Skip to main content
Log in

Novel assessment method for accessing private data in social network security services

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

    We’re sorry, something doesn't seem to be working properly.

    Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Abstract

Social network services (SNSs) have become one of the core Internet-based application services in recent years. Through SNSs, diverse kinds of private data are shared with users’ friends and SNS plug-in applications. However, these data can be exposed via abnormal private data access. For example, the addition of fake friends to a user’s account is one approach to gain access to a private user’s data. Private user data can be protected from being accessed by using an automated method to assess information. This paper proposes a method that evaluates private data accesses for social network security. By defining normal private data access patterns in advance, abnormal private data access patterns can be exposed. Normal private data access patterns are generated by analyzing all of the consecutive private data accesses of users based on Bayesian probability. We have proven the effectiveness of our approach by conducting experiments where the private data access signals of Twitter accounts were collected and analyzed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Anderson J, Stajano F (2013) Must social networking conflict with privacy? IEEE Secur Priv 11(3):51–60

    Article  Google Scholar 

  2. Krishnamurthy B (2013) Privacy and online social networks: can colorless green ideas sleep furiously? IEEE Secur Priv 11(3):14–20

    Article  Google Scholar 

  3. Gurses S, Diaz C (2013) Two tales of privacy in online social networks. IEEE Secur Priv 11(3):29–37

    Article  Google Scholar 

  4. Huber M, Mulazzani M, Kitzler G, Goluch S, Weippl E (2011) Friend-in-the-middle attacks: exploiting social networking sites for spam. IEEE Internet Comput 15(3):28–34

    Article  Google Scholar 

  5. Irani D, Webb S, Pu C, Li K (2011) Modeling unintended personal-information leakage from multiple online social networks. IEEE Internet Comput 15(3):13–19

    Article  Google Scholar 

  6. Li N, Zhang N, Das SK (2011) Preserving relation privacy in online social network data. IEEE Internet Comput 15(3):35–42

    Article  Google Scholar 

  7. Zilpelwar RA, Bedi RK, Wadhai V (2012) An overview of privacy and security in sns. Int J P2P Netw Trends Technol 2(1):23–26

  8. Rainie L, Kiesler S, Kang R, Madden M, Duggan M, Brown S, Dabbish L (2013) Anonymity, privacy, and security online. Pew ResearchCenter. http://pewinternet.org/Reports/2013/Anonymity-online.aspx

  9. Liang X, Zhang K, Shen X, Lin X (2014) Security and privacy in mobile social networks: challenges and solutions. IEEE Wirel Commun 21(1):33–41

    Article  Google Scholar 

  10. Pranevicius H, Sutiene K (2007) Scenario tree generation by clustering the simulated data paths. In: Proceeding of the 21st European Conference on Modeling and Simulation, Prague, Czech Republic, 4–6 June

  11. Grois E, Hsu WH, Voloshin M, Wilkins DC Bayesian network models for generation of crisis management training scenarios. In: Proceedings of the Fifteenth National/Tenth Conference on Artificial Intelligence/Innovative Applications of Artificial Intelligence, pp 1113–1120

  12. Kuchler C, Vigerske S (2007) Decomposition of multistage stochastic programs with recombining scenario trees. Technical Report, Humboldt University

  13. Høyland K, Kaut M, Wallace SW (2001) Generating scenario trees for multistage decision problems. Manag Sci 47(2):295–307

    Article  MATH  Google Scholar 

  14. Sung Y, Helal A, Lee JW, Cho K (2013) Bayesian-based scenario generation method for human activities. In: 2013 ACM SIGSIM Conference on Principles of Advanced Discrete Simulation (PADS), May 19–20 2013, Montreal, Quebec, Canada, pp 147–157

  15. Simone F-H, Stefan B (2013) Chapter 43—privacy-enhancing technologies. In: Vacca JR (ed) Computer and information security handbook, 2nd edn. Morgan Kaufmann, Boston, pp 755–772

    Google Scholar 

  16. Ian G (2007) Privacy enhancing technologies for the internet III: ten years later. In: Digital privacy: theory, technologies and practices. Auerbach Publications, New York, pp 3–18

  17. Sweeney L (1997) Weaving technology and policy together to maintain confidentiality. J Law Med Ethics 25(2–3):98–110

    Article  Google Scholar 

  18. Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam M (2007) L-diversity: privacy beyond k-anonymity. ACM Trans Knowl Discov Data 1(1):24. doi:10.1145/1217299.1217300

  19. Polakis I, Maggi F, Zanero S, Keromytis AD (2014) Security and privacy measurements in social networks: experiences and lessons learned. In: Proceedings of the 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS, vol 14. doi:10.1109/BADGERS.2014.9

  20. Joshi P, Kuo CJ (2011) Security and privacy in online social networks: a survey. In: Multimedia and Expo (ICME), IEEE International Conference on 2011. IEEE, July 2011, pp 1–6

  21. Chakraborty R, Vishik C, Rao HR (2013) Privacy preserving actions of older adults on social media: exploring the behavior of opting out of information sharing. Decision support systems. Decis Support Syst 55(4):948–956

    Article  Google Scholar 

  22. Pimenta PC, De Freitas CM (2010) Security and privacy analysis in social network services. In: Information Systems and Technologies (CISTI), 5th Iberian Conference on 2010. IEEE, June 2010, pp 1–6

  23. Zhang K, Liang X, Shen X, Lu R (2014) Exploiting multimedia services in mobile social networks from security and privacy perspectives. Commun Mag IEEE 52(3):58–65

    Article  Google Scholar 

Download references

Acknowledgements

This research was supported by the Ministry of Science, ICT and Future Planning (MSIP), Korea, under the Information Technology Research Center (ITRC) support program (IITP-2016-H8501-16-1014) supervised by the Institute for Information and communications Technology Promotion (IITP). This work was also supported by the Dongguk University Research Fund of 2016 and the National Research Foundation of Korea’s (NRF) Basic Science Research Program, which is funded by the Ministry of Education (NRF-2016R1D1A1A09919318).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gangman Yi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Park, J.H., Sung, Y., Sharma, P.K. et al. Novel assessment method for accessing private data in social network security services. J Supercomput 73, 3307–3325 (2017). https://doi.org/10.1007/s11227-017-2018-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-017-2018-6

Keywords

Navigation