A Review on Data Confidentiality Issues of User’s Information on Online Social Networks
##plugins.themes.academic_pro.article.main##
Abstract
Online social networking has become an integral component of human life. Many individuals, on the other hand, user are unaware of the security and privacy concerns that come along with its use. As a result of social media sites like Facebook and Twitter, people’s personal information, such as their date of birth and phone number, profile photos, etc. might be dangerously exposed. To get access to private information, such as a user’s banking credentials or to launch a security attack, hackers first obtain the user’s public information from their social media posts. Assaults or leaks of personal information might have a significant impact on their daily life. In this day and age of cutting-edge technology, internet users must understand the risks of using social media websites like Facebook and Twitter. The current status of online social networks, their hazards, and possible solutions are examined in depth in this paper. In this review paper, we deliberately focus on the privacy and security challenges accompanying with OSNs illustrate some models of attack by the attackers and investigate some techniques used to secure a user’s private information and prevent it from attackers while leaving the privacy destruction mostly unresolved. In the end, we are proposing a blockchain-based framework for decentralised that provides advanced security and privacy to OSN users.
##plugins.themes.academic_pro.article.details##
This work is licensed under a Creative Commons Attribution 4.0 International License.
References
- Upadhyay, A. C. and Pawar, S. S. 2017. Detection and prevention measures for cyber- bullying and online grooming. Proc. Int. Conf. Inven. Syst. Control. ICISC 2017. DOI: https://doi.org/10.1109/ICISC.2017.8068605
- Abdulhamid, S. and Jibril, F. 2014. Privacy and national security issues in social networks: The challenges.
- according. 2022. What is digital risk monitoring?
- Adewole, K. S. and Anuar, N. B. 2016. Malicious accounts: Dark of the social networks. J. Netw. Comput. Appl. 79, 41–67. DOI: https://doi.org/10.1016/j.jnca.2016.11.030
- Al-Garadi, M. A. 2019. Predicting cyberbullying on social media in the big data era using machine learning algorithms: Review of literature and open challenges. IEEE Access 7, 70701–70718. DOI: https://doi.org/10.1109/ACCESS.2019.2918354
- Alotaibi, N. B. 2019. Cyber bullying and the expected consequences on the students’ academic achievement. IEEE Access 7, 153417–153431. DOI: https://doi.org/10.1109/ACCESS.2019.2947163
- another site. 2022. Here’s how you can take action against stalking in india. https://www.thebetterindia.com/45671/stalking-india-women-complaint-online .
- Bailey, M. and Karir, M. 2009. Al survey of botnet technology and defences. Proc. - Cybersecurity Appl. Technol. Conf. Homel. Security. CATCH 2009 , 299–304. DOI: https://doi.org/10.1109/CATCH.2009.40
- H. Ngejane, G. M.-H. and Lefophane, S. 2018. Mitigating online sexual grooming cybercrime on social media using machine learning: A desktop survey. 2018 Int. Conf. Adv. Big Data, Comput. Data Commun. Syst. icABCD 2018. DOI: https://doi.org/10.1109/ICABCD.2018.8465413
- Kumar, T. S. B. and Prakash, S. 2021. Online social network security: A comparative review using machine learning and deep learning. Neural Process. Lett. 53, 843–861. DOI: https://doi.org/10.1007/s11063-020-10416-3
- Gupta, A. and Prabhat, P., 2022. Towards a resource efficient and privacy-preserving framework for campus-wide video analytics-based applications. Complex & Intelligent Systems, pp.1-16. DOI: https://doi.org/10.1007/s40747-022-00783-w
- Byrne, J. A. V. and Pfeifer, L. 2018. Cyberbullying and social media: Information and interventions for school nurses working with victims, students, and families. J. Sch. Nurs. 34, 38–50. DOI: https://doi.org/10.1177/1059840517740191
- Foroughi, F. and Luksch, P. 2018. Observation measures to profile user security behaviour. 2018 Int. Conf. Cyber Secure. Prot. Digit. Serv. Cyber Secure. DOI: https://doi.org/10.1109/CyberSecPODS.2018.8560686
- Grooming, I. S. . 2022. https://internetsafety101.org/grooming.
