Protecting the Privacy and Trust of VIP Users on Social Network Sites

There is a real threat on the VIPs personal pages on
the Social Network Sites (SNS). The real threats to these pages is
violation of privacy and theft of identity through creating fake pages
that exploit their names and pictures to attract the victims and spread
of lies. In this paper, we propose a new secure architecture that
improves the trusting and finds an effective solution to reduce fake
pages and possibility of recognizing VIP pages on SNS. The
proposed architecture works as a third party that is added to
Facebook to provide the trust service to personal pages for VIPs.
Through this mechanism, it works to ensure the real identity of the
applicant through the electronic authentication of personal
information by storing this information within content of their
website. As a result, the significance of the proposed architecture is
that it secures and provides trust to the VIPs personal pages.
Furthermore, it can help to discover fake page, protect the privacy,
reduce crimes of personality-theft, and increase the sense of trust and
satisfaction by friends and admirers in interacting with SNS.





References:
[1] A. Felt and D. Evans. "Privacy protection for social networking APIs".
In W2SP, 2008..
[2] L. Fang and K. LeFevre. "Privacy Wizards for Social Networking Sites".
WWW, 2010.
[3] Boyd, Danah M. and Ellison, "Nicole B. Social network sites:
Definition, history, and scholarship". Journal of Computer-Mediated
Communication, 13(1), 210-230,2007.
[4] D.Piscitello, & R. Mohan. "Is the WHOIS Service a Source for email
Addresses for Spammers?". Journal of SSAC Fellow, 3 (1), 2007.
[5] Dugelay,J.,L,& Rey,C, (2002), "A Survey of Watermarking Algorithms
for Image Authentication, EURASIP Journal on Applied Signal
Processing", Hindawi Publishing Corp. New York, NY, United States1,
January 2002.
[6] Ellison, N. B., Steinfield, C., & Lampe, C. "The benefits of Facebook
‘friends:’ Social capital and college students’ use of online social
network sites". Journal of Computer-Mediated Communication, 12, (4),
1143-1168, 2007.
[7] E. Mills, "Facebook suspends app that permitted peephole,”, 2008. (On-
Line), available: http://news.cnet.com/8301-10784\3-9977762-7.html.
[8] E. Steel and G. A. Fowler, (2010) "Facebook in online privacy breach;
applications transmitting identifying information,” available:
http://online.wsj.com/article/ SB10001424052702304772804575558484
075236968.html.
[9] Gahanna,A. In foxnews , The Official: Prince William's Facebook Page
a Royal Fraud. Retrieved 11:21, July 14, 2011, (On-Line), available
http://www.foxnews.com/story/0,2933,272593,00.html
[10] Gross, R., & Acquisti, A. "Information revelation and privacy in online
social networks". Paper presented at the ACM Workshop on Privacy in
the Electronic Society (WPES), Alexandria, Virginia, 2005.
[11] Harrenstien, K., Stahl, M., and E. Feinler, (1985). "NICNAME/WHOIS.,
Internet Engineering Task Force, IETF, from:
http://www.ietf.org/rfc/rfc954.txt
[12] Kelly, D. In IrishCentral.com, Irish billionaire to sue Facebook over fake
profile pages, Claims social networking site has refused to take down
bogus sites. Retrieved 10:21, July 14, 2011, (On-Line), available
http://www.irishcentral.com/news/Irish-billionaire-to-sue-Facebookover-
fake-profile-pages-122794584.html
[13] Manuel .E., Andreas .M., Christopher ,K., and Engin. K., (2011), PoX:
Protecting Users from Malicious Facebook Applications, 3rd IEEE
International Workshop on Security and Social Networking (SESOC),
Seattle, WA.
[14] Persits, P. In 15seconds , "AES, Protecting Passwords with a One-way
Hash Function.htm", Retrieved 11:15, July 17, 2011, (On-Line), from
http://aspnet.15seconds.com/feedback/ /AES/Protecting Passwords with
a One-way Hash Function.htm.
[15] S. Kelly,. "Identity ’at risk’ on facebook,”, 2008. (On-Line), available:
http://news.bbc.co. Uk/2/hi/programmes/click online/7375772.stm,.
[16] Strickland.J,. In Howstuffworks , How Facebook Works, Facebook
Applications 2:11, July 21, 2011, (On-Line), available
http://computer.howstuffworks.com/internet/socialnetworking/networks/
facebook2.htm
[17] T. Berners-Lee, L. Masinter, and M. McCahill . "RFC 1738 Uniform
Resource Locators (URL),” Dec. 1994. Available at
http://www.w3.org/Addressing/rfc1738.txt
[18] V. Shah, . "Fair Trade Awareness through Social Networking Mediums
and an Insight into Collaborative Filtering , Report is submitted as part
requirement for the MEng ,pp 18.
[19] Wang, X., Yin, Y.L.and Yu, H. ,(2005), Finding Collisions in the Full
SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 2-3.,
Heidelberg
[20] Whois,. In checkurl , Whois: amrkhaled.net Find Domain Names www.
amrkhaled.net Retrieved 7:51, July 10, 2011, (On-Line), available
http://www.checkurl.info/whois.php?query=amrkhaled.net
[21] W. Luo, Q. Xie, and U. Hengartner, . "Facecloak: An architecture for
user privacy on social networking sites,” in CSE (3). IEEE Computer
Society, Vancouver, BC, pp. 26–33, 2009.
[22] Zhu.Y., Zexing. H., Wang.H., Hongxin. H., and Gail-Joon .A. , (2010),A
Collaborative Framework for Privacy Protection in Online Social
Networks, In Proceedings of the 6th International Conference on
Collaborative Computing, Chicago, Illinois, USA, October 9-12, 2010.
[23] M. Sato. Creating next generation cloud computing based network
services and the contributions of social cloud operation support system
(oss) to society. In Proc. of IEEE WETICE, pages 52–56, 2009.
[24] K. Chard, S. Caton, O. Rana, and K. Bubendorfer, "Social cloud: Cloud
computing in social networks,” in IEEE CLOUD’10, 2010, pp. 99–106.
[25] N. F. Shilbayeh, B. Abuhaija, Z. Alqudsy. Combined DWT-CT Blind
Digital Image Watermarking Algorithm, World Academy of Science,
Engineering and Technology, Vol:7 pp06-21, 2013.