Advertisement

Cluster Computing

, Volume 22, Supplement 3, pp 7275–7286 | Cite as

A framework for secure and privacy protected collaborative contents sharing using public OSN

  • Shaukat AliEmail author
  • Azhar Rauf
  • Naveed Islam
  • Haleem Farman
Article
  • 118 Downloads

Abstract

A major issue thoroughly raised and potentially vulnerable in online social networks (OSNs) is the user privacy preservation. Generally, the issue of privacy is tackled from the user point of view without considering the service providers and the third-party data collectors, who can manipulate user data for third party advertisement and behavioral analysis. Therefore, the privacy risk exists not only from the unauthorized users but also from the OSN service providers. To secure data from both the unauthorized users and OSN service providers a framework for collaborative contents sharing is proposed. In the proposed framework, contents are secured at the time of data dissemination and provided assurance about the data sharing among the legitimate users based on collaborative contents sharing. The proposed framework assures not only the confidentiality of contents but also the privacy of data owner and co-owners in OSN. An architecture is provided to support the theoretical and practical basis for the proposed framework; which exhibits the objective of preserving user and contents privacy.

Keywords

Online social network Privacy preservation Collaborative sharing 

References

  1. 1.
    Ashtari, S.: I know who you are and i saw what you did: social networks and the death of privacy. J. Inf. Priv. Secur. 9(4), 80–82 (2013)Google Scholar
  2. 2.
    Baden, R., Bender, A., Spring, N., Bhattacharjee, B., Starin, D.: Persona: an online social network with user-defined privacy. In: ACM SIGCOMM Computer Communication Review, vol. 39, pp. 135–146. ACM, New York (2009)CrossRefGoogle Scholar
  3. 3.
    Beato, F., Ion, I., Čapkun, S., Preneel, B., Langheinrich, M.: For some eyes only: protecting online information sharing. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, pp. 1–12. ACM, New York (2013)Google Scholar
  4. 4.
    Bielenberg, A., Helm, L., Gentilucci, A., Stefanescu, D., Zhang, H.: The growth of diaspora-a decentralized online social network in the wild. In: IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 13–18. IEEE, New York (2012)Google Scholar
  5. 5.
    Bonneau, J., Preibusch, S.: The privacy jungle: on the market for data protection in social networks. In: Moore, T., Pym, D., Ioannidis, C. (eds.) Economics of Information Security and Privacy, pp. 121–167. Springer, New York (2010)CrossRefGoogle Scholar
  6. 6.
    Carminati, B., Ferrari, E.: Collaborative access control in on-line social networks. In: 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), pp. 231–240. IEEE, New York (2011)Google Scholar
  7. 7.
    Carminati, B., Ferrari, E., Perego, A.: Private relationships in social networks. In: IEEE 23rd International Conference on Data Engineering Workshop, pp. 163–171. IEEE, New York (2007)Google Scholar
  8. 8.
    Cheng, Y., Park, J., Sandhu, R.: Attribute-aware relationship-based access control for online social networks. In: IFIP Annual Conference on Data and Applications Security and Privacy, pp. 292–306. Springer, New York (2014)Google Scholar
  9. 9.
    Cutillo, L.A., Molva, R., Strufe, T., Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network. In: IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops (WoWMoM 2009), pp. 1–6. IEEE, New York (2009)Google Scholar
  10. 10.
    Dürr, M., Maier, M., Dorfmeister, F.: Vegas–a secure and privacy-preserving peer-to-peer online social network. In: International Conferenece on Social Computing (SocialCom) Privacy, Security, Risk and Trust (PASSAT), pp. 868–874. IEEE, New York (2012)Google Scholar
  11. 11.
    Dwyer, C., Hiltz, S., Passerini, K.: Trust and privacy concern within social networking sites: a comparison of facebook and myspace. In: AMCIS 2007 Proceedings, p. 339 (2007)Google Scholar
  12. 12.
    Ghouri, A.M., More, V., Anjum, A.: Social media marketing: a paradigm shift in business. Int. J. Econ. Bus. Manag. Stud. 1(3), 96–103 (2016)Google Scholar
  13. 13.
    Hu, H., Ahn, G.-J., Jorgensen, J.: Detecting and resolving privacy conflicts for collaborative data sharing in online social networks. In: Proceedings of the 27th Annual Computer Security Applications Conference, pp. 103–112. ACM, New York (2011)Google Scholar
  14. 14.
    Jahid, S., Nilizadeh, S., Mittal, P., Borisov, N., Kapadia, A., DECENT: A decentralized architecture for enforcing privacy in online social networks. In: IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 326–332. IEEE, New York (2012)Google Scholar
  15. 15.
    Klemperer, P., Liang, Y., Mazurek, M., Sleeper, M., Ur, B., Bauer, L., Cranor, L.F., Gupta, N., Reiter, M.: Tag, you can see it!: using tags for access control in photo sharing. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 377–386. ACM, New York (2012)Google Scholar
  16. 16.
    Krishnamurthy, B., Wills, C.E.: Characterizing privacy in online social networks. In: Proceedings of the First Workshop on Online Social Networks, pp. 37–42. ACM, New York (2008)Google Scholar
  17. 17.
    Kumar, A., Bezawada, R., Rishika, R., Janakiraman, R., Kannan, P.K.: From social to sale: the effects of firm-generated content in social media on customer behavior. J. Mark. 80(1), 7–25 (2016)CrossRefGoogle Scholar
  18. 18.
    Lucas, M.M., Borisov, N., Flybynight: mitigating the privacy risks of social networking. In: Proceedings of the 7th ACM workshop on Privacy in the Electronic Society, pp. 1–8 (2008). ACM, New YorkGoogle Scholar
  19. 19.
    Miltgen, C.L., Peyrat-Guillard, D.: Cultural and generational influences on privacy concerns: a qualitative study in seven european countries. Eur. J. Inf. Syst. 23(2), 103–125 (2014)CrossRefGoogle Scholar
  20. 20.
    Rathore, N.C., Tripathy, S.: Collaborative access control model for online social networks. In: IEEE 6th International Conference on Advanced Computing (IACC), pp. 19–24 (2016). doi: 10.1109/IACC.2016.14
  21. 21.
    Rebahi, Y., Pallares, J.J., Minh, N.T., Ehlert, S., Kovacs, G., Sisalem, D.: Performance analysis of identity management in the session initiation protocol (SIP). In: IEEE/ACS International Conference on Computer Systems and Applications, pp. 711–717. IEEE, New York (2008)Google Scholar
  22. 22.
    Schwittmann, L., Boelmann, C., Wander, M., Weis, T.: SoNet–privacy and replication in federated online social networks. In: IEEE 33rd International Conference on Distributed Computing Systems Workshops, pp. 51–57. IEEE, New York (2013)Google Scholar
  23. 23.
    SEC, SECG: Recommended elliptic curve domain parameters. Standards for Efficient Cryptography Group, Certicom Corp (2000)Google Scholar
  24. 24.
    Severo, M., Feredj, A., Romele, A.: Soft data and public policy: can social media offer alternatives to official statistics in urban policymaking? Policy Internet 8(3), 354–372 (2016)CrossRefGoogle Scholar
  25. 25.
    Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)MathSciNetCrossRefGoogle Scholar
  26. 26.
    Squicciarini, A.C., Shehab, M., Paci, F.: Collective privacy management in social networks. In: Proceedings of the 18th International Conference on World Wide Web, pp. 521–530. ACM, New York (2009)Google Scholar
  27. 27.
    Strater, K., Richter, H.: Examining privacy and disclosure in a social networking community. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, pp. 157–158. ACM, New York (2007)Google Scholar
  28. 28.
    Such, J.M., Criado, N.: Resolving multi-party privacy conflicts in social media. IEEE Trans. Knowl. Data Eng. 28(7), 1851–1863 (2016)CrossRefGoogle Scholar
  29. 29.
    Thomas, K., Grier, C., Nicol, D.M.: Unfriendly: multi-party privacy risks in social networks. In: International Symposium on Privacy Enhancing Technologies Symposium, pp. 236–252. Springer, New York (2010)CrossRefGoogle Scholar
  30. 30.
    Wishart, R., Corapi, D., Marinovic, S., Sloman, M.: Collaborative privacy policy authoring in a social networking context. In: IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), pp. 1–8. IEEE, New York (2010)Google Scholar
  31. 31.
    Young, A.L., Quan-Haase, A.: Information revelation and internet privacy concerns on social network sites: a case study of facebook. In: Proceedings of the Fourth International Conference on Communities and Technologies, pp. 265–274. ACM, New York (2009)Google Scholar
  32. 32.
    Zhang, W., et al.: Privacy and security concern of online social networks from user perspective. In: International Conference on Information Systems Security and Privacy (SCITEPRESS), pp. 246–253. SCITEPRESS, Setúbal (2015)Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2017

Authors and Affiliations

  • Shaukat Ali
    • 1
    Email author
  • Azhar Rauf
    • 2
  • Naveed Islam
    • 1
  • Haleem Farman
    • 1
  1. 1.Islamia College UniversityPeshawarPakistan
  2. 2.University of PeshawarPeshawarPakistan

Personalised recommendations