Skip to main content

2010 | OriginalPaper | Buchkapitel

23. Security and Privacy in Online Social Networks

verfasst von : Leucio Antonio Cutillo, Mark Manulis, Thorsten Strufe

Erschienen in: Handbook of Social Network Technologies and Applications

Verlag: Springer US

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Social Network Services (SNS) are currently drastically revolutionizing the way people interact, thus becoming de facto a predominant service on the web, today.1 The impact of this paradigm change on socioeconomic and technical aspects of collaboration and interaction is comparable to that caused by the deployment of World Wide Web in the 1990s.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
This work has partially been funded by IT R&D program of MKE/KEIT under grant number 10035587, DFG FOR 733 (“QuaP2P”), and the EU SOCIALNETS project, grant no 217141.1According to reports, facebook.com. recently surpassed the previously most popular website google.com by both page visits and served bandwidth: http://​www.​hitwise.​com/​us/​datacenter/​main/​dashboard-10133.​htmlhttp://​www.​mercurynews.​com/​business/​ci_​14698296?​nclick_​check=​1.
 
6
Several of these attacks have been shown to be successful in the past. A short selection of examples can be found in [5, 9] as well as at http://​www.​sophos.​com/​pressoffice/​news/​articles/​2007/​08/​facebook.​html and http://​www.​blackhat.​com/​html/​bh-usa-08/​bh-usa-08-archive.​html.
 
21
One incident has been reported for facebook, where a multitude of groups have been fostered under general topics and concertedly renamed to support Silvio Berlusconi, in 2009 http://​www.​repubblica.​it/​2009/​12/​sezioni/​politica/​giustizia-21/​gruppi-facebook/​gruppi-facebook.​html.
 
Literatur
2.
Zurück zum Zitat danah m. boyd. Facebook’s privacy trainwreck. Convergence: The International Journal of Research into New Media Technologies, 14(1):13–20, 2008. danah m. boyd. Facebook’s privacy trainwreck. Convergence: The International Journal of Research into New Media Technologies, 14(1):13–20, 2008.
3.
Zurück zum Zitat A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 1(1):11–33, 2004.CrossRef A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 1(1):11–33, 2004.CrossRef
5.
Zurück zum Zitat L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda. All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks. In 18th Intl. World Wide Web Conference, 2009. L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda. All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks. In 18th Intl. World Wide Web Conference, 2009.
6.
Zurück zum Zitat d. m. boyd and N. B. Ellison. Social network sites: definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(1), 2007. d. m. boyd and N. B. Ellison. Social network sites: definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(1), 2007.
7.
Zurück zum Zitat D. Florencio and C. Herley. A Large-Scale Study of Web Password Habits. In 16th International Conference on World Wide Web (WWW 2007), pages 657–666. ACM, 2007. D. Florencio and C. Herley. A Large-Scale Study of Web Password Habits. In 16th International Conference on World Wide Web (WWW 2007), pages 657–666. ACM, 2007.
8.
Zurück zum Zitat R. Gross and A. Acquisti. Information Revelation and Privacy in Online Social Networks. In ACM Workshop on Privacy in the Electronic Society, pages 71–80, 2005. R. Gross and A. Acquisti. Information Revelation and Privacy in Online Social Networks. In ACM Workshop on Privacy in the Electronic Society, pages 71–80, 2005.
9.
Zurück zum Zitat T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer. Social phishing. Communications of the ACM, 94–100, 2007. T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer. Social phishing. Communications of the ACM, 94–100, 2007.
10.
Zurück zum Zitat A. Mislove, B. Viswanath, K. P. Gummadi, and P. Druschel. You Are Who You Know: Inferring User Profiles in Online Social Networks. In ACM International Conference on Web Search and Data Mining (WSDM 2010), pages 251–260. ACM, 2010. A. Mislove, B. Viswanath, K. P. Gummadi, and P. Druschel. You Are Who You Know: Inferring User Profiles in Online Social Networks. In ACM International Conference on Web Search and Data Mining (WSDM 2010), pages 251–260. ACM, 2010.
11.
Zurück zum Zitat T. J. Nathaniel, N. Johnson, and M. Jakobsson. Social phishing. Communications of the ACM. Retrieved March, 7, 2006. T. J. Nathaniel, N. Johnson, and M. Jakobsson. Social phishing. Communications of the ACM. Retrieved March, 7, 2006.
12.
Zurück zum Zitat J. Park and R. Sandhu. Towards Usage Control Models: Beyond Traditional Access Control. In SACMAT ’02: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, pages 57–64. ACM, New York, NY, USA, 2002. J. Park and R. Sandhu. Towards Usage Control Models: Beyond Traditional Access Control. In SACMAT ’02: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, pages 57–64. ACM, New York, NY, USA, 2002.
13.
Zurück zum Zitat F. Schneider, A. Feldmann, B. Krishnamurthy, and W. Willinger. Understanding Online Social Network Usage from a Network Perspective. In ACM SIGCOMM conference on Internet measurement, 2009. F. Schneider, A. Feldmann, B. Krishnamurthy, and W. Willinger. Understanding Online Social Network Usage from a Network Perspective. In ACM SIGCOMM conference on Internet measurement, 2009.
14.
Zurück zum Zitat L. von Ahn, M. Blum, N. J. Hopper, and J. Langford. CAPTCHA: Using Hard AI Problems for Security. In EUROCRYPT 2003. LNCS, vol 2656, pages 294–311. Springer, Heidelberg, 2003. L. von Ahn, M. Blum, N. J. Hopper, and J. Langford. CAPTCHA: Using Hard AI Problems for Security. In EUROCRYPT 2003. LNCS, vol 2656, pages 294–311. Springer, Heidelberg, 2003.
15.
Zurück zum Zitat S. D. Warren and L. D. Brandeis. The right to privacy. Harward Law Review, 4(5):193–220, December 1890.CrossRef S. D. Warren and L. D. Brandeis. The right to privacy. Harward Law Review, 4(5):193–220, December 1890.CrossRef
17.
Zurück zum Zitat W. Zhao, R. Chellappa, P. J. Phillips, and A. Rosenfeld. Face recognition: a literature survey. ACM Computing Surveys, 35(4):399–458, 2003.CrossRef W. Zhao, R. Chellappa, P. J. Phillips, and A. Rosenfeld. Face recognition: a literature survey. ACM Computing Surveys, 35(4):399–458, 2003.CrossRef
18.
Zurück zum Zitat E. Zheleva and L. Getoor. To Join or Not to Join: The Illusion of Privacy in Social Networks with Mixed Public and Private User Profiles. In WWW 2009, pages 531–540. ACM, 2009. E. Zheleva and L. Getoor. To Join or Not to Join: The Illusion of Privacy in Social Networks with Mixed Public and Private User Profiles. In WWW 2009, pages 531–540. ACM, 2009.
Metadaten
Titel
Security and Privacy in Online Social Networks
verfasst von
Leucio Antonio Cutillo
Mark Manulis
Thorsten Strufe
Copyright-Jahr
2010
Verlag
Springer US
DOI
https://doi.org/10.1007/978-1-4419-7142-5_23

Premium Partner