Providing a Blockchain-Based Method to Protect Users’ Privacy in Social Networks
Subject Areas : ICTIbrahim Zamani Babgohari 1 , Monireh Hosseini 2
1 -
2 - Department of Industrial Engineering K. N. Toosi University of Technology
Keywords: Privacy, Information Security, Blockchain,
Abstract :
Today, social networks have brought a lot of convenience to their users, but there are still problems of not respecting privacy. This has caused the security and privacy protection of social network users to be important. Users share a large amount of personal data on social networks, attackers can obtain sensitive personal information simply by using social networks. and carry out various types of attacks and identity theft. Many social networks do not have their own data centers and usually store user data in third-party data centers. These centers can share this data with others and provide user data to other organizations without their knowledge. Owners of social networks can provide users' data to information agencies or use them for advertising purposes. In this research, in the first part, we have described the introduction of the subject, and then in the second part, we have discussed the literature on the subject, which is mostly focused on the centralized methods of privacy protection, and then in the third part, we have described the research method. And we have presented a method that increases the privacy of users in social networks to a great extent by using blockchain. In the fourth part, we have described the implementation of the research and finally we have concluded and summarized this research.
[1] H. Gao , J. Hu , T. Huang , J. Wang , Y. Chen , 2011,Security issues in online social networks, IEEE Internet Computer. 15 (4), pp. 56–63.
[2] M. Fire , R. Goldschmidt , Y. Elovici , 2014, Online social networks: threats and solutions, IEEE Communications Surveys & Tutorials,16 (4),pp. 5-15.
[3] Gianluca Lax , Antonia Russo, Lara Saidia Fascì, A Blockchain-based approach for matching desired and real privacy settings of social network users, Information Sciences,pp.2-4,(2021)
[4] Diaa Salama Abd Elminaam, Hatem Mohamed Abdual Kader, and Mohiy Mohamed Hadhoud,2010, Evaluating The Performance of SymmetricEncryption Algorithms, International Journal of Network Security, May 2010
[5] A.M. Alattar, N.D. Memon, C.D. Heitzenrater, Media Watermarking, (2015)
[6] A. Zigomitros, A. Papageorgiou, C. Patsakis, Social network content management through watermarking, in: Proceedings of the 11th International Conference on Trust, Security and Privacy in Computing and Communications, IEEE,(2012)
[7] C. Ho Sin, N.A. Kim, B.W. Go, K.S. Min, J.D. Lee, J.H. Park, Realizing the right to be forgotten in an environment, in: H. Jeong, M.S. Obaidat, N. Yen, J. Park (Eds.), Advances in Computer Science and Its Applications, Lecture Notes in Electrical Engineering, (2014)
[8] C. Patsakis, A. Zigomitros, A. Papageorgiou, E. Galván-López, Distributing privacy policies over multimedia content across multiple online social networks, (2014)
[9] K. Thongkor, N. Mettripun, T. Pramoun, T. Amornraksa, Image watermarking based on DWT coefficients modification for social networking services, in: Proceedings of the 10th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), IEEE, (2013)
[10] A.C. Squicciarini, H. Xu, X.L. Zhang, CoPE: enabling collaborative privacy management in online social networks, J. Am. Soc. Inf. Sci. Technol. (2011)
[11] A.C. Squicciarini, M. Shehab, J. Wede, Privacy policies for shared content in social network sites, VLDB J. (2010)
[12] H. Hu, G.J. Ahn, J. Jorgensen, Multiparty access control for online social networks: model and mechanisms, IEEE Trans. (2013)
[13] F. Li, K. Wu, J. Lei, M. Wen, Z. Bi, C. Gu, Steganalysis over large-scale social networks with high-order joint features and clustering ensembles, IEEE Trans. Inf. Forensic Secur. (2016)
[14] N. Venkatachalam, R. Anitha, A multi-feature approach to detect Stegobot: a covert multimedia social network botnet, Multimed. Tools. Appl. (2017)
[15] V. Natarajan, S. Sheen, R. Anitha, Multilevel analysis to detect covert social botnet in multimedia social networks, Comput. (2015)
[16] M. Tierney, I. Spiro, C. Bregler, L. Subramanian, Cryptagram: photo privacy for online social media, in: Proceedings of the first ACM conference on Online social networks,(2013)
[17] S. Rathore, P. Kumar Sharma, V. Loia , Y. Jeong, J. Park , Social network security: Issues, challenges, threats, and solutions,2017, Information Sciences,pp. 2-24.
[18] P. Savla, L.D. Martino, Content analysis of privacy policies for health social networks, in: Proceedings of the International Symposium on Policies for Distributed Systems and Networks,( 2012)
[19] X. Liu, Q. Liu, T. Peng, J. Wu, Dynamic access policy in cloud-based personal health record (PHR) systems, Inf. Sci. (2017)
[20] G. Yan, G. Chen, S. Eidenbenz, N. Li, Malware propagation in online social networks: nature, dynamics, and defense implications, in: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, (2011)
[21] H. Zhu, C. Huang, H. Li, MPPM: Malware propagation and prevention model in online social network, IEEE International Conference on Communications Workshops (ICC), IEEE, (2014)
[22] W. Xu, F. Zhang, S. Zhu, Toward worm detection in online social networks, in: Proceedings of the 26th Annual Computer Security Applications Conference,( 2010)
[23] G. Danezis, P. Mittal, SybilInfer: detecting sybil nodes using social networks, in: NDSS, (2009)
[24] G. Wang, F. Musau, S. Guo, M.B. Abdullahi, Neighbor similarity trust against sybil attack in P2P e-commerce, Trans. (2015)
[25] Panagiotis Ilia, Iasonas Polakis, Elias Athanasopoulos, Federico Maggi, Sotiris Ioannidis,Preventing Privacy Leakage From Photos in Social Networks,2015
[26] Seyyed Mohammad Safi, Ali Movaghar, Mohammad Ghorbani,Privacy protection scheme for mobile social network,2022
[27] Sun, X., Yao, Y., Xia, Y., Liu, X., Chen, J., Wang, Z., 2016. Towards Efficient Sharing of Encrypted Data in Cloud-Based Mobile Social Network. KSII Transactions on Internet and Information Systems 10 (4), 1892–1903.
[28] N. Tran, J. Li, L. Subramanian, S.S. Chow, Optimal sybil-resilient node admission control, in: Proceedings of the INFOCOM, IEEE, (2011)
[29] W. Wei, F. Xu, C.C. Tan, Q. Li, SybilDefender: a defense mechanism for Sybil attacks in large social networks, IEEE Trans. (2013)
[30] A. Hai Wang, Don’t follow me: spam detection in twitter, in: Proceedings of the International Conference on Security and Cryptography (SECRYPT),IEEE, (2010)
[31] F. Ahmed, M. Abulaish, A generic statistical approach for spam detection in Online Social Networks,(2013)
[32] H. Gao, Y. Chen, K. Lee, D. Palsetia, A.N. Choudhary, Towards online spam filtering in social networks, (2012)
[33] M. Fire, R. Goldschmidt, Y. Elovici, Online social networks: threats and solutions, (2014)
[34] D.H. Lee, Personalizing information using users’ online social networks: a case study of CiteULike, (2015)
[35] D. Wang, N. Wang, P. Wang, S. Qing, Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity, (2015)
[36] T. Stein, E. Chen, K. Mangla, Facebook immune system, in: Proceedings of the 4th Workshop on Social Network Systems,( 2011)
[37] G. Kontaxis, I. Polakis, S. Ioannidis, E.P. Markatos, Detecting social network profile cloning, in: Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), IEEE, (2011)
[38] Z. Shan, H. Cao, J. Lv, C. Yan, A. Liu, Enhancing and identifying cloning attacks in online social networks, in: Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ( 2013)
[39] Raúl Pardo a, Musard Balliu a, Gerardo Schneider, Formalising privacy policies in social networks, Journal of Logical and Algebraic Methods in Programming,2017
[40] Joaquim Marquesa, Carlos Serrãob, Improving content privacy on social networks using open digital rights management solutions, International Conference on Project MANagement,2013
[41] Shaukat Ali ,Naveed Islam , Azhar Rauf , Ikram Ud Din and Mohsen Guizani and Joel J. P. C. Rodrigues, Privacy and Security Issues in Online Social Networks,future internet,2018
[42] Nader Yahya Alkeinaya, Norita Md. Norwawi, International Conference on Innovation, Management and Technology Research, User Oriented Privacy Model for Social Networks,2013
[43] Xun Yi, Elisa Bertino, Fang-Yu Rao, Kwok-Yan Lam, Surya Nepal and Athman Bouguettaya, Privacy-Preserving User Profile Matching in Social Networks ,IEEE,2018
