2014
DOI: 10.1016/j.comnet.2014.08.023
|View full text |Cite
|
Sign up to set email alerts
|

Distributing privacy policies over multimedia content across multiple online social networks

Abstract: Online Social Networks (OSNs) are currently playing a crucial role in our everyday social life. Their great growth has sparked the interest of hackers and individual users that try to disclose as much information as possible, which in many cases unfortunately is possible. In such events, the users' privacy settings are bypassed by the leakage of their shared media content. To address this challenging but important research problem, we introduce a new distributed scheme for media content sharing on online socia… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
10
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(10 citation statements)
references
References 22 publications
0
10
0
Order By: Relevance
“…This combination of roles and links can be assembled into a social network graph. If this PII and their inter-relationships are authentic, malicious attacks in cyberspace may likely evolve into real-life attacks, causing unimaginable harm [ 18,19 ], including Sybil attacks, tracking, profile cloning, defamation, identity theft, spamming, and phishing. Recently, researchers have focused on preventing these external attacks and proposed various prevention and rehabilitation methods.…”
Section: Related Workmentioning
confidence: 99%
“…This combination of roles and links can be assembled into a social network graph. If this PII and their inter-relationships are authentic, malicious attacks in cyberspace may likely evolve into real-life attacks, causing unimaginable harm [ 18,19 ], including Sybil attacks, tracking, profile cloning, defamation, identity theft, spamming, and phishing. Recently, researchers have focused on preventing these external attacks and proposed various prevention and rehabilitation methods.…”
Section: Related Workmentioning
confidence: 99%
“…If multiple OSNs are used, this mapping can be found especially quickly, accurately, and inexpensively due to SIL research. Therefore, the disclosure of PII may lead to malicious attacks from the cyberspace and real world [24,25]; examples of these attacks include, but are not limited to, tracking, defamation, spamming, phishing, identity theft, profile cloning, Sybil attack, etc.…”
Section: Related Workmentioning
confidence: 99%
“…However, they did not propose an effective method for solving this problem, only suggesting that users should disclose their PII as little as possible. Patsakis et al [25] proposed a framework based on scenarios with multiple social networks that can achieve the goal of protecting user privacy; however, it is impossible for each social network to interact with each other in practice. Erfan et al [38] combined attribute sensitivity and visibility, and used statistical fuzzy systems to solve the problem of privacy metrics on multiple OSNs.…”
Section: Related Workmentioning
confidence: 99%
“…Additionally, operators can use users' personal information arbitrarily for many purposes, such as viral marketing, targeted advertising, instant advertising, network promotion, and censorship. As users disclose more personal information [3,4], more malicious attacks may result in the real world and cyberspace [5,6,7,8], including but not limited to tracking, defamation, spam, phishing, identity theft, personal data cloning, and Sybil attacks [9].…”
Section: Introductionmentioning
confidence: 99%