Blockchain-Based Social Network Infrastructure

  • Chapter
  • First Online:
Strategic System Assurance and Business Analytics

Part of the book series: Asset Analytics ((ASAN))

Abstract

More than ever, users’ security and confidential data is at the risk of exploitation due to the ever-burgeoning cybercrimes and newer vulnerabilities exposed or discovered every alternate day. With increased connectivity via social networks, there is also an increased risk to data confidentiality and user privacy, never known before. The networks store a huge amount of private user data mostly related to interactions online. This sensitive information is usually meant for a very few people to see and kept protected from the outside world or unauthorized access via various security techniques. This study investigates the online conduct of users and perceived benefits of using online social networks. This study features security issues and potential attacks on different parts of the user’s security, tends to provide a stable decentralized solution to control, manage and authenticate user’s personal data and thus ensures privacy eliminating the need of third party.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (France)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 149.79
Price includes VAT (France)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 189.89
Price includes VAT (France)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
EUR 189.89
Price includes VAT (France)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Algarni A, Yue X, Chan T (2014) Social Engineering in social networking sites: the art of impersonation. In: IEEE International Conference on Services Computing (SCC), pp 797–804

    Google Scholar 

  2. Allen D (2017) Discovering and develo** the blockchain cryptoeconomy. Available at SSRN 2815255 2017, Aug 2017

    Google Scholar 

  3. Al-Qurishi M, Hossain MS, Alrubaian M, Rahman SM, Alamri A (2018) Leveraging analysis of user behavior to identify malicious activities in large-scale social networks. IEEE Trans Ind Inf 14(2):799–813

    Google Scholar 

  4. Arnold A (2018) How social media can benefit from blockchain technology. Available at https://www.forbes.com/sites/andrewarnold/2018/05/29/how-social-media-can-benefit-from-blockchain-technology/

  5. Boyd DM, Ellison NB (2007) Social network sites: definition, history, and scholarship. J Comput Med Commun 13(1):210–230

    Article  Google Scholar 

  6. Fire M, Katz G, Elovici Y (2012) Strangers intrusion detection -detecting spammers and fake profiles in social networks based on topology anomalies. Hum J. 1(1):26–39

    Google Scholar 

  7. Hedayati A (2012) An analysis of identity theft: motives, related frauds, techniques and prevention. J Law Confl Resol 4(1):1–12

    Google Scholar 

  8. Huang TK, Rahman MS, Madhyastha HV, Faloutsos M (2013) An analysis of socware cascades in online social networks. In: Proceedings of 22nd international conference on World Wide Web, pp 619–630

    Google Scholar 

  9. Jacobovitz O (2016) Blockchain for identity management. The Lynne and William Frankel Center for Computer Science Department of Computer Science. Ben-Gurion University, Beer Sheva Google Scholar 1, p 9

    Google Scholar 

  10. Levine B, Shields C, Margolin N (2006) A survey of solutions to the sybil attack. University of Massachusetts, Amherst

    Google Scholar 

  11. Li Z, Kang J, Yu R, Ye D, Deng Q, Zhang Y (2018) Consortium blockchain for secure energy trading in industrial internet of things. IEEE Trans Ind Inf 14(8):3690–3700

    Google Scholar 

  12. Peled O, Fire M, Rokach L, Elovici Y (2013) Entity matching in online social networks. In: Proceedings of international conference on social computing, pp 339–344

    Google Scholar 

  13. Perlroth N (2013) Fake twitter followers become multimillion-dollar business. The New York Times, New York, Apr 2013. Available: http://bits.blogs.nytimes.com/2013/04/05/faketwitter-followers-becomes-multimillion-dollar-business/

  14. Peterson J, Krug J (2015) Augur: a decentralized, open-source platform for prediction markets. ar**v preprint ar**v:1501.01042

  15. Pour FSA, Tatar U, Gheorghe A (2018) Agent-based model of sand supply governance employing blockchain technology. In: Proceedings of the annual simulation symposium. Society for Computer Simulation International, p 14

    Google Scholar 

  16. Risius M, Spohrer K (2017) A blockchain research framework. Bus Inf Syst Eng 59(6):385–409

    Article  Google Scholar 

  17. Ryan T, Allen KA, Gray DL, McInerney DM (2017) How social are social media? A review of online social behaviour and connectedness. J Relats Res 8. https://doi.org/10.1017/jrr.2017.13

  18. Samaniego M, Deters R (2016) Blockchain as a service for IoT. In: IEEE international conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp 433–436

    Google Scholar 

  19. Shah C (2017) Social media and social networking. In: Social information seeking. Springer, Cham, pp 29–42

    Google Scholar 

  20. Sharma A (2018) 5 trends shows how blockchain is changing social media. Online available: https://hackernoon.com/5-trends-shows-how-blockchain-is-changing-social-media-ba50c975c041

  21. Shafak W, Siedler N (2017) Blockchain technology for social impact: opportunities and challenges ahead. In: J Cyber Policy 2(3):338–354

    Google Scholar 

  22. Shan Z, Cao H, Lv J, Yan C, Liu A (2013) Enhancing and identifying cloning attacks in online social networks. In: Proceedings of the 7th international conference on ubiquitous information management and communication, p 59

    Google Scholar 

  23. Spencer W (2017) The top 10 worst social media cyber-attacks. InfoSecurity Magazine. Available at https://www.infosecurity-magazine.com/blogs/top-10-worst-social-media-cyber/

  24. Wondracek G, Holz T, Kirda E, Kruegel C (2010) A practical attack to de-anonymize social network users. In: Proceedings of IEEE Symposium. SP, 2010, pp 223–238

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Charu Virmani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Virmani, C., Choudhary, T. (2020). Blockchain-Based Social Network Infrastructure. In: Kapur, P.K., Singh, O., Khatri, S.K., Verma, A.K. (eds) Strategic System Assurance and Business Analytics. Asset Analytics. Springer, Singapore. https://doi.org/10.1007/978-981-15-3647-2_37

Download citation

Publish with us

Policies and ethics

Navigation