Skip to main content
Top
Published in: Cluster Computing 3/2019

10-10-2017

A framework for secure and privacy protected collaborative contents sharing using public OSN

Authors: Shaukat Ali, Azhar Rauf, Naveed Islam, Haleem Farman

Published in: Cluster Computing | Special Issue 3/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

A major issue thoroughly raised and potentially vulnerable in online social networks (OSNs) is the user privacy preservation. Generally, the issue of privacy is tackled from the user point of view without considering the service providers and the third-party data collectors, who can manipulate user data for third party advertisement and behavioral analysis. Therefore, the privacy risk exists not only from the unauthorized users but also from the OSN service providers. To secure data from both the unauthorized users and OSN service providers a framework for collaborative contents sharing is proposed. In the proposed framework, contents are secured at the time of data dissemination and provided assurance about the data sharing among the legitimate users based on collaborative contents sharing. The proposed framework assures not only the confidentiality of contents but also the privacy of data owner and co-owners in OSN. An architecture is provided to support the theoretical and practical basis for the proposed framework; which exhibits the objective of preserving user and contents privacy.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Ashtari, S.: I know who you are and i saw what you did: social networks and the death of privacy. J. Inf. Priv. Secur. 9(4), 80–82 (2013) Ashtari, S.: I know who you are and i saw what you did: social networks and the death of privacy. J. Inf. Priv. Secur. 9(4), 80–82 (2013)
2.
go back to reference Baden, R., Bender, A., Spring, N., Bhattacharjee, B., Starin, D.: Persona: an online social network with user-defined privacy. In: ACM SIGCOMM Computer Communication Review, vol. 39, pp. 135–146. ACM, New York (2009)CrossRef Baden, R., Bender, A., Spring, N., Bhattacharjee, B., Starin, D.: Persona: an online social network with user-defined privacy. In: ACM SIGCOMM Computer Communication Review, vol. 39, pp. 135–146. ACM, New York (2009)CrossRef
3.
go back to reference Beato, F., Ion, I., Čapkun, S., Preneel, B., Langheinrich, M.: For some eyes only: protecting online information sharing. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, pp. 1–12. ACM, New York (2013) Beato, F., Ion, I., Čapkun, S., Preneel, B., Langheinrich, M.: For some eyes only: protecting online information sharing. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, pp. 1–12. ACM, New York (2013)
4.
go back to reference Bielenberg, A., Helm, L., Gentilucci, A., Stefanescu, D., Zhang, H.: The growth of diaspora-a decentralized online social network in the wild. In: IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 13–18. IEEE, New York (2012) Bielenberg, A., Helm, L., Gentilucci, A., Stefanescu, D., Zhang, H.: The growth of diaspora-a decentralized online social network in the wild. In: IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 13–18. IEEE, New York (2012)
5.
go back to reference Bonneau, J., Preibusch, S.: The privacy jungle: on the market for data protection in social networks. In: Moore, T., Pym, D., Ioannidis, C. (eds.) Economics of Information Security and Privacy, pp. 121–167. Springer, New York (2010)CrossRef Bonneau, J., Preibusch, S.: The privacy jungle: on the market for data protection in social networks. In: Moore, T., Pym, D., Ioannidis, C. (eds.) Economics of Information Security and Privacy, pp. 121–167. Springer, New York (2010)CrossRef
6.
go back to reference Carminati, B., Ferrari, E.: Collaborative access control in on-line social networks. In: 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), pp. 231–240. IEEE, New York (2011) Carminati, B., Ferrari, E.: Collaborative access control in on-line social networks. In: 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), pp. 231–240. IEEE, New York (2011)
7.
go back to reference Carminati, B., Ferrari, E., Perego, A.: Private relationships in social networks. In: IEEE 23rd International Conference on Data Engineering Workshop, pp. 163–171. IEEE, New York (2007) Carminati, B., Ferrari, E., Perego, A.: Private relationships in social networks. In: IEEE 23rd International Conference on Data Engineering Workshop, pp. 163–171. IEEE, New York (2007)
8.
go back to reference Cheng, Y., Park, J., Sandhu, R.: Attribute-aware relationship-based access control for online social networks. In: IFIP Annual Conference on Data and Applications Security and Privacy, pp. 292–306. Springer, New York (2014) Cheng, Y., Park, J., Sandhu, R.: Attribute-aware relationship-based access control for online social networks. In: IFIP Annual Conference on Data and Applications Security and Privacy, pp. 292–306. Springer, New York (2014)
9.
go back to reference Cutillo, L.A., Molva, R., Strufe, T., Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network. In: IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops (WoWMoM 2009), pp. 1–6. IEEE, New York (2009) Cutillo, L.A., Molva, R., Strufe, T., Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network. In: IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops (WoWMoM 2009), pp. 1–6. IEEE, New York (2009)
10.
go back to reference Dürr, M., Maier, M., Dorfmeister, F.: Vegas–a secure and privacy-preserving peer-to-peer online social network. In: International Conferenece on Social Computing (SocialCom) Privacy, Security, Risk and Trust (PASSAT), pp. 868–874. IEEE, New York (2012) Dürr, M., Maier, M., Dorfmeister, F.: Vegas–a secure and privacy-preserving peer-to-peer online social network. In: International Conferenece on Social Computing (SocialCom) Privacy, Security, Risk and Trust (PASSAT), pp. 868–874. IEEE, New York (2012)
11.
go back to reference Dwyer, C., Hiltz, S., Passerini, K.: Trust and privacy concern within social networking sites: a comparison of facebook and myspace. In: AMCIS 2007 Proceedings, p. 339 (2007) Dwyer, C., Hiltz, S., Passerini, K.: Trust and privacy concern within social networking sites: a comparison of facebook and myspace. In: AMCIS 2007 Proceedings, p. 339 (2007)
12.
go back to reference Ghouri, A.M., More, V., Anjum, A.: Social media marketing: a paradigm shift in business. Int. J. Econ. Bus. Manag. Stud. 1(3), 96–103 (2016) Ghouri, A.M., More, V., Anjum, A.: Social media marketing: a paradigm shift in business. Int. J. Econ. Bus. Manag. Stud. 1(3), 96–103 (2016)
13.
go back to reference Hu, H., Ahn, G.-J., Jorgensen, J.: Detecting and resolving privacy conflicts for collaborative data sharing in online social networks. In: Proceedings of the 27th Annual Computer Security Applications Conference, pp. 103–112. ACM, New York (2011) Hu, H., Ahn, G.-J., Jorgensen, J.: Detecting and resolving privacy conflicts for collaborative data sharing in online social networks. In: Proceedings of the 27th Annual Computer Security Applications Conference, pp. 103–112. ACM, New York (2011)
14.
go back to reference Jahid, S., Nilizadeh, S., Mittal, P., Borisov, N., Kapadia, A., DECENT: A decentralized architecture for enforcing privacy in online social networks. In: IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 326–332. IEEE, New York (2012) Jahid, S., Nilizadeh, S., Mittal, P., Borisov, N., Kapadia, A., DECENT: A decentralized architecture for enforcing privacy in online social networks. In: IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 326–332. IEEE, New York (2012)
15.
go back to reference Klemperer, P., Liang, Y., Mazurek, M., Sleeper, M., Ur, B., Bauer, L., Cranor, L.F., Gupta, N., Reiter, M.: Tag, you can see it!: using tags for access control in photo sharing. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 377–386. ACM, New York (2012) Klemperer, P., Liang, Y., Mazurek, M., Sleeper, M., Ur, B., Bauer, L., Cranor, L.F., Gupta, N., Reiter, M.: Tag, you can see it!: using tags for access control in photo sharing. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 377–386. ACM, New York (2012)
16.
go back to reference Krishnamurthy, B., Wills, C.E.: Characterizing privacy in online social networks. In: Proceedings of the First Workshop on Online Social Networks, pp. 37–42. ACM, New York (2008) Krishnamurthy, B., Wills, C.E.: Characterizing privacy in online social networks. In: Proceedings of the First Workshop on Online Social Networks, pp. 37–42. ACM, New York (2008)
17.
go back to reference Kumar, A., Bezawada, R., Rishika, R., Janakiraman, R., Kannan, P.K.: From social to sale: the effects of firm-generated content in social media on customer behavior. J. Mark. 80(1), 7–25 (2016)CrossRef Kumar, A., Bezawada, R., Rishika, R., Janakiraman, R., Kannan, P.K.: From social to sale: the effects of firm-generated content in social media on customer behavior. J. Mark. 80(1), 7–25 (2016)CrossRef
18.
go back to reference Lucas, M.M., Borisov, N., Flybynight: mitigating the privacy risks of social networking. In: Proceedings of the 7th ACM workshop on Privacy in the Electronic Society, pp. 1–8 (2008). ACM, New York Lucas, M.M., Borisov, N., Flybynight: mitigating the privacy risks of social networking. In: Proceedings of the 7th ACM workshop on Privacy in the Electronic Society, pp. 1–8 (2008). ACM, New York
19.
go back to reference Miltgen, C.L., Peyrat-Guillard, D.: Cultural and generational influences on privacy concerns: a qualitative study in seven european countries. Eur. J. Inf. Syst. 23(2), 103–125 (2014)CrossRef Miltgen, C.L., Peyrat-Guillard, D.: Cultural and generational influences on privacy concerns: a qualitative study in seven european countries. Eur. J. Inf. Syst. 23(2), 103–125 (2014)CrossRef
20.
go back to reference Rathore, N.C., Tripathy, S.: Collaborative access control model for online social networks. In: IEEE 6th International Conference on Advanced Computing (IACC), pp. 19–24 (2016). doi:10.1109/IACC.2016.14 Rathore, N.C., Tripathy, S.: Collaborative access control model for online social networks. In: IEEE 6th International Conference on Advanced Computing (IACC), pp. 19–24 (2016). doi:10.​1109/​IACC.​2016.​14
21.
