Abstract
Technological advancement has led to a dynamic change in how people interact. The interaction can be classified as—social networks (virtual) and real-life (physical) interaction. The relationships among nodes of social networks depend on communication among nodes and have been established by transmitting messages publicly or privately, depending on the trust among nodes. However, it poses three main challenges: (i) nodes can reveal their private message, (ii) private conversation among nodes can be hacked, and (iii) stored messages can be sent to another node, therefore, compromising privacy. The paper presents a privacy-preserving model using two major techniques, Binomial Distribution and Fuzzy Logic. This process has been followed by building predictive models using machine learning to provide potential directions to mitigate security threats posed to social networking platforms. The paper also provides a wholesome discussion of model design for predictive modelling, whereas most state-of-the-art techniques were primarily concerned about delivering potential directions for predictive modelling. The employed statistical and predictive modelling techniques suggest that friendship relationships in real life among people would transcend to ensure a secure and privacy-preserving relationship among them on social networks. Empirical results indicated that XG Boost supersedes the state-of-the-art models by achieving a predictive accuracy of 92.035%. In contrast, introducing new statistical features improves the performance of all our predictive models.
Similar content being viewed by others
Data availability
The datasets generated during and/or analysed during the current study are available in the “Who is a Friend?” at Kaggle.com, Available at: https://www.kaggle.com/c/whoisafriend/data. This is also mentioned under Reference Section at Ref. [23].
References
Jin, L., Joshi, J., Anwar, M.: Mutual-friend based attacks in social network systems. Comput. Secur. 37, 15–30 (2013)
Meziani, L.: Foundations Of Mathematical Analysis And Semigroups Theory. Ptolemy Scientific Research Press, Batna (2021)
Deo, N.: Graph Theory with Applications to Engineering and Computer Science. Dover Publications, Mineola (2017)
Jehangiri, A.I., Maqsood, T., Umar, A.I., Shuja, J., Ahmad, Z., Dhaou, I.B., Alsharekh, M.F.: LiMPO: lightweight mobility prediction and offloading framework using machine learning for mobile edge computing. Clust. Comput. (2022). https://doi.org/10.1007/s10586-021-03518-7
Vaziripour, E., Howard, D., Tyler, J., O'Neill, M., Wu, J., Seamons, K., Zappala, D.: I Don't Even Have to Bother Them!. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (2019)
Trigo, J., Rubio, Ó., Martínez-Espronceda, M., Alesanco, Á., García, J., Serrano-Arriezu, L.: Building standardized and secure mobile health services based on social media. Electronics 9(12), 2208 (2020)
Tadesse, M., Lin, H., Xu, B., Yang, L.: Personality predictions based on user behavior on the Facebook social media platform. IEEE Access 6, 61959–61969 (2018)
Van Der Walt, E., Eloff, J.: Using machine learning to detect fake identities: bots vs humans. IEEE Access 6, 6540–6549 (2018)
Bachi, G., Coscia, M., Monreale, A., Giannotti, F.: Classifying trust/distrust relationships in online social networks. In: 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Conference on Social Computing, pp. 552–557. IEEE (2012)
Zolfaghar, K., Aghaie, A.: Mining trust and distrust relationships in social Web applications. In: Proceedings of the 2010 IEEE 6th International Conference on Intelligent Computer Communication and Processing, pp. 73–80. IEEE (2010)
Gilbert, E., Karahalios, K.: Predicting tie strength with social media. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 211–220 (2009)
Fire, M., Kagan, D., Elyashar, A., Elovici, Y.: Friend or foe? Fake profile identification in online social networks. Soc. Netw. Anal. Min. (2014). https://doi.org/10.1007/s13278-014-0194-4
Graña, M., Nuñez-Gonzalez, J., Ozaeta, L., Kamińska-Chuchmała, A.: Experiments of trust prediction in social networks by artificial neural networks. Cybern. Syst. 46(1–2), 19–34 (2015)
Alsmadi, I., Al Abdullah, M.: A model for reputation rank in online social networks and its applications. Int. J. Soc. Netw. Min. 3(1), 77 (2020)
Adali, S., Escriva, R., Goldberg, M., Hayvanovych, M., Magdon-Ismail, M., Szymanski, B., Wallace, W., Williams, G. Measuring behavioral trust in social networks. In: 2010 IEEE International Conference on Intelligence and Security Informatics (2010)
Bapna, R., Gupta, A., Rice, S., Sundararajan, A.: Trust and the strength of ties in online social networks: an exploratory field experiment. MIS Q. 41(1), 115–130 (2017)
