Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30165
Protecting the Privacy and Trust of VIP Users on Social Network Sites

Authors: Nidal F. Shilbayeh, Sameh T. Khuffash, Mohammad H. Allymoun, Reem Al-Saidi

Abstract:

There is a real threat on the VIPs personal pages on the Social Network Sites (SNS). The real threats to these pages is violation of privacy and theft of identity through creating fake pages that exploit their names and pictures to attract the victims and spread of lies. In this paper, we propose a new secure architecture that improves the trusting and finds an effective solution to reduce fake pages and possibility of recognizing VIP pages on SNS. The proposed architecture works as a third party that is added to Facebook to provide the trust service to personal pages for VIPs. Through this mechanism, it works to ensure the real identity of the applicant through the electronic authentication of personal information by storing this information within content of their website. As a result, the significance of the proposed architecture is that it secures and provides trust to the VIPs personal pages. Furthermore, it can help to discover fake page, protect the privacy, reduce crimes of personality-theft, and increase the sense of trust and satisfaction by friends and admirers in interacting with SNS.

Keywords: Social Network Sites, Online Social Network, Privacy, Trust, Security and Authentication.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1096113

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3414

References:


[1] A. Felt and D. Evans. "Privacy protection for social networking APIs". In W2SP, 2008..
[2] L. Fang and K. LeFevre. "Privacy Wizards for Social Networking Sites". WWW, 2010.
[3] Boyd, Danah M. and Ellison, "Nicole B. Social network sites: Definition, history, and scholarship". Journal of Computer-Mediated Communication, 13(1), 210-230,2007.
[4] D.Piscitello, & R. Mohan. "Is the WHOIS Service a Source for email Addresses for Spammers?". Journal of SSAC Fellow, 3 (1), 2007.
[5] Dugelay,J.,L,& Rey,C, (2002), "A Survey of Watermarking Algorithms for Image Authentication, EURASIP Journal on Applied Signal Processing", Hindawi Publishing Corp. New York, NY, United States1, January 2002.
[6] Ellison, N. B., Steinfield, C., & Lampe, C. "The benefits of Facebook ‘friends:’ Social capital and college students’ use of online social network sites". Journal of Computer-Mediated Communication, 12, (4), 1143-1168, 2007.
[7] E. Mills, "Facebook suspends app that permitted peephole,”, 2008. (On- Line), available: http://news.cnet.com/8301-10784\3-9977762-7.html.
[8] E. Steel and G. A. Fowler, (2010) "Facebook in online privacy breach; applications transmitting identifying information,” available: http://online.wsj.com/article/ SB10001424052702304772804575558484 075236968.html.
[9] Gahanna,A. In foxnews , The Official: Prince William's Facebook Page a Royal Fraud. Retrieved 11:21, July 14, 2011, (On-Line), available http://www.foxnews.com/story/0,2933,272593,00.html
[10] Gross, R., & Acquisti, A. "Information revelation and privacy in online social networks". Paper presented at the ACM Workshop on Privacy in the Electronic Society (WPES), Alexandria, Virginia, 2005.
[11] Harrenstien, K., Stahl, M., and E. Feinler, (1985). "NICNAME/WHOIS., Internet Engineering Task Force, IETF, from: http://www.ietf.org/rfc/rfc954.txt
[12] Kelly, D. In IrishCentral.com, Irish billionaire to sue Facebook over fake profile pages, Claims social networking site has refused to take down bogus sites. Retrieved 10:21, July 14, 2011, (On-Line), available http://www.irishcentral.com/news/Irish-billionaire-to-sue-Facebookover- fake-profile-pages-122794584.html
[13] Manuel .E., Andreas .M., Christopher ,K., and Engin. K., (2011), PoX: Protecting Users from Malicious Facebook Applications, 3rd IEEE International Workshop on Security and Social Networking (SESOC), Seattle, WA.
[14] Persits, P. In 15seconds , "AES, Protecting Passwords with a One-way Hash Function.htm", Retrieved 11:15, July 17, 2011, (On-Line), from http://aspnet.15seconds.com/feedback/ /AES/Protecting Passwords with a One-way Hash Function.htm.
[15] S. Kelly,. "Identity ’at risk’ on facebook,”, 2008. (On-Line), available: http://news.bbc.co. Uk/2/hi/programmes/click online/7375772.stm,.
[16] Strickland.J,. In Howstuffworks , How Facebook Works, Facebook Applications 2:11, July 21, 2011, (On-Line), available http://computer.howstuffworks.com/internet/socialnetworking/networks/ facebook2.htm
[17] T. Berners-Lee, L. Masinter, and M. McCahill . "RFC 1738 Uniform Resource Locators (URL),” Dec. 1994. Available at http://www.w3.org/Addressing/rfc1738.txt
[18] V. Shah, . "Fair Trade Awareness through Social Networking Mediums and an Insight into Collaborative Filtering , Report is submitted as part requirement for the MEng ,pp 18.
[19] Wang, X., Yin, Y.L.and Yu, H. ,(2005), Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 2-3., Heidelberg
[20] Whois,. In checkurl , Whois: amrkhaled.net Find Domain Names www. amrkhaled.net Retrieved 7:51, July 10, 2011, (On-Line), available http://www.checkurl.info/whois.php?query=amrkhaled.net
[21] W. Luo, Q. Xie, and U. Hengartner, . "Facecloak: An architecture for user privacy on social networking sites,” in CSE (3). IEEE Computer Society, Vancouver, BC, pp. 26–33, 2009.
[22] Zhu.Y., Zexing. H., Wang.H., Hongxin. H., and Gail-Joon .A. , (2010),A Collaborative Framework for Privacy Protection in Online Social Networks, In Proceedings of the 6th International Conference on Collaborative Computing, Chicago, Illinois, USA, October 9-12, 2010.
[23] M. Sato. Creating next generation cloud computing based network services and the contributions of social cloud operation support system (oss) to society. In Proc. of IEEE WETICE, pages 52–56, 2009.
[24] K. Chard, S. Caton, O. Rana, and K. Bubendorfer, "Social cloud: Cloud computing in social networks,” in IEEE CLOUD’10, 2010, pp. 99–106.
[25] N. F. Shilbayeh, B. Abuhaija, Z. Alqudsy. Combined DWT-CT Blind Digital Image Watermarking Algorithm, World Academy of Science, Engineering and Technology, Vol:7 pp06-21, 2013.