A Review on Data Confidentiality Issues of User’s Information on Online Social Networks

##plugins.themes.academic_pro.article.main##

Sandip A. Kahate
Dr. Atul D. Raut

Abstract

Online social networking has become an integral component of human life. Many individuals, on the other hand, user are unaware of the security and privacy concerns that come along with its use. As a result of social media sites like Facebook and Twitter, people’s personal information, such as their date of birth and phone number, profile photos, etc. might be dangerously exposed. To get access to private information, such as a user’s banking credentials or to launch a security attack, hackers first obtain the user’s public information from their social media posts. Assaults or leaks of personal information might have a significant impact on their daily life. In this day and age of cutting-edge technology, internet users must understand the risks of using social media websites like Facebook and Twitter. The current status of online social networks, their hazards, and possible solutions are examined in depth in this paper. In this review paper, we deliberately focus on the privacy and security challenges accompanying with OSNs illustrate some models of attack by the attackers and investigate some techniques used to secure a user’s private information and prevent it from attackers while leaving the privacy destruction mostly unresolved. In the end, we are proposing a blockchain-based framework for decentralised that provides advanced security and privacy to OSN users.

##plugins.themes.academic_pro.article.details##

Author Biographies

Sandip A. Kahate, Research Scholar, P. G. Computer Science Dept.Sant Gadgebaba Amravati University, Amravati, Maharashtra

Mr. Sandip A. Kahate He has completed his B.E. in computer science and Engg. from Amravati University, M.E.in Wireless Communication and Computing, from Nagpur University and Ph. D. Research Scholar in Computer Science and Engineering from Sant Gadagebaba Amravati University, Amravati. He is currently working as an Assistant Professor in Computer Engineering Department at Maharashtra, India., He has 17 years of teaching and industry experience. He is the author of around 11 papers in international journal and 3 in an international conference in India and abroad. He is a life time member of IETE and IAENG (H.K).His areas of interest are Data Confidentiality in Online Social Network,Data Science,Machine Learning and Block chain.

Dr. Atul D. Raut, Research Guide Research Centre, P. G. Computer Science Department, Sant Gadagebaba Amravati University, Amravati (M.S.), India.

Dr. Atul D. Raut He has obtained his B.E,M.E.and Ph. D degree in Computer Science and Engineering from Sant Gadge Baba Amravati University, Amravati. He is currently working as Associate Professor in Computer Science and Engineering Department, P. Pote Patil Education and Welfare Trust’s College of Engineering and Management, Amravati (M.S.), India. He has more than 24 years of teaching and 2 Years of industry research experience. He is the author of around 20 papers in international and national journal, 4 papers in international conference in India and abroad. He is a life time member of CSI, IETE and ISTE,His areas of interest are Data Mining, network security.

How to Cite
Kahate, S. A., & Raut, A. D. (2022). A Review on Data Confidentiality Issues of User’s Information on Online Social Networks. International Journal of Next-Generation Computing, 13(3). https://doi.org/10.47164/ijngc.v13i3.659

