Skip to main content

Security and Privacy in Online Social Networks: Optimization Perspectives

  • Chapter
  • First Online:
Handbook of Optimization in Complex Networks

Part of the book series: Springer Optimization and Its Applications ((SOIA,volume 58))

Abstract

Recently, Online Social Networks (OSNs) becomes one of the most remarkable technologies in the twenty-first century since it has been extraordinarily popular with over 200 million users. Security and privacy problems are the most important issues in OSNs. In this chapter, we introduced the optimization of security and privacy problems in OSNs. We characterized three existing works with different targets to give a view of this problem.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. L. Adamic and E. Adar (2005) How to search a social network. Social Networks, vol. 27, no. 3, pp. 187C203

    Google Scholar 

  2. L. Backstrom et al. (2006) Group formation in large social networks: membership, growth, and evolution. KDD

    Google Scholar 

  3. J. Brickell and V. Shmatikov (2005) Privacy-preserving graph algorithms in the semi-honest model. In ASIACRYPT, LNCS, pages 236C252

    Google Scholar 

  4. T. Cormen, C. Leiserson, and R. Rivest (1990) Introduction to Algorithms. MIT Press

    Google Scholar 

  5. S. Gariss, M. Kaminsky, M. J. Freedman, B. Karp, D. Mazieres, and H. Yu (2006) Re: Reliable email

    Google Scholar 

  6. R. Gross and A. Acquisti (2005) Information revelation and privacy in online social networks. In WPES 05: Proceedings of the 2005 ACM workshop on Privacy in the electronic society, pages 71C80, ACM.

    Google Scholar 

  7. O. Goldreich: Foundations of Cryptography (2004) Volume II (Basic Applications). Cambridge University Press

    Google Scholar 

  8. Google co-op. http://www.google.com/coop/.

  9. M. Hay, G. Miklau, D.Jensen, D. Towsely and P. Weis (2008) Resisting structural re-identification in anonymized social networks. Proc. of VLDB

    Google Scholar 

  10. Q. Huang, H.J. Wang, and N. Borisov (2005) Privacy-Preserving Friends Troubleshooting Network. Proc. of NDSS

    Google Scholar 

  11. H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman (2006) Sybilguard: defending against sybil attacks via social networks. In SIGCOMM 06: Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications, pages 267C278, New York, NY, USA, ACM.

    Google Scholar 

  12. J. M. Kleinberg (1999) Authoritative sources in a hyperlinked environment. J. ACM, 46(5):604C632

    Google Scholar 

  13. G. Kossinets and D. J. Watts (2006) Empirical analysis of an evolving social network. Science, vol. 311, no. 5757, pp. 88C90

    Google Scholar 

  14. R. Kumar et al. (2006) Structure and evolution of online social networks. KDD

    Google Scholar 

  15. Y. Lindell and B. Pinkas: Privacy preserving data mining (2002) J. Cryptology, 15(3):177–206

    Google Scholar 

  16. K. Liu, and E. Terzi:Towards identity anonymization on graphs (2008) Proc. of SIGMOD

    Google Scholar 

  17. L. Liu, J. Wang, J. Liu, and J. Zhang: Privacy preserving in social networks against sensitive edge disclosure (2008) Technical Report Technical Report CMIDA-HiPSCCS 006-08, Department of Computer Science, University of Kentucky, KY

    Google Scholar 

  18. A. Mislove, K.P. Gummadi, and P. Druschel (2006) Exploiting social networks for internet search. Proc. of HotNets

    Google Scholar 

  19. A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee (2007) Measurement and analysis of online social networks. In IMC 07: Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, pages 29C42, New York, NY, USA, ACM.

    Google Scholar 

  20. Mozillacoop. http://www.mozilla.com.

  21. A. Narayanan and V. Shmatikov (2008) Robust de-anonymization of large sparse datasets. Proc. of IEEE S&P.

    Google Scholar 

  22. J. Pouwelse, P. Garbacki, J. Wang, A. Bakker, J. Yang, A. Iosup, D. Epema, M. Reinders, M. Van Steen, and H. Sips (2008) Tribler: a social-based peer-to-peer system. Concurrency And Computation

    Google Scholar 

  23. K. P. N. Puttaswamy, A. Sala and B.Y. Zhao (2009) Starclique: Guaranteeing user privacy in social networks against intersection attacks. Proc. of ACM CoNEXT

    Google Scholar 

  24. Stumbleupon. http://www.stumbleupon.com

  25. J. Sun, X. Zhu, and Y. Fang (2010) A privacy-preserving scheme for online social networks with efficient revocation. Proc. of IEEE INFOCOM 2010, pages 1C9

    Google Scholar 

  26. Yahoo! myweb. http://myweb2.search.yahoo.com.

  27. B. Zhou, and J. Pei (2008) Preserving privacy in social networks against neighborhood attacks. Proc. of ICDE

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ling Ding .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Ding, L., Du, H., Wu, W. (2012). Security and Privacy in Online Social Networks: Optimization Perspectives. In: Thai, M., Pardalos, P. (eds) Handbook of Optimization in Complex Networks. Springer Optimization and Its Applications(), vol 58. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-0857-4_16

Download citation

Publish with us

Policies and ethics