Loading…

Social network security: Issues, challenges, threats, and solutions

•Security issues and challenges in social network service are studied.•We discuss different security and privacy threats in social network service.•This paper presents several possible defense solutions to secure social network service.•A novel research direction for security of social network servi...

Full description

Saved in:
Bibliographic Details
Published in:Information sciences 2017-12, Vol.421, p.43-69
Main Authors: Rathore, Shailendra, Sharma, Pradip Kumar, Loia, Vincenzo, Jeong, Young-Sik, Park, Jong Hyuk
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:•Security issues and challenges in social network service are studied.•We discuss different security and privacy threats in social network service.•This paper presents several possible defense solutions to secure social network service.•A novel research direction for security of social network service is presented. Social networks are very popular in today's world. Millions of people use various forms of social networks as they allow individuals to connect with friends and family, and share private information. However, issues related to maintaining the privacy and security of a user's information can occur, especially when the user's uploaded content is multimedia, such as photos, videos, and audios. Uploaded multimedia content carries information that can be transmitted virally and almost instantaneously within a social networking site and beyond. In this paper, we present a comprehensive survey of different security and privacy threats that target every user of social networking sites. In addition, we separately focus on various threats that arise due to the sharing of multimedia content within a social networking site. We also discuss current state-of- the-art defense solutions that can protect social network users from these threats. We then present future direction and discuss some easy-to-apply response techniques to achieve the goal of a trustworthy and secure social network ecosystem.
ISSN:0020-0255
1872-6291
DOI:10.1016/j.ins.2017.08.063