Skip to main content

Effective Security in Social Data Security in OSNs

  • Conference paper
  • First Online:
Data Engineering and Intelligent Computing

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 542 ))

Abstract

Assurance is a grinding center that enhances when trades perform intermediate in Online Social Networks (OSNs). Diverse gatherings of utilization innovation specialists have limited the ‘OSN security issue’ as one of surveillance, institutional or open security. In taking care of these issues they have moreover overseen them just as they were person. We adapt that the elite security issues are caught and that evaluation on genuine feelings of serenity in Online Social Networks would advantage from a more exhaustive method. Nowadays, points of interest systems mean a critical piece of relationship; by fail in security, these organizations will decrease a ton of pleasant areas to see as well. The inside motivation behind subtle elements security (Content Privacy) is risk control. There is a important deal of discovering works and exercises in privacy to risk control (ISRM, for example, NIST 800-30 and ISO/IEC 27005. Regardless, only few works of appraisal focus on Information Security danger diminishment, while the signs depict normal determinations and suggestions. They don’t give any use ideas concerning ISRM; truth be told diminishing the Information Security dangers in questionable conditions is cautious. Subsequently, these papers joined acquired counts (GA) for Information Security danger loss of weaknesses. Finally, the parity of the associated system was broke down through a reflection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Boase, J., Wellman. B.,: Personal Relationships: on and off the Internet (2006)

    Google Scholar 

  2. McLuhan, M.: Understanding Media: the Extensions of Man. MIT Press. O’Reilly, Cambridge (1964)

    Google Scholar 

  3. Ronald Koorn, R.E. (ed.), Herman van Gils, R.E.R.A., ter Hart, J., ir Overbeek, P., Tellegen, R.: Privacy-Enhancing Technologies White Paper for Decision-Makers, Netherlands, (2004)

    Google Scholar 

  4. Mohamed Shehab, A., Anna Squicciarini, B., Gail-Joon Ahn, C., Kokkinou, I.: Access Control for Online Social Networks Third Party Applications, vol.31, pp. 897–911 (2012). doi:10.1016/J.Cose.2012.07.008

  5. Alexander, A., Blog, C.J.: The Egyptian Experience: Sense and Nonsense of the Internet Revolution, Details of the Internet shutdown and restoration can be found on the Renesys blog (2011)

    Google Scholar 

  6. Lipford, H.R., Froil, K.: Visual versus Compact: A Comparison of Privacy Policy Interfaces, April 10–15, Atlanta, GA, USA (2010)

    Google Scholar 

  7. Lee, M.-C.: Information security risk analysis methods and research trends: AHP and fuzzy comprehensive. Int. J. Comput. Sci. Info. Tech. (IJCSIT) 6, 29–45 (2014)

    Google Scholar 

  8. Feng, N., Xue, Y.: A Data-driven assessment model for information systems security risk management, by. J. Comput. 7, 3103–3109 (2012)

    Google Scholar 

  9. http://policyreview.info/articles/analysis/necessary-and-inherent-limits-internet-surveillance

  10. Gürses, S., Diaz, C.: Two tales of privacy in online social networks. IEEE Secur. Priv. 11, 29–37 (2013)

    Google Scholar 

  11. Beato, F., Kohlweiss, M., Wouters, K.: Scramble! your social network data. Privacy Enhancing Technologies Symposium, PETS 2011, volume 6794 of LNCS, pp. 211–225. Springer, Heidelberg (2011)

    Google Scholar 

  12. De Cristofaro, E., Soriente, C., Tsudik, G., Williams, A.: Hummingbird: Privacy at the time of twitter. In: IEEE Symposium on Security and Privacy, pp. 285–299. IEEE Computer Society (2012)

    Google Scholar 

  13. Sayaf, R., Clarke, D.: Access control models for online social networks. IGI—Global 32–34(2012)

    Google Scholar 

  14. Stutzman, F., Hartzog, W.: Boundary regulation in social media, In: CSCW, pp. 769–778. Seattle, WA, USA (2012)

    Google Scholar 

  15. Tamjidyamcholo, A., Al-Dabbagh, R.D.: Genetic algorithm approach for risk reduction of information security. Int. J. Cyber-Secur. Digital Forensics (IJCSDF) 1, 59–66 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. S. V. Balakrishna .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Balakrishna, A.S.V., Srinivasu, N. (2018). Effective Security in Social Data Security in OSNs. In: Satapathy, S., Bhateja, V., Raju, K., Janakiramaiah, B. (eds) Data Engineering and Intelligent Computing. Advances in Intelligent Systems and Computing, vol 542 . Springer, Singapore. https://doi.org/10.1007/978-981-10-3223-3_43

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3223-3_43

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3222-6

  • Online ISBN: 978-981-10-3223-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics