Abstract
More than ever, users’ security and confidential data is at the risk of exploitation due to the ever-burgeoning cybercrimes and newer vulnerabilities exposed or discovered every alternate day. With increased connectivity via social networks, there is also an increased risk to data confidentiality and user privacy, never known before. The networks store a huge amount of private user data mostly related to interactions online. This sensitive information is usually meant for a very few people to see and kept protected from the outside world or unauthorized access via various security techniques. This study investigates the online conduct of users and perceived benefits of using online social networks. This study features security issues and potential attacks on different parts of the user’s security, tends to provide a stable decentralized solution to control, manage and authenticate user’s personal data and thus ensures privacy eliminating the need of third party.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Algarni A, Yue X, Chan T (2014) Social Engineering in social networking sites: the art of impersonation. In: IEEE International Conference on Services Computing (SCC), pp 797–804
Allen D (2017) Discovering and develo** the blockchain cryptoeconomy. Available at SSRN 2815255 2017, Aug 2017
Al-Qurishi M, Hossain MS, Alrubaian M, Rahman SM, Alamri A (2018) Leveraging analysis of user behavior to identify malicious activities in large-scale social networks. IEEE Trans Ind Inf 14(2):799–813
Arnold A (2018) How social media can benefit from blockchain technology. Available at https://www.forbes.com/sites/andrewarnold/2018/05/29/how-social-media-can-benefit-from-blockchain-technology/
Boyd DM, Ellison NB (2007) Social network sites: definition, history, and scholarship. J Comput Med Commun 13(1):210–230
Fire M, Katz G, Elovici Y (2012) Strangers intrusion detection -detecting spammers and fake profiles in social networks based on topology anomalies. Hum J. 1(1):26–39
Hedayati A (2012) An analysis of identity theft: motives, related frauds, techniques and prevention. J Law Confl Resol 4(1):1–12
Huang TK, Rahman MS, Madhyastha HV, Faloutsos M (2013) An analysis of socware cascades in online social networks. In: Proceedings of 22nd international conference on World Wide Web, pp 619–630
Jacobovitz O (2016) Blockchain for identity management. The Lynne and William Frankel Center for Computer Science Department of Computer Science. Ben-Gurion University, Beer Sheva Google Scholar 1, p 9
Levine B, Shields C, Margolin N (2006) A survey of solutions to the sybil attack. University of Massachusetts, Amherst
Li Z, Kang J, Yu R, Ye D, Deng Q, Zhang Y (2018) Consortium blockchain for secure energy trading in industrial internet of things. IEEE Trans Ind Inf 14(8):3690–3700
Peled O, Fire M, Rokach L, Elovici Y (2013) Entity matching in online social networks. In: Proceedings of international conference on social computing, pp 339–344
Perlroth N (2013) Fake twitter followers become multimillion-dollar business. The New York Times, New York, Apr 2013. Available: http://bits.blogs.nytimes.com/2013/04/05/faketwitter-followers-becomes-multimillion-dollar-business/
Peterson J, Krug J (2015) Augur: a decentralized, open-source platform for prediction markets. ar**v preprint ar**v:1501.01042
Pour FSA, Tatar U, Gheorghe A (2018) Agent-based model of sand supply governance employing blockchain technology. In: Proceedings of the annual simulation symposium. Society for Computer Simulation International, p 14
Risius M, Spohrer K (2017) A blockchain research framework. Bus Inf Syst Eng 59(6):385–409
Ryan T, Allen KA, Gray DL, McInerney DM (2017) How social are social media? A review of online social behaviour and connectedness. J Relats Res 8. https://doi.org/10.1017/jrr.2017.13
Samaniego M, Deters R (2016) Blockchain as a service for IoT. In: IEEE international conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp 433–436
Shah C (2017) Social media and social networking. In: Social information seeking. Springer, Cham, pp 29–42
Sharma A (2018) 5 trends shows how blockchain is changing social media. Online available: https://hackernoon.com/5-trends-shows-how-blockchain-is-changing-social-media-ba50c975c041
Shafak W, Siedler N (2017) Blockchain technology for social impact: opportunities and challenges ahead. In: J Cyber Policy 2(3):338–354
Shan Z, Cao H, Lv J, Yan C, Liu A (2013) Enhancing and identifying cloning attacks in online social networks. In: Proceedings of the 7th international conference on ubiquitous information management and communication, p 59
Spencer W (2017) The top 10 worst social media cyber-attacks. InfoSecurity Magazine. Available at https://www.infosecurity-magazine.com/blogs/top-10-worst-social-media-cyber/
Wondracek G, Holz T, Kirda E, Kruegel C (2010) A practical attack to de-anonymize social network users. In: Proceedings of IEEE Symposium. SP, 2010, pp 223–238
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Virmani, C., Choudhary, T. (2020). Blockchain-Based Social Network Infrastructure. In: Kapur, P.K., Singh, O., Khatri, S.K., Verma, A.K. (eds) Strategic System Assurance and Business Analytics. Asset Analytics. Springer, Singapore. https://doi.org/10.1007/978-981-15-3647-2_37
Download citation
DOI: https://doi.org/10.1007/978-981-15-3647-2_37
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-3646-5
Online ISBN: 978-981-15-3647-2
eBook Packages: Business and ManagementBusiness and Management (R0)