- Gupta, Surbhi, M. K. G. and Kumar, R. 2021. A novel multi-neural ensemble approach for cancer diagnosis. Applied Artificial Intelligence, 1–36. DOI: https://doi.org/10.1080/08839514.2021.2018182
- Gupta, S. and Gupta, M. K. 2022. A comprehensive data-level investigation of cancer diagnosis on imbalanced data. Computational Intelligence 1, 1–31. DOI: https://doi.org/10.1111/coin.12452
- Holfeld, B. and Mishna, F. 2018. Longitudinal associations in youth involvement as victim- ized, bullying, or witnessing cyberbullying. Cyberpsychol. Behav. Soc. Netw. DOI: https://doi.org/10.1089/cyber.2017.0369
- Jiang, L. and Zhang, X. 2019. Bcosn: A blockchain-based decentralized online social network. IEEE Trans. Comput. Soc. Syst 6, 1454–1466. DOI: https://doi.org/10.1109/TCSS.2019.2941650
- M. Beye, R. L. and Tang, Q. 2010. Literature overview - privacy in online social networks. 343–354.
- M. Fire, R. G. and Elovici, Y. 2014. Online social networks: Threats and solutions. DOI: https://doi.org/10.1109/COMST.2014.2321628
- on site. 2022. Norton security: Award-winning antivirus and security. https://buy- static.norton.com/norton/ps/bb/inhard/360/ .
- P. de Santisteban, J. d. H. and Ga´mez-Guadix, M. 2018. Progression, maintenance, and feedback of online child sexual grooming: A qualitative analysis of online predators. Child Abuse Negl 80, 203–215. DOI: https://doi.org/10.1016/j.chiabu.2018.03.026
- P. K. Smith, S. R. and Tippett, N. 2008. Cyberbullying: its nature and impact in secondary school pupils. J. Child Psychol. Psychiatry 49, 376–385. DOI: https://doi.org/10.1111/j.1469-7610.2007.01846.x
- R. Geetha, S. K. and Kumaraguru, P. 2021. Tweet-scan-post: a system for analysis of sensitive private data disclosure in online social media. Knowl. Inf. Syst. 2021 639 63, 2365–2404. DOI: https://doi.org/10.1007/s10115-021-01592-2
- R. Ramadan, A. A. and Alzoubi, S. 2019. The utilization of whatsapp to determine the obsessive-compulsive disorder (ocd): A preliminary study. 2019 6th Int. Conf. Soc. Net- works Anal. Manag. Security. SNAMS , 561–564. DOI: https://doi.org/10.1109/SNAMS.2019.8931832
- Rathore, S. and Sharma, P. K. 2017. Social network security: Issues, challenges, threats, and solutions. Inf. Sci. (Ny). 421, 43–69. DOI: https://doi.org/10.1016/j.ins.2017.08.063
- Sahoo, S. R. and Gupta, B. B. 2019. Classification of various at- tacks and their defence mechanism in online social networks: a survey. https://doi.org/10.1080/17517575.2019.1605542 13, 832–864. DOI: https://doi.org/10.1080/17517575.2019.1605542
- Sahoo, S. R. and Gupta, B. B. 2020. Fake profile detection in multimedia big data on online social networks. Int. J. Inf. Comput. Security. 12, 303–331. DOI: https://doi.org/10.1504/IJICS.2020.105181
- Sahoo, S. R. and Gupta, B. B. 2021. Real-time detection of fake account in twitter using the machine-learning approach. Adv. Intell. Syst. Comput. 1086, 149–159. DOI: https://doi.org/10.1007/978-981-15-1275-9_13
- Shu, W. and Chuang, Y. H. 2011. The perceived benefits of six-degree-separation social networks. Internet Res. 21, 26–45. DOI: https://doi.org/10.1108/10662241111104866
- Siddaramappa, H. K. and Kumar, S. 2019. Secure analysis of social media data. 2019 Int. Conf. Autom. Comput. Technol. Manag. ICACTM 2019 , 315–319. DOI: https://doi.org/10.1109/ICACTM.2019.8776834
- site. 2022. 12 tips for safe social networking on network world. https://www.networkworld.com/article/2346692/12-tips-for-safe-social-networking.html.
- Soumya, T. R. and Revathy, S. 2018. Survey on threats in online social media. Proc. 2018 IEEE Int. Conf. Commun. Signal Process. DOI: https://doi.org/10.1109/ICCSP.2018.8524200
- Stallings, W. 2014. Cryptography and network security: Principles and practice.
- website. 2022. Security weak points: Social media — n-able. https://www.n- able.com/blog/security-weak-points-social-media.
- Y. K. Tse, H. Loh, J. D. and Zhang, M. 2018. An investigation of social media data during a product recall scandal. Enterp. Inf. Syst 12, 733–751. DOI: https://doi.org/10.1080/17517575.2018.1455110
- Zhu, S. H. and Zhang, W. 2021. Cyberbullying among adolescents and children: A compre- hensive review of the global situation, risk factors, and preventive measures. DOI: https://doi.org/10.3389/fpubh.2021.634909