Abstract
A major issue thoroughly raised and potentially vulnerable in online social networks (OSNs) is the user privacy preservation. Generally, the issue of privacy is tackled from the user point of view without considering the service providers and the third-party data collectors, who can manipulate user data for third party advertisement and behavioral analysis. Therefore, the privacy risk exists not only from the unauthorized users but also from the OSN service providers. To secure data from both the unauthorized users and OSN service providers a framework for collaborative contents sharing is proposed. In the proposed framework, contents are secured at the time of data dissemination and provided assurance about the data sharing among the legitimate users based on collaborative contents sharing. The proposed framework assures not only the confidentiality of contents but also the privacy of data owner and co-owners in OSN. An architecture is provided to support the theoretical and practical basis for the proposed framework; which exhibits the objective of preserving user and contents privacy.
Similar content being viewed by others
References
Ashtari, S.: I know who you are and i saw what you did: social networks and the death of privacy. J. Inf. Priv. Secur. 9(4), 80–82 (2013)
Baden, R., Bender, A., Spring, N., Bhattacharjee, B., Starin, D.: Persona: an online social network with user-defined privacy. In: ACM SIGCOMM Computer Communication Review, vol. 39, pp. 135–146. ACM, New York (2009)
Beato, F., Ion, I., Čapkun, S., Preneel, B., Langheinrich, M.: For some eyes only: protecting online information sharing. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, pp. 1–12. ACM, New York (2013)
Bielenberg, A., Helm, L., Gentilucci, A., Stefanescu, D., Zhang, H.: The growth of diaspora-a decentralized online social network in the wild. In: IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 13–18. IEEE, New York (2012)
Bonneau, J., Preibusch, S.: The privacy jungle: on the market for data protection in social networks. In: Moore, T., Pym, D., Ioannidis, C. (eds.) Economics of Information Security and Privacy, pp. 121–167. Springer, New York (2010)
Carminati, B., Ferrari, E.: Collaborative access control in on-line social networks. In: 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), pp. 231–240. IEEE, New York (2011)
Carminati, B., Ferrari, E., Perego, A.: Private relationships in social networks. In: IEEE 23rd International Conference on Data Engineering Workshop, pp. 163–171. IEEE, New York (2007)
Cheng, Y., Park, J., Sandhu, R.: Attribute-aware relationship-based access control for online social networks. In: IFIP Annual Conference on Data and Applications Security and Privacy, pp. 292–306. Springer, New York (2014)
Cutillo, L.A., Molva, R., Strufe, T., Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network. In: IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops (WoWMoM 2009), pp. 1–6. IEEE, New York (2009)
Dürr, M., Maier, M., Dorfmeister, F.: Vegas–a secure and privacy-preserving peer-to-peer online social network. In: International Conferenece on Social Computing (SocialCom) Privacy, Security, Risk and Trust (PASSAT), pp. 868–874. IEEE, New York (2012)
Dwyer, C., Hiltz, S., Passerini, K.: Trust and privacy concern within social networking sites: a comparison of facebook and myspace. In: AMCIS 2007 Proceedings, p. 339 (2007)
Ghouri, A.M., More, V., Anjum, A.: Social media marketing: a paradigm shift in business. Int. J. Econ. Bus. Manag. Stud. 1(3), 96–103 (2016)
Hu, H., Ahn, G.-J., Jorgensen, J.: Detecting and resolving privacy conflicts for collaborative data sharing in online social networks. In: Proceedings of the 27th Annual Computer Security Applications Conference, pp. 103–112. ACM, New York (2011)
Jahid, S., Nilizadeh, S., Mittal, P., Borisov, N., Kapadia, A., DECENT: A decentralized architecture for enforcing privacy in online social networks. In: IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 326–332. IEEE, New York (2012)
Klemperer, P., Liang, Y., Mazurek, M., Sleeper, M., Ur, B., Bauer, L., Cranor, L.F., Gupta, N., Reiter, M.: Tag, you can see it!: using tags for access control in photo sharing. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 377–386. ACM, New York (2012)
Krishnamurthy, B., Wills, C.E.: Characterizing privacy in online social networks. In: Proceedings of the First Workshop on Online Social Networks, pp. 37–42. ACM, New York (2008)
Kumar, A., Bezawada, R., Rishika, R., Janakiraman, R., Kannan, P.K.: From social to sale: the effects of firm-generated content in social media on customer behavior. J. Mark. 80(1), 7–25 (2016)
Lucas, M.M., Borisov, N., Flybynight: mitigating the privacy risks of social networking. In: Proceedings of the 7th ACM workshop on Privacy in the Electronic Society, pp. 1–8 (2008). ACM, New York
Miltgen, C.L., Peyrat-Guillard, D.: Cultural and generational influences on privacy concerns: a qualitative study in seven european countries. Eur. J. Inf. Syst. 23(2), 103–125 (2014)
Rathore, N.C., Tripathy, S.: Collaborative access control model for online social networks. In: IEEE 6th International Conference on Advanced Computing (IACC), pp. 19–24 (2016). doi:10.1109/IACC.2016.14
Rebahi, Y., Pallares, J.J., Minh, N.T., Ehlert, S., Kovacs, G., Sisalem, D.: Performance analysis of identity management in the session initiation protocol (SIP). In: IEEE/ACS International Conference on Computer Systems and Applications, pp. 711–717. IEEE, New York (2008)
Schwittmann, L., Boelmann, C., Wander, M., Weis, T.: SoNet–privacy and replication in federated online social networks. In: IEEE 33rd International Conference on Distributed Computing Systems Workshops, pp. 51–57. IEEE, New York (2013)
SEC, SECG: Recommended elliptic curve domain parameters. Standards for Efficient Cryptography Group, Certicom Corp (2000)
Severo, M., Feredj, A., Romele, A.: Soft data and public policy: can social media offer alternatives to official statistics in urban policymaking? Policy Internet 8(3), 354–372 (2016)
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Squicciarini, A.C., Shehab, M., Paci, F.: Collective privacy management in social networks. In: Proceedings of the 18th International Conference on World Wide Web, pp. 521–530. ACM, New York (2009)
Strater, K., Richter, H.: Examining privacy and disclosure in a social networking community. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, pp. 157–158. ACM, New York (2007)
Such, J.M., Criado, N.: Resolving multi-party privacy conflicts in social media. IEEE Trans. Knowl. Data Eng. 28(7), 1851–1863 (2016)
Thomas, K., Grier, C., Nicol, D.M.: Unfriendly: multi-party privacy risks in social networks. In: International Symposium on Privacy Enhancing Technologies Symposium, pp. 236–252. Springer, New York (2010)
Wishart, R., Corapi, D., Marinovic, S., Sloman, M.: Collaborative privacy policy authoring in a social networking context. In: IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), pp. 1–8. IEEE, New York (2010)
Young, A.L., Quan-Haase, A.: Information revelation and internet privacy concerns on social network sites: a case study of facebook. In: Proceedings of the Fourth International Conference on Communities and Technologies, pp. 265–274. ACM, New York (2009)
Zhang, W., et al.: Privacy and security concern of online social networks from user perspective. In: International Conference on Information Systems Security and Privacy (SCITEPRESS), pp. 246–253. SCITEPRESS, Setúbal (2015)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ali, S., Rauf, A., Islam, N. et al. A framework for secure and privacy protected collaborative contents sharing using public OSN. Cluster Comput 22 (Suppl 3), 7275–7286 (2019). https://doi.org/10.1007/s10586-017-1236-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-017-1236-2