Skip to main content
Log in

Enabling cross-site interactions in social networks

  • Review Article
  • Published:
Social Network Analysis and Mining Aims and scope Submit manuscript

Abstract

Online social networks is one of the major technological phenomena on the Web 2.0. Hundreds of millions of people are posting articles, photos, and videos on their profiles and interacting with other people, but the sharing and interaction are limited within a same social network site. Although users can share some contents in a social network site with people outside of the social network site using a secret address of content, appropriate access control mechanisms are still not supported. To overcome this limitation, we propose a cross-site interaction framework x-mngr, allowing users to interact with users in other social network sites, with a cross-site access control policy, which enables users to specify policies that allow/deny access to their shared contents across social network sites. We also propose a partial mapping approach based on a supervised learning mechanism to map user’s identities across social network sites. We implemented our proposed framework through a photo album sharing application that shares user’s photos between Facebook and MySpace based on the cross-site access control policy that is defined by the content owner. Furthermore, we provide mechanisms to enable users to fuse user-mapping decisions that are provided by their friends or others in the social network. We implemented our framework and through extensive experimentation we prove the accuracy and precision of our proposed mechanisms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Notes

  1. IRB Protocol No: 09-03-16, Title: Cross-site Interaction between Social Networks.

References

  • Barbosa L, Freire J (2007) Combining classifiers to identify online databases. In: WWW ’07: Proceedings of the 16th international conference on World Wide Web. ACM, New York, pp 431–440

  • Barreno M, Bartlett PL, Chi FJ, Joseph AD, Nelson B, Rubinstein BI, Saini U, Tygar JD (2008) Open problems in the security of learning. In: AISec ’08: Proceedings of the 1st ACM workshop on Workshop on AISec. ACM, New York, pp 19–26

  • Borgatti SP, Everett MG (2006) A graph-theoretic perspective on centrality. Soc Netw 28(4):466–484

    Article  Google Scholar 

  • Boyd D (2008) Taken out of context: American teen sociality in networked publics. Phd dissertation, University of California-Berkeley, School of Information

  • Branckaute F (2010) Twitter’s meteoric rise compared to facebook [infographic]. The Blog Herald

  • Brandes U, Erlebach T (2005) Network analysis: methodological foundations, 1st edn. Springer, Berlin, Heidelberg

  • Bratko A, Filipič B, Cormack GV, Lynam TR, Zupan B (2006) Spam filtering using statistical data compression models. J Mach Learn Res 7:2673–2698

    MathSciNet  MATH  Google Scholar 

  • Carminati B, Ferrari E, Perego A (2006) Rule-based access control for social networks. In: On the move to meaningful internet systems 2006: OTM 2006 Workshops, vol 4278, Lecture Notes in Computer Science. Springer, Berlin, Heidelberg, pp 1734–1744

  • Fang L, LeFevre K (2010) Privacy wizards for social networking sites. In: Proceedings of the 19th international conference on World wide web, WWW ’10. ACM, New York, pp 351–360

  • Fazeen M, Dantu R, Guturu P (2011) Identification of leaders, lurkers, associates and spammers in a social network: context-dependent and context-independent approaches. Soc Netw Anal Min 1:241–254

    Article  Google Scholar 

  • Fumera G, Pillai I, Roli F (2006) Spam filtering based on the analysis of text information embedded into images. J Mach Learn Res 7: 2699–2720

    Google Scholar 

  • Gilbert F, Simonetto P, Zaidi F, Jourdan F, Bourqui R (2011) Communities and hierarchical structures in dynamic social networks: analysis and visualization. Soc Netw Anal Min 1:83–95

    Article  Google Scholar 

  • Gollu KK, Saroiu S, Wolman A (2007) A social networking-based access control scheme for personal content. In: Proceedings of 21st ACM symposium on operating systems principles (SOSP ’07). Work in progress

  • Gong L, Qian X (1994) The complexity and composability of secure interoperation. In: SP ’94: Proceedings of IEEE symposium on security and privacy. IEEE Computer Society, pp 190–200

  • Gong L, Qian X (1996) Computational issues in secure interoperation. IEEE Transact Softw Eng 22(1):43–52

    Article  Google Scholar 

  • Google Inc. (2009) Google Maps API Services. http://code.google.com/apis/maps/

  • Gummelt M (2010) Publishing to twitter from facebook pages, http://blog.facebook.com/blog.php?post=123006872130

  • Kittler J, Hatef M, Duin RP, Matas J (1998) On combining classifiers. IEEE Transact Pattern Anal Mach Intelligence 20(3):226–239

    Article  Google Scholar 

  • Kleinberg JM (1999) Authoritative sources in a hyperlinked environment. J ACM 46(5):604–632

    Article  MathSciNet  MATH  Google Scholar 

  • Levenshtein VI (1966) Binary codes capable of correcting deletions, insertions, and reversals. Technical Report 8, Soviet Physics Doklady

  • Liu B (2007) Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data (Data-Centric Systems and Applications), 1st edn. Springer

  • Maes S, Tuyls K, Vanschoenwinkel B, Manderick B (1993) Credit card fraud detection using bayesian and neural networks. In: Maciunas RJ (ed) Interactive image-guided neurosurgery. American Association Neurological Surgeons, pp 261–270

  • Newman MEJ (2001) Scientific collaboration networks. II. Shortest paths, weighted networks, and centrality. Phys Rev E 64(1):016132

    Google Scholar 

  • Newman MEJ (2003) The structure and function of complex networks. SIAM Rev 45(2):167–256

    Article  MathSciNet  MATH  Google Scholar 

  • Ni Q, Lobo J, Calo S, Rohatgi P, Bertino E (2009) Automating role-based provisioning by learning from examples. In: The Proceedings of the 14th ACM symposium on Access control models and technologies (SACMAT 2009)

  • Patriquin A (2007) Connecting the social graph: member overlap at opensocial and facebook, http://blog.compete.com/2007/11/12/connecting-the-social-graph-member-overlap-at-opensocial-and-facebook/

  • Perols J, Chari K, Agrawal M (2009) Information market-based decision fusion. Manage Sci 55(5):827–842

    Article  Google Scholar 

  • Saravanan M, Prasad G, Karishma S, Suganthi D (2011) Analyzing and labeling telecom communities using structural properties. Soc Netw Anal Min 1:271–286

    Article  Google Scholar 

  • Schwartz B (2010) How to connect twitter to facebook status updates. http://www.ehow.com/how_4668396_connect-twitter-facebook-status-updates.html

  • Scott J (2011) Social network analysis: developments, advances, and prospects. Soc Netw Anal Min 1:21–26

    Article  Google Scholar 

  • Shehab M, Bertino E, Ghafoor A (2005) Secure collaboration in mediator-free environments. In: Proceedings of the 12th ACM conference on computer and communications security, CCS ’05. ACM Press, New York, pp 58–67

  • Shehab M, Cheek G, Touati H, Squicciarini AC, Cheng PC (2010) Learning based access control in online social networks. In: Proceedings of the 19th international conference on World wide web, WWW ’10. ACM, New York

  • Short JF, Hughes LA (2006) Studying youth gangs. AltaMira Press, New York

  • Sinclair C, Pierce L, Matzner S (1999) An application of machine learning to network intrusion detection. Computer Secur Appl Conf Ann 0:371

    Google Scholar 

  • The JUNG Framework Development Team: Java Universal Network/Graph Framework (2009) http://jung.sourceforge.net/

  • The University of Waikato: WEKA Machine Learning Project (2009) http://www.cs.waikato.ac.nz/ml/index.html

  • Wang G, Chen H, Atabakhsh H (2004) Automatically detecting deceptive criminal identities. Commun ACM 47(3):70–76

    Article  Google Scholar 

  • Wang GA, Chen H, Xu JJ, Atabakhsh H (2006) Automatically detecting criminal identity deception: an adaptive detection algorithm. IEEE Trans Syst Man Cybern Part A 36(5):988–999

    Article  Google Scholar 

  • Wasserman S, Faust K (1994) Social network analysis: methods and applications, illustrated edn. Cambridge University Press, Cambridge

  • Witten IH, Frank E (2005) Data Mining: practical machine learning tools and techniques, 2nd edn. Morgan Kaufmann Series in Data Management Systems. Morgan Kaufmann, San Francisco. ISBN: 0120884070

  • Xu J, Wang G.A, Li J, Chau M (2007) Complex problem solving: identity matching based on social contextual information. J Assoc Inform Syst 8(10):525–545 (Article 2)

    Google Scholar 

Download references

Acknowledgments

This work was partially funded by the National Science Foundation (NSF-CNS-0831360 and NSF-CNS-1117411).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohamed Shehab.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Shehab, M., Ko, M. & Touati, H. Enabling cross-site interactions in social networks. Soc. Netw. Anal. Min. 3, 93–106 (2013). https://doi.org/10.1007/s13278-012-0051-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13278-012-0051-2

Keywords

Navigation