Skip to main content
Log in

A machine learning framework for security and privacy issues in building trust for social networking

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Technological advancement has led to a dynamic change in how people interact. The interaction can be classified as—social networks (virtual) and real-life (physical) interaction. The relationships among nodes of social networks depend on communication among nodes and have been established by transmitting messages publicly or privately, depending on the trust among nodes. However, it poses three main challenges: (i) nodes can reveal their private message, (ii) private conversation among nodes can be hacked, and (iii) stored messages can be sent to another node, therefore, compromising privacy. The paper presents a privacy-preserving model using two major techniques, Binomial Distribution and Fuzzy Logic. This process has been followed by building predictive models using machine learning to provide potential directions to mitigate security threats posed to social networking platforms. The paper also provides a wholesome discussion of model design for predictive modelling, whereas most state-of-the-art techniques were primarily concerned about delivering potential directions for predictive modelling. The employed statistical and predictive modelling techniques suggest that friendship relationships in real life among people would transcend to ensure a secure and privacy-preserving relationship among them on social networks. Empirical results indicated that XG Boost supersedes the state-of-the-art models by achieving a predictive accuracy of 92.035%. In contrast, introducing new statistical features improves the performance of all our predictive models.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Data availability

The datasets generated during and/or analysed during the current study are available in the “Who is a Friend?” at Kaggle.com, Available at: https://www.kaggle.com/c/whoisafriend/data. This is also mentioned under Reference Section at Ref. [23].

References

  1. Jin, L., Joshi, J., Anwar, M.: Mutual-friend based attacks in social network systems. Comput. Secur. 37, 15–30 (2013)

    Article  Google Scholar 

  2. Meziani, L.: Foundations Of Mathematical Analysis And Semigroups Theory. Ptolemy Scientific Research Press, Batna (2021)

    Google Scholar 

  3. Deo, N.: Graph Theory with Applications to Engineering and Computer Science. Dover Publications, Mineola (2017)

    MATH  Google Scholar 

  4. Jehangiri, A.I., Maqsood, T., Umar, A.I., Shuja, J., Ahmad, Z., Dhaou, I.B., Alsharekh, M.F.: LiMPO: lightweight mobility prediction and offloading framework using machine learning for mobile edge computing. Clust. Comput. (2022). https://doi.org/10.1007/s10586-021-03518-7

    Article  Google Scholar 

  5. Vaziripour, E., Howard, D., Tyler, J., O'Neill, M., Wu, J., Seamons, K., Zappala, D.: I Don't Even Have to Bother Them!. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (2019)

  6. Trigo, J., Rubio, Ó., Martínez-Espronceda, M., Alesanco, Á., García, J., Serrano-Arriezu, L.: Building standardized and secure mobile health services based on social media. Electronics 9(12), 2208 (2020)

    Article  Google Scholar 

  7. Tadesse, M., Lin, H., Xu, B., Yang, L.: Personality predictions based on user behavior on the Facebook social media platform. IEEE Access 6, 61959–61969 (2018)

    Article  Google Scholar 

  8. Van Der Walt, E., Eloff, J.: Using machine learning to detect fake identities: bots vs humans. IEEE Access 6, 6540–6549 (2018)

    Article  Google Scholar 

  9. Bachi, G., Coscia, M., Monreale, A., Giannotti, F.: Classifying trust/distrust relationships in online social networks. In: 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Conference on Social Computing, pp. 552–557. IEEE (2012)

  10. Zolfaghar, K., Aghaie, A.: Mining trust and distrust relationships in social Web applications. In: Proceedings of the 2010 IEEE 6th International Conference on Intelligent Computer Communication and Processing, pp. 73–80. IEEE (2010)

  11. Gilbert, E., Karahalios, K.: Predicting tie strength with social media. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 211–220 (2009)

  12. Fire, M., Kagan, D., Elyashar, A., Elovici, Y.: Friend or foe? Fake profile identification in online social networks. Soc. Netw. Anal. Min. (2014). https://doi.org/10.1007/s13278-014-0194-4

    Article  Google Scholar 

  13. Graña, M., Nuñez-Gonzalez, J., Ozaeta, L., Kamińska-Chuchmała, A.: Experiments of trust prediction in social networks by artificial neural networks. Cybern. Syst. 46(1–2), 19–34 (2015)

    Article  Google Scholar 

  14. Alsmadi, I., Al Abdullah, M.: A model for reputation rank in online social networks and its applications. Int. J. Soc. Netw. Min. 3(1), 77 (2020)

    Article  Google Scholar 

  15. Adali, S., Escriva, R., Goldberg, M., Hayvanovych, M., Magdon-Ismail, M., Szymanski, B., Wallace, W., Williams, G. Measuring behavioral trust in social networks. In: 2010 IEEE International Conference on Intelligence and Security Informatics (2010)

  16. Bapna, R., Gupta, A., Rice, S., Sundararajan, A.: Trust and the strength of ties in online social networks: an exploratory field experiment. MIS Q. 41(1), 115–130 (2017)

    Article  Google Scholar 

  17. Anis, C.: Asymmetric and symmetric cryptography to secure social network media communication: the case of android-based E-learning software. Int. Res. J. Comput. Sci. 4, 01–08 (2018)

    Google Scholar 

  18. Dhurandher, S.K., Kumar, A., Obaidat, M.S.: Cryptography-based misbehavior detection and trust control mechanism for opportunistic network systems. IEEE Syst. J. 12(4), 3191–3202 (2017)

    Article  Google Scholar 

  19. Alguliyev, R.M., Aliguliyev, R.M., Sukhostat, L.V.: Efficient algorithm for big data clustering on single machine. CAAI Trans. Intell. Technol. 5(1), 9–14 (2019)

