Skip to main content

2018 | OriginalPaper | Buchkapitel

An Information-Flow Control Model for Online Social Networks Based on User-Attribute Credibility and Connection-Strength Factors

verfasst von : Ehud Gudes, Nadav Voloch

Erschienen in: Cyber Security Cryptography and Machine Learning

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

During the last couple of years there have been many researches on Online Social Networks (OSN). The common manner of representing an OSN is by a user-based graph, where the vertices are different OSN users, and the edges are different interactions between these users, such as friendships, information-sharing instances, and other connection types. The question of whether a certain user is willing to share its information to other users, known and less known, is a question that occupies several researches in aspects of information security, sharing habits and information-flow models for OSN. While many approaches take into consideration the OSN graph edges as sharing-probability factors, here we present a novel approach, that also combines the vertices as well-defined attributed entities, that contain several properties, in which we seek a certain level of credibility based on the user’s attributes, such as number of total friends, age of user account, etc. The edges in our model represent the connection-strength of two users, by taking into consideration the attributes that represent their connection, such as number of mutual friend, friendship duration, etc. and the model also recognizes resemblance factors, meaning the number of similar user attributes. This approach optimizes the evaluation of users’ information-sharing willingness by deriving it from these attributes, thus creating an accurate flow-control graph that prevents information leakage from users to unwanted entities, such as adversaries or spammers. The novelty of the model is mainly its choice of integrated factors for user credibility and connection credibility, making it very useful for different OSN flow-control decisions and security permissions.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Ranjbar, A., Maheswaran, M.: Using community structure to control information sharing in online social networks. Comput. Commun. 41, 11–21 (2014)CrossRef Ranjbar, A., Maheswaran, M.: Using community structure to control information sharing in online social networks. Comput. Commun. 41, 11–21 (2014)CrossRef
3.
Zurück zum Zitat Li, Y., Li, Y., Yan, Q., Deng, R.H.: Privacy leakage analysis in online social networks. Comput. Secur. 49, 239–254 (2015)CrossRef Li, Y., Li, Y., Yan, Q., Deng, R.H.: Privacy leakage analysis in online social networks. Comput. Secur. 49, 239–254 (2015)CrossRef
4.
Zurück zum Zitat Bokobza, Y., Paradise, A., Rapaport, G., Puzis, R., Shapira, B., Shabtai, A.: Leak sinks: the threat of targeted social eavesdropping. In: 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 375–382. IEEE (2015)‏ Bokobza, Y., Paradise, A., Rapaport, G., Puzis, R., Shapira, B., Shabtai, A.: Leak sinks: the threat of targeted social eavesdropping. In: 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 375–382. IEEE (2015)‏
6.
Zurück zum Zitat Misra, G., Such, J.M., Balogun, H.: Improve-identifying minimal profile vectors for similarity-based access control. In: 2016 IEEE Trustcom/BigDataSE/I SPA, pp. 868–875. IEEE (2016) Misra, G., Such, J.M., Balogun, H.: Improve-identifying minimal profile vectors for similarity-based access control. In: 2016 IEEE Trustcom/BigDataSE/I SPA, pp. 868–875. IEEE (2016)
7.
Zurück zum Zitat Benevenuto, F., et al.: Detecting spammers on Twitter. In: Collaboration, Electronic Messaging, Anti-abuse and Spam Conference (CEAS), vol. 6 (2010)‏ Benevenuto, F., et al.: Detecting spammers on Twitter. In: Collaboration, Electronic Messaging, Anti-abuse and Spam Conference (CEAS), vol. 6 (2010)‏
8.
Zurück zum Zitat Zheng, X., et al.: Detecting spammers on social networks. Neurocomputing 159, 27–34 (2015)CrossRef Zheng, X., et al.: Detecting spammers on social networks. Neurocomputing 159, 27–34 (2015)CrossRef
9.
Zurück zum Zitat Han Veiga, M., Eickhoff, C.: A cross-platform collection of social network profiles. In: Proceedings of the 39th International ACM SIGIR Conference on Research and Development in Information Retrieval. ACM (2016)‏ Han Veiga, M., Eickhoff, C.: A cross-platform collection of social network profiles. In: Proceedings of the 39th International ACM SIGIR Conference on Research and Development in Information Retrieval. ACM (2016)‏
10.
Zurück zum Zitat Cohen, Y., Gordon, D., Hendler, D.: Early detection of spamming accounts in large-scale service provider networks. Knowl. Based Syst. 142, 241–255 (2017)‏CrossRef Cohen, Y., Gordon, D., Hendler, D.: Early detection of spamming accounts in large-scale service provider networks. Knowl. Based Syst. 142, 241–255 (2017)‏CrossRef
11.
Zurück zum Zitat Cohen, Y., Hendler, D., Rubin, A.: Detection of malicious webmail attachments based on propagation patterns. Knowl. Based Syst. 141, 67–79 (2018)CrossRef Cohen, Y., Hendler, D., Rubin, A.: Detection of malicious webmail attachments based on propagation patterns. Knowl. Based Syst. 141, 67–79 (2018)CrossRef
13.
Zurück zum Zitat Edmonds, J., Karp, R.M.: Theoretical improvements in algorithmic efficiency for network flow problems. J. ACM. 19(2), 248–264 (1972). Association for Computing MachineryCrossRef Edmonds, J., Karp, R.M.: Theoretical improvements in algorithmic efficiency for network flow problems. J. ACM. 19(2), 248–264 (1972). Association for Computing MachineryCrossRef
14.
Zurück zum Zitat Dinic, Y.: Algorithm for solution of a problem of maximum flow in a network with power estimation. Doklady Akademii nauk SSSR 11, 1277–1280 (1970) Dinic, Y.: Algorithm for solution of a problem of maximum flow in a network with power estimation. Doklady Akademii nauk SSSR 11, 1277–1280 (1970)
Metadaten
Titel
An Information-Flow Control Model for Online Social Networks Based on User-Attribute Credibility and Connection-Strength Factors
verfasst von
Ehud Gudes
Nadav Voloch
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-94147-9_5

Premium Partner