期刊文献+

社交网络安全问题及其解决方案 被引量:43

Security issues and solutions on social networks
下载PDF
导出
摘要 社交网络(social network,SN)具有用户数目多、数据量大、信息开放、用户关系难以管理等特点.如何实现用户隐私保护、身份认证和数据访问控制,已成为社交网络中备受关注的安全问题.本文首先介绍了社交网络的基本概念、发展现状和主要技术,并结合社交网络的特点,从社交网络数据挖掘、传统威胁、身份窃取等方面分析其存在的主要安全威胁,总结其存在的安全风险.然后,阐述了几种较为完善的社交网络安全解决方案,并对其工作原理进行了分析和比较.最后,给出了社交网络安全研究的几个热点研究课题,并讨论了社交网络安全性研究的发展方向. Social networks(SN) have the characteristics of immensity of data,huge clientele,openness in information sharing,difficult customer relationship management,etc.Security issues,such as privacy protection,identity authentication and data access control have increased enormously on such networks.The basic concept,present development and main technology of SN were introduced.And specific security risks according to its characteristics were also summarized from the aspects of data mining,traditional threats and identity theft on SN.Furthermore,several existing security solutions of SN were described,and their working principles were analyzed and compared.Finally,some hot security research topics were given and the future research directions were discussed.
出处 《中国科学技术大学学报》 CAS CSCD 北大核心 2011年第7期565-575,共11页 JUSTC
基金 中国高技术研究发展(863)计划(2009AA01Z418) 中央高校基本科研业务费专项资金(YWF1002009) 中国博士后科学基金(20090460192)资助
关键词 社交网络安全 隐私保护 身份认证 访问控制 social network security privacy protection identity authentication access control
  • 相关文献

参考文献24

  • 1Sun J Y, Zhu X Y, Fang Y G. A privacy-preserving scheme for online social networks with efficient revocation[C]//Proeeedings of INFOCOM 2010. San Diego, USA: IEEE Press, 2010:1-9. 被引量:1
  • 2Singh L, Schramm C. Identifying similar neighborhood structures in private social networks[C]//Proceedings of IEEE International Conference on Data Mining Workshops. Sydney, Australia: IEEE Press, 2010: 507-516. 被引量:1
  • 3Douceur J R. The sybil attack[J]. Lecture Notes in Computer Science, 2002, 2 429: 251-260. 被引量:1
  • 4Ge M, Lam K, Wang X Q, et al. VisualSec.. A secure message delivery scheme for online social networks based on profile images [C]// Proceedings of GLOBECOM'09 : Global Telecommunications Conference. HI, USA: IEEE Press, 2009: 1-6. 被引量:1
  • 5Maymounkov P, Mazieres D. Kademlia: A Peer-to- peer information system based on the XOR metric[J]. Lecture Notes in Computer Science, 2002, 2 429: 53-65. 被引量:1
  • 6Boneh D, Crescenzo G D, Ostrovsky R, et al. Public key encryption with keyword search [ J ]. Lecture Notes in Computer Science, 2004, 3 027: 506- 522. 被引量:1
  • 7Hogben G. Security issues in the future of social networking[R/OL]. W3C Workshop on the Future of Social Networking, 2009 [2011-04-20]. http://www. w3. org/2008/09/msnws/papers/Future_of_ SN_ Giles_Hogben_ENISA. pdf. 被引量:1
  • 8Park J, Sandhu R, Cheng Y. User-activity-centric framework for access control in online social networks[J]. IEEE Internet Computing, 2011 (99) : 1-9. 被引量:1
  • 9Cutillo L A, Molva R, Strufe T. Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network[C]//IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops. Kos, Greece: IEEE Press, 2009 : 1-6. 被引量:1
  • 10Limsaiprom P, Tantatsanawong P. Social network anomaly and attack patterns analysis[C]//Proceedings of the 6th IEEE International Conference on Networked Computing. Heidelberg, Germany: IEEE Press, 2010: 11-13. 被引量:1

共引文献372

同被引文献261

引证文献43

二级引证文献198

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部