go back to reference Rebahi, Y., Pallares, J.J., Minh, N.T., Ehlert, S., Kovacs, G., Sisalem, D.: Performance analysis of identity management in the session initiation protocol (SIP). In: IEEE/ACS International Conference on Computer Systems and Applications, pp. 711–717. IEEE, New York (2008) Rebahi, Y., Pallares, J.J., Minh, N.T., Ehlert, S., Kovacs, G., Sisalem, D.: Performance analysis of identity management in the session initiation protocol (SIP). In: IEEE/ACS International Conference on Computer Systems and Applications, pp. 711–717. IEEE, New York (2008)
22.
go back to reference Schwittmann, L., Boelmann, C., Wander, M., Weis, T.: SoNet–privacy and replication in federated online social networks. In: IEEE 33rd International Conference on Distributed Computing Systems Workshops, pp. 51–57. IEEE, New York (2013) Schwittmann, L., Boelmann, C., Wander, M., Weis, T.: SoNet–privacy and replication in federated online social networks. In: IEEE 33rd International Conference on Distributed Computing Systems Workshops, pp. 51–57. IEEE, New York (2013)
23.
go back to reference SEC, SECG: Recommended elliptic curve domain parameters. Standards for Efficient Cryptography Group, Certicom Corp (2000) SEC, SECG: Recommended elliptic curve domain parameters. Standards for Efficient Cryptography Group, Certicom Corp (2000)
24.
go back to reference Severo, M., Feredj, A., Romele, A.: Soft data and public policy: can social media offer alternatives to official statistics in urban policymaking? Policy Internet 8(3), 354–372 (2016)CrossRef Severo, M., Feredj, A., Romele, A.: Soft data and public policy: can social media offer alternatives to official statistics in urban policymaking? Policy Internet 8(3), 354–372 (2016)CrossRef
26.
go back to reference Squicciarini, A.C., Shehab, M., Paci, F.: Collective privacy management in social networks. In: Proceedings of the 18th International Conference on World Wide Web, pp. 521–530. ACM, New York (2009) Squicciarini, A.C., Shehab, M., Paci, F.: Collective privacy management in social networks. In: Proceedings of the 18th International Conference on World Wide Web, pp. 521–530. ACM, New York (2009)
27.
go back to reference Strater, K., Richter, H.: Examining privacy and disclosure in a social networking community. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, pp. 157–158. ACM, New York (2007) Strater, K., Richter, H.: Examining privacy and disclosure in a social networking community. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, pp. 157–158. ACM, New York (2007)
28.
go back to reference Such, J.M., Criado, N.: Resolving multi-party privacy conflicts in social media. IEEE Trans. Knowl. Data Eng. 28(7), 1851–1863 (2016)CrossRef Such, J.M., Criado, N.: Resolving multi-party privacy conflicts in social media. IEEE Trans. Knowl. Data Eng. 28(7), 1851–1863 (2016)CrossRef
29.
go back to reference Thomas, K., Grier, C., Nicol, D.M.: Unfriendly: multi-party privacy risks in social networks. In: International Symposium on Privacy Enhancing Technologies Symposium, pp. 236–252. Springer, New York (2010)CrossRef Thomas, K., Grier, C., Nicol, D.M.: Unfriendly: multi-party privacy risks in social networks. In: International Symposium on Privacy Enhancing Technologies Symposium, pp. 236–252. Springer, New York (2010)CrossRef
30.
go back to reference Wishart, R., Corapi, D., Marinovic, S., Sloman, M.: Collaborative privacy policy authoring in a social networking context. In: IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), pp. 1–8. IEEE, New York (2010) Wishart, R., Corapi, D., Marinovic, S., Sloman, M.: Collaborative privacy policy authoring in a social networking context. In: IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), pp. 1–8. IEEE, New York (2010)
31.
go back to reference Young, A.L., Quan-Haase, A.: Information revelation and internet privacy concerns on social network sites: a case study of facebook. In: Proceedings of the Fourth International Conference on Communities and Technologies, pp. 265–274. ACM, New York (2009) Young, A.L., Quan-Haase, A.: Information revelation and internet privacy concerns on social network sites: a case study of facebook. In: Proceedings of the Fourth International Conference on Communities and Technologies, pp. 265–274. ACM, New York (2009)
32.
go back to reference Zhang, W., et al.: Privacy and security concern of online social networks from user perspective. In: International Conference on Information Systems Security and Privacy (SCITEPRESS), pp. 246–253. SCITEPRESS, Setúbal (2015) Zhang, W., et al.: Privacy and security concern of online social networks from user perspective. In: International Conference on Information Systems Security and Privacy (SCITEPRESS), pp. 246–253. SCITEPRESS, Setúbal (2015)
Metadata
Title
A framework for secure and privacy protected collaborative contents sharing using public OSN
Authors
Shaukat Ali
Azhar Rauf
Naveed Islam
Haleem Farman
Publication date
10-10-2017
Publisher
Springer US
Published in
Cluster Computing / Issue Special Issue 3/2019
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-017-1236-2

Other articles of this Special Issue 3/2019

Cluster Computing 3/2019 Go to the issue

Premium Partner