Security and Privacy in Online Social Networks

  • Leucio Antonio Cutillo
  • Mark Manulis
  • Thorsten StrufeEmail author


Social Network Services (SNS) are currently drastically revolutionizing the way people interact, thus becoming de facto a predominant service on the web, today.1 The impact of this paradigm change on socioeconomic and technical aspects of collaboration and interaction is comparable to that caused by the deployment of World Wide Web in the 1990s.


Online Social Network Social Network Service Contact List Security Objective Personally Identifiable Information 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Modelling the Real Market Value of Social Networks., 2008.
  2. 2.
    danah m. boyd. Facebook’s privacy trainwreck. Convergence: The International Journal of Research into New Media Technologies, 14(1):13–20, 2008.Google Scholar
  3. 3.
    A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 1(1):11–33, 2004.CrossRefGoogle Scholar
  4. 4.
    M. Balduzzi, C. Platzer, T. Holz, E. Kirda, D. Balzarotti, and C. Kruegel. Abusing Social Networks for Automated User Profiling. Research Report RR-10-233, EURECOM, 2010.
  5. 5.
    L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda. All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks. In 18th Intl. World Wide Web Conference, 2009.Google Scholar
  6. 6.
    d. m. boyd and N. B. Ellison. Social network sites: definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(1), 2007.Google Scholar
  7. 7.
    D. Florencio and C. Herley. A Large-Scale Study of Web Password Habits. In 16th International Conference on World Wide Web (WWW 2007), pages 657–666. ACM, 2007.Google Scholar
  8. 8.
    R. Gross and A. Acquisti. Information Revelation and Privacy in Online Social Networks. In ACM Workshop on Privacy in the Electronic Society, pages 71–80, 2005.Google Scholar
  9. 9.
    T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer. Social phishing. Communications of the ACM, 94–100, 2007.Google Scholar
  10. 10.
    A. Mislove, B. Viswanath, K. P. Gummadi, and P. Druschel. You Are Who You Know: Inferring User Profiles in Online Social Networks. In ACM International Conference on Web Search and Data Mining (WSDM 2010), pages 251–260. ACM, 2010.Google Scholar
  11. 11.
    T. J. Nathaniel, N. Johnson, and M. Jakobsson. Social phishing. Communications of the ACM. Retrieved March, 7, 2006.Google Scholar
  12. 12.
    J. Park and R. Sandhu. Towards Usage Control Models: Beyond Traditional Access Control. In SACMAT ’02: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, pages 57–64. ACM, New York, NY, USA, 2002.Google Scholar
  13. 13.
    F. Schneider, A. Feldmann, B. Krishnamurthy, and W. Willinger. Understanding Online Social Network Usage from a Network Perspective. In ACM SIGCOMM conference on Internet measurement, 2009.Google Scholar
  14. 14.
    L. von Ahn, M. Blum, N. J. Hopper, and J. Langford. CAPTCHA: Using Hard AI Problems for Security. In EUROCRYPT 2003. LNCS, vol 2656, pages 294–311. Springer, Heidelberg, 2003.Google Scholar
  15. 15.
    S. D. Warren and L. D. Brandeis. The right to privacy. Harward Law Review, 4(5):193–220, December 1890.CrossRefGoogle Scholar
  16. 16.
    G. Wondracek, T. Holz, E. Kirda, and C. Kruegel. A Practical Attack to De-Anonymize Social Network Users. In IEEE Symposium on Security and Privacy. IEEE CS, 2010.
  17. 17.
    W. Zhao, R. Chellappa, P. J. Phillips, and A. Rosenfeld. Face recognition: a literature survey. ACM Computing Surveys, 35(4):399–458, 2003.CrossRefGoogle Scholar
  18. 18.
    E. Zheleva and L. Getoor. To Join or Not to Join: The Illusion of Privacy in Social Networks with Mixed Public and Private User Profiles. In WWW 2009, pages 531–540. ACM, 2009.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2010

Authors and Affiliations

  • Leucio Antonio Cutillo
  • Mark Manulis
  • Thorsten Strufe
    • 1
    Email author
  1. 1.TU Darmstadt & CASEDDarmstadtGermany

Personalised recommendations