Skip to main content

RAMID: A Novel Risk Assessment Model of Information Dissemination on Social Network

  • Conference paper
  • First Online:
Trustworthy Computing and Services (ISCTCS 2014)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 520))

Included in the following conference series:

  • 935 Accesses

Abstract

In recent years, a large number of social applications created new challenges to inhibit the spread of false information. And how to evaluate the threats of the false information dissemination remains one of the major concerns in the Internet security issues. Existing schemes focused on the operational safety of information systems and ignored the importance of assessment of false information dissemination. In this paper, we propose a novel method to evaluate the threat of false information dissemination. By analyzing social network application’s structure and the information transmission mode, it proposed a risk assessment model for the false information dissemination. With this model, it is easy to evaluate and estimate the level of risks in social applications. Experiment verifies the effectiveness and correctness of this model in providing security recommendations and finding the most dangerous risk point.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yan, M.X.G.: Electric systems analysis (2004)

    Google Scholar 

  2. Li, Y., Liu, J.: Mechanism and improvement of direct anonymous attestation scheme [j]. J. Henan Univ. (Nat. Sci.) 37(2), 195–197 (2007)

    Google Scholar 

  3. Cohen, J.E.: DRM and privacy. Commun. ACM 46(4), 46–49 (2003)

    Article  Google Scholar 

  4. Das, M.L., Saxena, A., Gulati, V.P.: A dynamic id-based remote user authentication scheme. IEEE Trans. Consum. Electron. 50(2), 629–631 (2004)

    Article  Google Scholar 

  5. Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: 2010 Proceedings IEEE INFOCOM, pp. 1–9. IEEE (2010)

    Google Scholar 

  6. Budak, C., Agrawal, D., El Abbadi, A.: Limiting the spread of misinformation in social networks. In: Proceedings of the 20th international conference on World wide web, pp. 665–674. ACM (2011)

    Google Scholar 

  7. Bass, T.: Intrusion detection systems and multisensor data fusion. Commun. ACM 43(4), 99–105 (2000)

    Article  Google Scholar 

  8. Shen, Z., Zhang, B., Li, F.: Research of internet governance based on harmful information propagation model (2010)

    Google Scholar 

  9. Feng, D.G., Zhang, Y., Zhang, Y.Q.: Survey of information security risk assessment. J. China Inst. Commun. 25(7), 10–18 (2004)

    Google Scholar 

  10. Zhang, T., Hu, M.Z., Yun, X.C., Zhang, Y.Z.: Research on computer network security analysis model. J. China Inst. Commun. 26(12), 100–109 (2005)

    Google Scholar 

  11. Joshi, J.B., Aref, W.G., Ghafoor, A., Spafford, E.H.: Security models for web-based applications. Commun. ACM 44(2), 38–44 (2001)

    Article  Google Scholar 

  12. Zhang, Y.Z., Fang, B.X., Chi, Y., Yun, X.C.: Risk propagation model for assessing network information systems. J. Softw. 18(1), 137–145 (2007)

    Article  MATH  Google Scholar 

  13. Le, K., Jiwu, J., Yuewu, W.: The trust expansion and control in social network service. J. Comput. Res. Dev. 47(9), 1611–1621 (2010)

    Google Scholar 

  14. Saaty, T.L.: How to make a decision: the analytic hierarchy process. Eur. J. Oper. Res. 48(1), 9–26 (1990)

    Article  MATH  Google Scholar 

Download references

Acknowledgment

This work was supported by The National Science and Technology Support Program (Grant No. 2012BAH46B02); the National Natural Science Foundation (Grant No. 61402464,61402474).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaoqian Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sha, H., Li, X., Liu, Q., Zhou, Z., Zhang, L., Wang, L. (2015). RAMID: A Novel Risk Assessment Model of Information Dissemination on Social Network. In: Yueming, L., Xu, W., Xi, Z. (eds) Trustworthy Computing and Services. ISCTCS 2014. Communications in Computer and Information Science, vol 520. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-47401-3_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-47401-3_39

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-47400-6

  • Online ISBN: 978-3-662-47401-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics