Hybrid Real-Time Protection System for Online Social Networks

Foundations of Science 25 (4):1095-1124 (2020)
  Copy   BIBTEX

Abstract

The impact of Online Social Networks on human lives is foreseen to be very large with unprecedented amount of data and users. OSN users share their ideas, photos, daily life events, feelings and news. Since OSNs’ security and privacy challenges are more potential than ever before, it is necessary to enhance the protection and filtering approaches of OSNs contents. This paper explores OSNs’ threats and challenges, and categorize them into: account-based, URL-based and content-based threats. In addition, we analyze the existing protection methods and highlight their limitations and weaknesses. Based on that, we propose a comprehensive, user-level, proactive and real-time OSNs’ protection system, called Hybrid Real-time Social Networks Protector. HRSP has three components; a user-level security protocol and two classification models. The protocol defines a structure for OSN’s cryptographic services, including encryption, access control and users’ authentication. The classification models employ machine learning, black lists, white lists and users’ feedback, in order to classify URLs into: Benign, Risk and Inappropriate classes, and contents into: Benign, Hate speech and Inappropriate classes. We constructed two data sets of 150,000 URLs and 22,000 tweets to build and test the two classification models. Results show an overall accuracy of 93.2% for the URL model and 84.4% for the content model, while the protocol implementation produces compatible size and time overhead. The components of HRSP are integrated and have compatible design with OSN platforms.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 92,574

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Web 2.0 Social Networks: The Role of Trust.Sonja Grabner-Kräuter - 2009 - Journal of Business Ethics 90 (S4):505 - 522.
Profiling and the rule of law.Mireille Hildebrandt - 2008 - Identity in the Information Society 1 (1):55-70.
Research on Context-Awareness Mobile SNS Recommendation Algorithm.Zhijun Zhang & Hong Liu - 2015 - Pattern Recognition and Artificial Intelligence 28.
Finding the Trustworthiness Nodes from Signed Social Networks.Xia Wang, Shu Zhang & Hui Li - 2013 - Journal of Intelligent Systems 22 (4):471-485.
Privacy and Protection of Marginalized Social Groups.Stephen Kabera Karanja - 2009 - Studies in Ethics, Law, and Technology 2 (3).

Analytics

Added to PP
2019-02-26

Downloads
27 (#594,564)

6 months
5 (#649,144)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references