[44] ERFAN AGHASIAN, SAURABH GARG, (Member, IEEE), LONGXIANG GAO, (Member, IEEE),SHUI YU,Senior Member, IEEE) AND JAMES MONTGOMERY, (Member, IEEE) , Scoring Users’ Privacy Disclosure Across Multiple Online Social Networks,IEEE,2017
[45] Xiaoyun He, Jaideep Vaidya, Basit Shafiq, Nabil Adam, Vijay Atluri, Preserving Privacy in Social Networks: A Structure-Aware Approach,IEEE,2009
[46] KAH MENG CHONG AND AMIZAH MALIP, Trace Me If You Can: An Unlinkability Approach for Privacy-Preserving in Social Networks,IEEE,2018
[47] Tsan-sheng Hsu, Churn-Jung Liau ,Da-Wei Wang, A logical framework for privacy-preserving social network publication, Journal of Applied Logic,2014
[48] Abdullah Al Hasib, Threats of Online Social Networks, International Journal of Computer Science and Network Security,2009
[49] Gianluca Lax , Antonia Russo, Lara Saidia Fascì, A Blockchain-based approach for matching desired and real privacy settings of social network users, Information Sciences,2021
[50] Largo Bruno Pontecorvo, When Blockchain meets Online Social Networks, Pervasive and Mobile Computing,2020
[51] Le Jiang , Xinglin Zhang, A Blockchain-Based Decentralized Online Social Network, IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, VOL. 6, NO. 6, DECEMBER 2019
[52] https://www.guru99.com/
[53] Aamer Nadeem, Dr M. Younus Javed," A Performance Comparison of Data Encryption Algorithms", International Conference on Information and Communication Technologies, 27-28 August 2005,doi: 10.1109/ICICT.2005.1598556
[54] D. Commey,S. Griffith Klogo,J. Dzisi Gadze," Performance comparison of 3DES, AES, Blowfish and RSA for Dataset Classification and Encryption in Cloud Data Storage",International Journal of Computer Applications,vol. 177, February 2020
[55] Chandrashekhar B,Dr. Mohamed Abdul Waheed," Analysis of Possible Attacks on Data and Possible Solutions with Comparative Analysis of Various Encryption Algorithms and Evaluation", International Journal of Innovative Research in Engineering & Management (IJIREM),vol. 9, April 2022,doi: https://doi.org/10.55524/ijirem.2022.9.2.7
[56] C. Rathod,A. Gonsai," Performance Analysis of AES, Blowfish and Rijndael: Cryptographic Algorithms for Audio", Rising Threats in Expert Applications and Solutions, pp. 203–209,02 October 2020, doi: 10.1007/978-981-15-6014-9_24
[57] H. Alabdulrazzaq, M. Alenezi," Performance Analysis and Evaluation of Cryptographic Algorithms: DES, 3DES, Blowfish, Twofish, and Threefish ", International Journal of Communication Networks and Information Security (IJCNIS),vol. 14, No. 1, April 2022
[58] Bin Zhou ,Jian Pei," Preserving Privacy in Social Networks Against Neighborhood Attacks ", IEEE 24th International Conference on Data Engineering, 07-12 April 2008,doi: 10.1109/ICDE.2008.4497459
[59] A.Jain,S.Ranjan Sahoo,J.Kaubiyal," Online social networks security and privacy: comprehensive review and analysis ", Complex & Intelligent Systems, Vol. 7, pp. 2157–2177, 01 June 2021,doi: 10.1007/S40747-021-00409-7
[60] Seyed Hossein Mousavi , Hamid Barati," SECURITY AND PRIVACY IN SOCIAL NETWORKS ", Journal of Positive School Psychology, Vol. 6, No. 5 ,2022
[61] Ahmed Al-Charchafchi, S. Manickam,Zakaria N. M. Alqattan," Threats Against Information Privacy and Security in Social Networks: A Review ", Springer Nature Singapore Pte Ltd, pp. 358–372, 2020,doi: https://doi.org/10.1007/978-981-15-2693-0_26
[62] R. Malekhosseini, M. Hosseinzadeh,K. Navi," An investigation into the requirements of privacy in social networks and factors contributing to users’ concerns about violation of their privacy ", Social Network Analysis and Mining,11 june 2018,doi: https://doi.org/10.1007/s13278-018-0518-x
[63] P.K. Paul, P.S. Aithal,R.Saavedra, Su. Ghosh4," Blockchain Technology and its Types—A Short Review ", International Journal of Applied Science and Engineering, December 2021