References

  1. Upadhyay, A. C. and Pawar, S. S. 2017. Detection and prevention measures for cyber- bullying and online grooming. Proc. Int. Conf. Inven. Syst. Control. ICISC 2017. DOI: https://doi.org/10.1109/ICISC.2017.8068605
  2. Abdulhamid, S. and Jibril, F. 2014. Privacy and national security issues in social networks: The challenges.
  3. according. 2022. What is digital risk monitoring?
  4. Adewole, K. S. and Anuar, N. B. 2016. Malicious accounts: Dark of the social networks. J. Netw. Comput. Appl. 79, 41–67. DOI: https://doi.org/10.1016/j.jnca.2016.11.030
  5. Al-Garadi, M. A. 2019. Predicting cyberbullying on social media in the big data era using machine learning algorithms: Review of literature and open challenges. IEEE Access 7, 70701–70718. DOI: https://doi.org/10.1109/ACCESS.2019.2918354
  6. Alotaibi, N. B. 2019. Cyber bullying and the expected consequences on the students’ academic achievement. IEEE Access 7, 153417–153431. DOI: https://doi.org/10.1109/ACCESS.2019.2947163
  7. another site. 2022. Here’s how you can take action against stalking in india. https://www.thebetterindia.com/45671/stalking-india-women-complaint-online .
  8. Bailey, M. and Karir, M. 2009. Al survey of botnet technology and defences. Proc. - Cybersecurity Appl. Technol. Conf. Homel. Security. CATCH 2009 , 299–304. DOI: https://doi.org/10.1109/CATCH.2009.40
  9. H. Ngejane, G. M.-H. and Lefophane, S. 2018. Mitigating online sexual grooming cybercrime on social media using machine learning: A desktop survey. 2018 Int. Conf. Adv. Big Data, Comput. Data Commun. Syst. icABCD 2018. DOI: https://doi.org/10.1109/ICABCD.2018.8465413
  10. Kumar, T. S. B. and Prakash, S. 2021. Online social network security: A comparative review using machine learning and deep learning. Neural Process. Lett. 53, 843–861. DOI: https://doi.org/10.1007/s11063-020-10416-3
  11. Gupta, A. and Prabhat, P., 2022. Towards a resource efficient and privacy-preserving framework for campus-wide video analytics-based applications. Complex & Intelligent Systems, pp.1-16. DOI: https://doi.org/10.1007/s40747-022-00783-w
  12. Byrne, J. A. V. and Pfeifer, L. 2018. Cyberbullying and social media: Information and interventions for school nurses working with victims, students, and families. J. Sch. Nurs. 34, 38–50. DOI: https://doi.org/10.1177/1059840517740191
  13. Foroughi, F. and Luksch, P. 2018. Observation measures to profile user security behaviour. 2018 Int. Conf. Cyber Secure. Prot. Digit. Serv. Cyber Secure. DOI: https://doi.org/10.1109/CyberSecPODS.2018.8560686
  14. Grooming, I. S. . 2022. https://internetsafety101.org/grooming.
  15. Gupta, Surbhi, M. K. G. and Kumar, R. 2021. A novel multi-neural ensemble approach for cancer diagnosis. Applied Artificial Intelligence, 1–36. DOI: https://doi.org/10.1080/08839514.2021.2018182
  16. Gupta, S. and Gupta, M. K. 2022. A comprehensive data-level investigation of cancer diagnosis on imbalanced data. Computational Intelligence 1, 1–31. DOI: https://doi.org/10.1111/coin.12452
  17. Holfeld, B. and Mishna, F. 2018. Longitudinal associations in youth involvement as victim- ized, bullying, or witnessing cyberbullying. Cyberpsychol. Behav. Soc. Netw. DOI: https://doi.org/10.1089/cyber.2017.0369
  18. Jiang, L. and Zhang, X. 2019. Bcosn: A blockchain-based decentralized online social network. IEEE Trans. Comput. Soc. Syst 6, 1454–1466. DOI: https://doi.org/10.1109/TCSS.2019.2941650
  19. M. Beye, R. L. and Tang, Q. 2010. Literature overview - privacy in online social networks. 343–354.
  20. M. Fire, R. G. and Elovici, Y. 2014. Online social networks: Threats and solutions. DOI: https://doi.org/10.1109/COMST.2014.2321628
  21. on site. 2022. Norton security: Award-winning antivirus and security. https://buy- static.norton.com/norton/ps/bb/inhard/360/ .
  22. P. de Santisteban, J. d. H. and Ga´mez-Guadix, M. 2018. Progression, maintenance, and feedback of online child sexual grooming: A qualitative analysis of online predators. Child Abuse Negl 80, 203–215. DOI: https://doi.org/10.1016/j.chiabu.2018.03.026
  23. P. K. Smith, S. R. and Tippett, N. 2008. Cyberbullying: its nature and impact in secondary school pupils. J. Child Psychol. Psychiatry 49, 376–385. DOI: https://doi.org/10.1111/j.1469-7610.2007.01846.x
  24. R. Geetha, S. K. and Kumaraguru, P. 2021. Tweet-scan-post: a system for analysis of sensitive private data disclosure in online social media. Knowl. Inf. Syst. 2021 639 63, 2365–2404. DOI: https://doi.org/10.1007/s10115-021-01592-2
  25. R. Ramadan, A. A. and Alzoubi, S. 2019. The utilization of whatsapp to determine the obsessive-compulsive disorder (ocd): A preliminary study. 2019 6th Int. Conf. Soc. Net- works Anal. Manag. Security. SNAMS , 561–564. DOI: https://doi.org/10.1109/SNAMS.2019.8931832
  26. Rathore, S. and Sharma, P. K. 2017. Social network security: Issues, challenges, threats, and solutions. Inf. Sci. (Ny). 421, 43–69. DOI: https://doi.org/10.1016/j.ins.2017.08.063
  27. Sahoo, S. R. and Gupta, B. B. 2019. Classification of various at- tacks and their defence mechanism in online social networks: a survey. https://doi.org/10.1080/17517575.2019.1605542 13, 832–864. DOI: https://doi.org/10.1080/17517575.2019.1605542
  28. Sahoo, S. R. and Gupta, B. B. 2020. Fake profile detection in multimedia big data on online social networks. Int. J. Inf. Comput. Security. 12, 303–331. DOI: https://doi.org/10.1504/IJICS.2020.105181
  29. Sahoo, S. R. and Gupta, B. B. 2021. Real-time detection of fake account in twitter using the machine-learning approach. Adv. Intell. Syst. Comput. 1086, 149–159. DOI: https://doi.org/10.1007/978-981-15-1275-9_13
  30. Shu, W. and Chuang, Y. H. 2011. The perceived benefits of six-degree-separation social networks. Internet Res. 21, 26–45. DOI: https://doi.org/10.1108/10662241111104866
  31. Siddaramappa, H. K. and Kumar, S. 2019. Secure analysis of social media data. 2019 Int. Conf. Autom. Comput. Technol. Manag. ICACTM 2019 , 315–319. DOI: https://doi.org/10.1109/ICACTM.2019.8776834
  32. site. 2022. 12 tips for safe social networking on network world. https://www.networkworld.com/article/2346692/12-tips-for-safe-social-networking.html.
  33. Soumya, T. R. and Revathy, S. 2018. Survey on threats in online social media. Proc. 2018 IEEE Int. Conf. Commun. Signal Process. DOI: https://doi.org/10.1109/ICCSP.2018.8524200
  34. Stallings, W. 2014. Cryptography and network security: Principles and practice.
  35. website. 2022. Security weak points: Social media — n-able. https://www.n- able.com/blog/security-weak-points-social-media.
  36. Y. K. Tse, H. Loh, J. D. and Zhang, M. 2018. An investigation of social media data during a product recall scandal. Enterp. Inf. Syst 12, 733–751. DOI: https://doi.org/10.1080/17517575.2018.1455110
  37. Zhu, S. H. and Zhang, W. 2021. Cyberbullying among adolescents and children: A compre- hensive review of the global situation, risk factors, and preventive measures. DOI: https://doi.org/10.3389/fpubh.2021.634909