholar 

  14. Statista - The Statistic Portal: Number of monthly active Facebook users worldwide. Online at http://www.statista.com/statistics/264810/number-of-monthly-active-facebook-users-worldwide/ (2014). Accessed April 2014

  15. TrendLabs APT Research Team: Spear-phishing email: most favored APT attack bait. Online at http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-spear-phishing-email-most-favored-apt-attack-bait.pdf (2012)

  16. Viswanath, B., Post, A., Gummadi, K.P., Mislove, A.: An analysis of social network-based sybil defenses. ACM SIGCOMM Comput. Commun. Rev. 41(4), 363–374 (2011)

    Google Scholar 

  17. Zhang, C., Sun, J., Zhu, X., Fang, Y.: Privacy and security for online social networks: challenges and opportunities. IEEE Netw. 24, pp. 13–18 (2010)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Massimiliano Albanese .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Deliri, S., Albanese, M. (2015). Security and Privacy Issues in Social Networks. In: Colace, F., De Santo, M., Moscato, V., Picariello, A., Schreiber, F., Tanca, L. (eds) Data Management in Pervasive Systems. Data-Centric Systems and Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-20062-0_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-20062-0_10

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-20061-3

  • Online ISBN: 978-3-319-20062-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics