New Privacy Defence Methodologies and Techniques Over Social Networks

  • Fatna ElmendiliEmail author
  • Anas Moustir
  • Younes El Bouzekri El Idrissi
Conference paper
Part of the Lecture Notes in Intelligent Transportation and Infrastructure book series (LNITI)


Thanks to online social networks services such as Facebook, Twitter, YouTube, etc.…, users have the opportunity to communicate easily without constraints by providing them with free and open platforms. Because of their crucial role in spreading information between users, these platforms have become an integral part of everyday life. Privacy and security are major concerns for many social media users. When users share information (such as data, photos etc.…) with their friends, they are not always safe; they can make their friends easy targets attacked by malicious users who try with multiple methods to access their personal data. Unfortunately, with the continued expansion of a user’s social network, privacy settings alone are often insufficient to protect the user’s profile. In this paper, we have proposed a new approach to limit the spread and dissemination of spam content and malicious profiles in social networks. In another way, prohibit the creation of malicious profiles by automated robots as well as the falsification of identity when publishing spam content in social networks. Given that when using online social networking services, users trust them to process their information; have seen that it is necessary not to neglect this part; but rather to make a set of changes that will be consistent with our proposal to strengthen the protection of personal data of users of these platforms.


Social networks Privacy Spam content Malicious profiles Security policies 


  1. 1.
    Ellison N.B., Boyd, D.: Sociality Through Social Network Sites, The Oxford Handbook of Internet Studies, pp. 151–172. Oxford University Press, Oxford (2013)Google Scholar
  2. 2.
    Jeong, Y., Kim, Y.: Privacy concerns on social networking sites: interplay among posting types, content, and audiences, Computers in Human Behavior 69, 302–310 (2017) CrossRefGoogle Scholar
  3. 3.
    Barnes, S.B.: A privacy paradox: Social Networking, United States. First Monday 11(9), (2006) Google Scholar
  4. 4.
    Henkoğlu, T., Külcü, Ö.: Privicy in social networks: an analysis of Facebook. Int. J. Inf. Manag. 761–769 (2014)Google Scholar
  5. 5.
    Liu, K., Das, K., Kargupta, H., Grandison, T.: Privacy-preserving data analysis on graphs and social networks, In: Next Generation of Data Mining, pp. 419–437 (2008)Google Scholar
  6. 6.
    Zheleva, E., Getoor, L.: Preserving the privacy of sensitive relationships in graph data, In: Privacy, Security, and Trust in KDD, Lecture Notes in Computer Science, vol. 4890, pp 153–171 (2008)Google Scholar
  7. 7.
    Al Hasib, A.: Threats of Online Social Networks, Helsinki University of Technology (2008)Google Scholar
  8. 8.
    Tootoonchian, A., Saroiu, S., Ganjali, Y., Wolman, A.: Lockr: better privacy for social networks, presented at the CoNEXT 09, Rome Italy, 2009Google Scholar
  9. 9.
    Mahmood, S., and Desmedt, Y, Poster: preliminary analysis of GoogleCs privacy, presented at the ACM Conference on Computer and Communications Security, pp. 809–812, 2011Google Scholar
  10. 10.
    Lee, K., Caverlee, J., Webb, S.: Uncovering social spammers: social honeypots + machine learning. In: SIGIR10, Geneva, Switzerland, 19–23 July 2010Google Scholar
  11. 11.
    Chakraborty, A., Sundi, J., Satapathy, S.: SPAM: A Framework for Social Profile Abuse Monitoring (2016)Google Scholar
  12. 12.
    Wang, A.H.: Dont follow me: spam detection in Twitter (2010)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Systems Engineering Laboratory National School of Applied SciencesIbn Tofail UniversityKenitraMorocco

Personalised recommendations