TY - JOUR
T1 - Novel assessment method for accessing private data in social network security services
AU - Park, Jong Hyuk
AU - Sung, Yunsick
AU - Sharma, Pradip Kumar
AU - Jeong, Young Sik
AU - Yi, Gangman
N1 - Publisher Copyright:
© 2017, Springer Science+Business Media New York.
PY - 2017/7/1
Y1 - 2017/7/1
N2 - Social network services (SNSs) have become one of the core Internet-based application services in recent years. Through SNSs, diverse kinds of private data are shared with users’ friends and SNS plug-in applications. However, these data can be exposed via abnormal private data access. For example, the addition of fake friends to a user’s account is one approach to gain access to a private user’s data. Private user data can be protected from being accessed by using an automated method to assess information. This paper proposes a method that evaluates private data accesses for social network security. By defining normal private data access patterns in advance, abnormal private data access patterns can be exposed. Normal private data access patterns are generated by analyzing all of the consecutive private data accesses of users based on Bayesian probability. We have proven the effectiveness of our approach by conducting experiments where the private data access signals of Twitter accounts were collected and analyzed.
AB - Social network services (SNSs) have become one of the core Internet-based application services in recent years. Through SNSs, diverse kinds of private data are shared with users’ friends and SNS plug-in applications. However, these data can be exposed via abnormal private data access. For example, the addition of fake friends to a user’s account is one approach to gain access to a private user’s data. Private user data can be protected from being accessed by using an automated method to assess information. This paper proposes a method that evaluates private data accesses for social network security. By defining normal private data access patterns in advance, abnormal private data access patterns can be exposed. Normal private data access patterns are generated by analyzing all of the consecutive private data accesses of users based on Bayesian probability. We have proven the effectiveness of our approach by conducting experiments where the private data access signals of Twitter accounts were collected and analyzed.
KW - Security and privacy protection
KW - Social networking
KW - Unauthorized access
UR - http://www.scopus.com/inward/record.url?scp=85015632200&partnerID=8YFLogxK
U2 - 10.1007/s11227-017-2018-6
DO - 10.1007/s11227-017-2018-6
M3 - Article
AN - SCOPUS:85015632200
SN - 0920-8542
VL - 73
SP - 3307
EP - 3325
JO - Journal of Supercomputing
JF - Journal of Supercomputing
IS - 7
ER -