inis 14(1): e3

Research Article

Security and Privacy in Online Social Networks: A Survey

Download1175 downloads
  • @ARTICLE{10.4108/inis.1.1.e3,
        author={Sudarshan Kudlur Satyanarayana and Keshav Sood and Yuan Tao and Shui Yu},
        title={Security and Privacy in Online Social Networks: A Survey},
        journal={EAI Endorsed Transactions on Industrial Networks and Intelligent Systems},
        volume={1},
        number={1},
        publisher={ICST},
        journal_a={INIS},
        year={2014},
        month={12},
        keywords={Architecture of OSN, Online Social Networks, OSN Attacks, OSN Vulnerability and risks.},
        doi={10.4108/inis.1.1.e3}
    }
    
  • Sudarshan Kudlur Satyanarayana
    Keshav Sood
    Yuan Tao
    Shui Yu
    Year: 2014
    Security and Privacy in Online Social Networks: A Survey
    INIS
    ICST
    DOI: 10.4108/inis.1.1.e3
Sudarshan Kudlur Satyanarayana1,*, Keshav Sood2, Yuan Tao3, Shui Yu4
  • 1: Deakin University, Australia, skudlur@deakin.edu.au
  • 2: Deakin University, Australia, ksood@deakin.edu.au
  • 3: Deakin University, Australia, ksood@deakin.edu.au 3Anhui Earthquake Bureau, Hefei. School of Computer and Information Hefei University, China, taoy89@126.com
  • 4: Deakin University, Australia, shui.yu@deakin.edu.au
*Contact email: skudlur@deakin.edu.au

Abstract

The Online Social Networks (OSN) open a new vista serving millions of users and have reshaped the way people interacts. Unfortunately these networks are an emerging platform for cybercrimes such as sending malicious URLs, spams, etc. which causes a huge financial loss and social damage. In this paper, it is reviewed that OSN is a new cybercrime platform for threating agents because of the security pit falls in the existing centralised architecture and their driven functionalities. This article surveys the detailed analysis of the current state of the Online Social Networks in perspective of security and privacy issues. Additionally in this paper we presents various types of attacks that can be mounted via OSN and the defence measures against each of the attack. This literature also highlights on the types of vulnerabilities and threats in OSN. Significant threat categories and risks associated as well as a scope to circumventing these threats and vulnerabilities are also introduced.