    Article  Google Scholar 

  20. Soleymani, S.A., Abdullah, A.H., Zareei, M., Anisi, M.H., Vargas-Rosales, C., Khan, M.K., Goudarzi, S.: A secure trust model based on fuzzy Logic in vehicular ad hoc networks with fog computing. IEEE Access 5, 15619–15629 (2017)

    Article  Google Scholar 

  21. He, Y., Liang, C., Yu, F.R., Han, Z.: Trust-based social networks with computing, caching and communications: a deep reinforcement learning approach. IEEE Trans. Netw. Sci. Eng. 7(1), 66–79 (2018)

    Article  Google Scholar 

  22. Kumar, M.S., Choudhary, A., Gupta, I., Jana, P.K.: An efficient resource provisioning algorithm for workflow execution in cloud platform. Clust. Comput. (2022). https://doi.org/10.1007/s10586-022-03648-6

    Article  Google Scholar 

  23. Kaggle.com. Who is a Friend? | Kaggle. https://www.kaggle.com/c/whoisafriend/data (2021). Accessed Sept 2021

  24. Aggarwal, C.: Linear Algebra And Optimization For Machine Learning. Springer, Berlin (2020)

    Book  MATH  Google Scholar 

  25. Filippetto, A., Lima, R., Barbosa, J.: A risk prediction model for software project management based on similarity analysis of context histories. Inf. Softw. Technol. 131, 106497 (2021)

    Article  Google Scholar 

  26. Satam, S., Satam, P., Pacheco, J., Hariri, S.: Security framework for smart cyber infrastructure. Clust. Comput. 25, 2767–2778 (2022)

    Article  Google Scholar 

  27. Dupont, D., Barbosa, J., Alves, B.: CHSPAM: a multi-domain model for sequential pattern discovery and monitoring in contexts histories. Pattern Anal. Appl. 23(2), 725–734 (2019)

    Article  Google Scholar 

  28. McKee, D.W., Clement, S.J., Almutairi, J., Xu, J.: Survey of advances and challenges in intelligent autonomy for distributed cyber-physical systems. CAAI Trans. Intell. Technol. 3(2), 75–82 (2018)

    Article  Google Scholar 

  29. scikit-learn. sklearn.preprocessing.LabelEncoder. https://scikit-learn.org/stable/modules/generated/sklearn.preprocessing.LabelEncoder.html (2021). Accessed Sept 2021

  30. scikit-learn. sklearn.preprocessing.OneHotEncoder. https://scikit-learn.org/stable/modules/generated/sklearn.preprocessing.OneHotEncoder.html (2021). Accessed Sept 2021

  31. Scikit-learn.org. scikit-learn: machine learning in Python—scikit-learn 0.16.1 documentation. https://scikit-learn.org/ (2021). Accessed Sept 2021

  32. scikit-learn. sklearn.preprocessing.RobustScaler. https://scikit-learn.org/stable/modules/generated/sklearn.preprocessing.RobustScaler.html (2021). Accessed Sept 2021

  33. Chen, T., Guestrin, C. XGBoost. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2016)

  34. Friedman, J.: Stochastic gradient boosting. Comput. Stat. Data Anal. 38(4), 367–378 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  35. Machado, M., Karray, S., de Sousa, I.: LightGBM: an effective decision tree gradient boosting method to predict customer loyalty in the finance industry. In: 14th International Conference on Computer Science & Education (ICCSE) (2019)

  36. Hilbe, J.M.: Practical Guide to Logistic Regression. CRC Press, Boca Raton (2016)

    Book  MATH  Google Scholar 

  37. Hehn, T., Kooij, J., Hamprecht, F.: End-to-end learning of decision trees and forests. Int. J. Comput. Vis. 128(4), 997–1011 (2019)

    Article  MathSciNet  MATH  Google Scholar 

  38. Rathor, S., Hasan, A., Omar, A.: Identification of missing person using fusion of KNN and SVM approach. In: Singh, P.K., Singh, Y. (eds.) Recent Innovations in Computing, pp. 537–545. Springer, Singapore (2022)

    Chapter  Google Scholar 

  39. Zandian, Z.K., Keyvanpour, M.R.: Feature extraction method based on social network analysis. Appl. Artif. Intell. 33(8), 669–688 (2019)

    Article  Google Scholar 

  40. Altameem, A., Poonia, R.C., Kumar, A., Raja, L., Saudagar, A.K.J.: P-ROCK: a sustainable clustering algorithm for large categorical datasets. Intell. Autom. Soft Comput. 35(1), 553–566 (2023)

    Article  Google Scholar 

  41. Shekhar, S., Singh, A., Gupta, A.K.: A deep neural network (DNN) approach for recommendation systems. In: Gao, X.-Z., Tiwari, S. (eds.) Advances in Computational Intelligence and Communication Technology, pp. 385–396. Springer, Singapore (2022)

    Chapter  Google Scholar 

  42. Rathor, S., Agrawal, S.: A robust model for domain recognition of acoustic communication using Bidirectional LSTM and deep neural network. Neural Comput. Appl. 33(17), 11223–11232 (2021)

    Article  Google Scholar 

Download references

Funding

The work experimented in this paper did not receive any funds or financial support from any agency or institution.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rahul Kumar.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bhadoria, R.S., Bhoj, N., Srivastav, M.K. et al. A machine learning framework for security and privacy issues in building trust for social networking. Cluster Comput 26, 3907–3930 (2023). https://doi.org/10.1007/s10586-022-03787-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-022-03787-w

Keywords

Navigation