Anis, C.: Asymmetric and symmetric cryptography to secure social network media communication: the case of android-based E-learning software. Int. Res. J. Comput. Sci. 4, 01–08 (2018)
Dhurandher, S.K., Kumar, A., Obaidat, M.S.: Cryptography-based misbehavior detection and trust control mechanism for opportunistic network systems. IEEE Syst. J. 12(4), 3191–3202 (2017)
Alguliyev, R.M., Aliguliyev, R.M., Sukhostat, L.V.: Efficient algorithm for big data clustering on single machine. CAAI Trans. Intell. Technol. 5(1), 9–14 (2019)
Soleymani, S.A., Abdullah, A.H., Zareei, M., Anisi, M.H., Vargas-Rosales, C., Khan, M.K., Goudarzi, S.: A secure trust model based on fuzzy Logic in vehicular ad hoc networks with fog computing. IEEE Access 5, 15619–15629 (2017)
He, Y., Liang, C., Yu, F.R., Han, Z.: Trust-based social networks with computing, caching and communications: a deep reinforcement learning approach. IEEE Trans. Netw. Sci. Eng. 7(1), 66–79 (2018)
Kumar, M.S., Choudhary, A., Gupta, I., Jana, P.K.: An efficient resource provisioning algorithm for workflow execution in cloud platform. Clust. Comput. (2022). https://doi.org/10.1007/s10586-022-03648-6
Kaggle.com. Who is a Friend? | Kaggle. https://www.kaggle.com/c/whoisafriend/data (2021). Accessed Sept 2021
Aggarwal, C.: Linear Algebra And Optimization For Machine Learning. Springer, Berlin (2020)
Filippetto, A., Lima, R., Barbosa, J.: A risk prediction model for software project management based on similarity analysis of context histories. Inf. Softw. Technol. 131, 106497 (2021)
Satam, S., Satam, P., Pacheco, J., Hariri, S.: Security framework for smart cyber infrastructure. Clust. Comput. 25, 2767–2778 (2022)
Dupont, D., Barbosa, J., Alves, B.: CHSPAM: a multi-domain model for sequential pattern discovery and monitoring in contexts histories. Pattern Anal. Appl. 23(2), 725–734 (2019)
McKee, D.W., Clement, S.J., Almutairi, J., Xu, J.: Survey of advances and challenges in intelligent autonomy for distributed cyber-physical systems. CAAI Trans. Intell. Technol. 3(2), 75–82 (2018)
scikit-learn. sklearn.preprocessing.LabelEncoder. https://scikit-learn.org/stable/modules/generated/sklearn.preprocessing.LabelEncoder.html (2021). Accessed Sept 2021
scikit-learn. sklearn.preprocessing.OneHotEncoder. https://scikit-learn.org/stable/modules/generated/sklearn.preprocessing.OneHotEncoder.html (2021). Accessed Sept 2021
Scikit-learn.org. scikit-learn: machine learning in Python—scikit-learn 0.16.1 documentation. https://scikit-learn.org/ (2021). Accessed Sept 2021
scikit-learn. sklearn.preprocessing.RobustScaler. https://scikit-learn.org/stable/modules/generated/sklearn.preprocessing.RobustScaler.html (2021). Accessed Sept 2021
Chen, T., Guestrin, C. XGBoost. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2016)
Friedman, J.: Stochastic gradient boosting. Comput. Stat. Data Anal. 38(4), 367–378 (2002)
Machado, M., Karray, S., de Sousa, I.: LightGBM: an effective decision tree gradient boosting method to predict customer loyalty in the finance industry. In: 14th International Conference on Computer Science & Education (ICCSE) (2019)
Hilbe, J.M.: Practical Guide to Logistic Regression. CRC Press, Boca Raton (2016)
Hehn, T., Kooij, J., Hamprecht, F.: End-to-end learning of decision trees and forests. Int. J. Comput. Vis. 128(4), 997–1011 (2019)
Rathor, S., Hasan, A., Omar, A.: Identification of missing person using fusion of KNN and SVM approach. In: Singh, P.K., Singh, Y. (eds.) Recent Innovations in Computing, pp. 537–545. Springer, Singapore (2022)
Zandian, Z.K., Keyvanpour, M.R.: Feature extraction method based on social network analysis. Appl. Artif. Intell. 33(8), 669–688 (2019)
Altameem, A., Poonia, R.C., Kumar, A., Raja, L., Saudagar, A.K.J.: P-ROCK: a sustainable clustering algorithm for large categorical datasets. Intell. Autom. Soft Comput. 35(1), 553–566 (2023)
Shekhar, S., Singh, A., Gupta, A.K.: A deep neural network (DNN) approach for recommendation systems. In: Gao, X.-Z., Tiwari, S. (eds.) Advances in Computational Intelligence and Communication Technology, pp. 385–396. Springer, Singapore (2022)
Rathor, S., Agrawal, S.: A robust model for domain recognition of acoustic communication using Bidirectional LSTM and deep neural network. Neural Comput. Appl. 33(17), 11223–11232 (2021)
Funding
The work experimented in this paper did not receive any funds or financial support from any agency or institution.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Bhadoria, R.S., Bhoj, N., Srivastav, M.K. et al. A machine learning framework for security and privacy issues in building trust for social networking. Cluster Comput 26, 3907–3930 (2023). https://doi.org/10.1007/s10586-022-03787-w
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-022-03787-w