Abstract
In recent years, a large number of social applications created new challenges to inhibit the spread of false information. And how to evaluate the threats of the false information dissemination remains one of the major concerns in the Internet security issues. Existing schemes focused on the operational safety of information systems and ignored the importance of assessment of false information dissemination. In this paper, we propose a novel method to evaluate the threat of false information dissemination. By analyzing social network application’s structure and the information transmission mode, it proposed a risk assessment model for the false information dissemination. With this model, it is easy to evaluate and estimate the level of risks in social applications. Experiment verifies the effectiveness and correctness of this model in providing security recommendations and finding the most dangerous risk point.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Yan, M.X.G.: Electric systems analysis (2004)
Li, Y., Liu, J.: Mechanism and improvement of direct anonymous attestation scheme [j]. J. Henan Univ. (Nat. Sci.) 37(2), 195–197 (2007)
Cohen, J.E.: DRM and privacy. Commun. ACM 46(4), 46–49 (2003)
Das, M.L., Saxena, A., Gulati, V.P.: A dynamic id-based remote user authentication scheme. IEEE Trans. Consum. Electron. 50(2), 629–631 (2004)
Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: 2010 Proceedings IEEE INFOCOM, pp. 1–9. IEEE (2010)
Budak, C., Agrawal, D., El Abbadi, A.: Limiting the spread of misinformation in social networks. In: Proceedings of the 20th international conference on World wide web, pp. 665–674. ACM (2011)
Bass, T.: Intrusion detection systems and multisensor data fusion. Commun. ACM 43(4), 99–105 (2000)
Shen, Z., Zhang, B., Li, F.: Research of internet governance based on harmful information propagation model (2010)
Feng, D.G., Zhang, Y., Zhang, Y.Q.: Survey of information security risk assessment. J. China Inst. Commun. 25(7), 10–18 (2004)
Zhang, T., Hu, M.Z., Yun, X.C., Zhang, Y.Z.: Research on computer network security analysis model. J. China Inst. Commun. 26(12), 100–109 (2005)
Joshi, J.B., Aref, W.G., Ghafoor, A., Spafford, E.H.: Security models for web-based applications. Commun. ACM 44(2), 38–44 (2001)
Zhang, Y.Z., Fang, B.X., Chi, Y., Yun, X.C.: Risk propagation model for assessing network information systems. J. Softw. 18(1), 137–145 (2007)
Le, K., Jiwu, J., Yuewu, W.: The trust expansion and control in social network service. J. Comput. Res. Dev. 47(9), 1611–1621 (2010)
Saaty, T.L.: How to make a decision: the analytic hierarchy process. Eur. J. Oper. Res. 48(1), 9–26 (1990)
Acknowledgment
This work was supported by The National Science and Technology Support Program (Grant No. 2012BAH46B02); the National Natural Science Foundation (Grant No. 61402464,61402474).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sha, H., Li, X., Liu, Q., Zhou, Z., Zhang, L., Wang, L. (2015). RAMID: A Novel Risk Assessment Model of Information Dissemination on Social Network. In: Yueming, L., Xu, W., Xi, Z. (eds) Trustworthy Computing and Services. ISCTCS 2014. Communications in Computer and Information Science, vol 520. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-47401-3_39
Download citation
DOI: https://doi.org/10.1007/978-3-662-47401-3_39
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-47400-6
Online ISBN: 978-3-662-47401-3
eBook Packages: Computer ScienceComputer Science (R0)