Abstract
Recently, Online Social Networks (OSNs) becomes one of the most remarkable technologies in the twenty-first century since it has been extraordinarily popular with over 200 million users. Security and privacy problems are the most important issues in OSNs. In this chapter, we introduced the optimization of security and privacy problems in OSNs. We characterized three existing works with different targets to give a view of this problem.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
L. Adamic and E. Adar (2005) How to search a social network. Social Networks, vol. 27, no. 3, pp. 187C203
L. Backstrom et al. (2006) Group formation in large social networks: membership, growth, and evolution. KDD
J. Brickell and V. Shmatikov (2005) Privacy-preserving graph algorithms in the semi-honest model. In ASIACRYPT, LNCS, pages 236C252
T. Cormen, C. Leiserson, and R. Rivest (1990) Introduction to Algorithms. MIT Press
S. Gariss, M. Kaminsky, M. J. Freedman, B. Karp, D. Mazieres, and H. Yu (2006) Re: Reliable email
R. Gross and A. Acquisti (2005) Information revelation and privacy in online social networks. In WPES 05: Proceedings of the 2005 ACM workshop on Privacy in the electronic society, pages 71C80, ACM.
O. Goldreich: Foundations of Cryptography (2004) Volume II (Basic Applications). Cambridge University Press
Google co-op. http://www.google.com/coop/.
M. Hay, G. Miklau, D.Jensen, D. Towsely and P. Weis (2008) Resisting structural re-identification in anonymized social networks. Proc. of VLDB
Q. Huang, H.J. Wang, and N. Borisov (2005) Privacy-Preserving Friends Troubleshooting Network. Proc. of NDSS
H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman (2006) Sybilguard: defending against sybil attacks via social networks. In SIGCOMM 06: Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications, pages 267C278, New York, NY, USA, ACM.
J. M. Kleinberg (1999) Authoritative sources in a hyperlinked environment. J. ACM, 46(5):604C632
G. Kossinets and D. J. Watts (2006) Empirical analysis of an evolving social network. Science, vol. 311, no. 5757, pp. 88C90
R. Kumar et al. (2006) Structure and evolution of online social networks. KDD
Y. Lindell and B. Pinkas: Privacy preserving data mining (2002) J. Cryptology, 15(3):177–206
K. Liu, and E. Terzi:Towards identity anonymization on graphs (2008) Proc. of SIGMOD
L. Liu, J. Wang, J. Liu, and J. Zhang: Privacy preserving in social networks against sensitive edge disclosure (2008) Technical Report Technical Report CMIDA-HiPSCCS 006-08, Department of Computer Science, University of Kentucky, KY
A. Mislove, K.P. Gummadi, and P. Druschel (2006) Exploiting social networks for internet search. Proc. of HotNets
A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee (2007) Measurement and analysis of online social networks. In IMC 07: Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, pages 29C42, New York, NY, USA, ACM.
Mozillacoop. http://www.mozilla.com.
A. Narayanan and V. Shmatikov (2008) Robust de-anonymization of large sparse datasets. Proc. of IEEE S&P.
J. Pouwelse, P. Garbacki, J. Wang, A. Bakker, J. Yang, A. Iosup, D. Epema, M. Reinders, M. Van Steen, and H. Sips (2008) Tribler: a social-based peer-to-peer system. Concurrency And Computation
K. P. N. Puttaswamy, A. Sala and B.Y. Zhao (2009) Starclique: Guaranteeing user privacy in social networks against intersection attacks. Proc. of ACM CoNEXT
Stumbleupon. http://www.stumbleupon.com
J. Sun, X. Zhu, and Y. Fang (2010) A privacy-preserving scheme for online social networks with efficient revocation. Proc. of IEEE INFOCOM 2010, pages 1C9
Yahoo! myweb. http://myweb2.search.yahoo.com.
B. Zhou, and J. Pei (2008) Preserving privacy in social networks against neighborhood attacks. Proc. of ICDE
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Ding, L., Du, H., Wu, W. (2012). Security and Privacy in Online Social Networks: Optimization Perspectives. In: Thai, M., Pardalos, P. (eds) Handbook of Optimization in Complex Networks. Springer Optimization and Its Applications(), vol 58. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-0857-4_16
Download citation
DOI: https://doi.org/10.1007/978-1-4614-0857-4_16
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-0856-7
Online ISBN: 978-1-4614-0857-4
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)