TY - GEN
T1 - An MST-based information flow model for security in Online Social Networks
AU - Voloch, Nadav
AU - Gudes, Ehud
N1 - Publisher Copyright:
© 2019 IEEE.
PY - 2019/7/1
Y1 - 2019/7/1
N2 - Online Social Network (OSN) security issues have been thoroughly researched in the past decade due to their constant increase of users and ongoing feature development. The OSN is usually described as a graph, in which the users are the vertices, and their connecting edges represent relationships such as friendships, interactions and messaging. In our previous research we have devised an Information Flow security model that gives the vertices and edges numerical attributes, based on their user credibility and connection strength, such as age of user account and the friendship duration of two users, from which we have assessed the level of information sharing willingness of an ego node to users that are not directly connected to it, thus categorizing them as adversaries or acquaintances. In this research we use this model to generate a trustworthy network of users by creating a Minimum Spanning Tree (MST) of the graph instance and iterating the removal of the weak-attributed edges and their connected vertices. We use a known MST algorithm (Kruskal's algorithm) on this unique graph, thus achieving a good Trust threshold of a user network that allows a safe information flow in the OSN. Lastly, we validate the model and show its usefulness with experimental results.
AB - Online Social Network (OSN) security issues have been thoroughly researched in the past decade due to their constant increase of users and ongoing feature development. The OSN is usually described as a graph, in which the users are the vertices, and their connecting edges represent relationships such as friendships, interactions and messaging. In our previous research we have devised an Information Flow security model that gives the vertices and edges numerical attributes, based on their user credibility and connection strength, such as age of user account and the friendship duration of two users, from which we have assessed the level of information sharing willingness of an ego node to users that are not directly connected to it, thus categorizing them as adversaries or acquaintances. In this research we use this model to generate a trustworthy network of users by creating a Minimum Spanning Tree (MST) of the graph instance and iterating the removal of the weak-attributed edges and their connected vertices. We use a known MST algorithm (Kruskal's algorithm) on this unique graph, thus achieving a good Trust threshold of a user network that allows a safe information flow in the OSN. Lastly, we validate the model and show its usefulness with experimental results.
KW - Graph Algorithms for information security
KW - Online Social Networks Privacy
KW - Online Social Networks Security
KW - Online Social Networks user credibility
UR - http://www.scopus.com/inward/record.url?scp=85071838713&partnerID=8YFLogxK
U2 - 10.1109/ICUFN.2019.8806160
DO - 10.1109/ICUFN.2019.8806160
M3 - Conference contribution
AN - SCOPUS:85071838713
T3 - International Conference on Ubiquitous and Future Networks, ICUFN
SP - 460
EP - 465
BT - ICUFN 2019 - 11th International Conference on Ubiquitous and Future Networks
PB - Institute of Electrical and Electronics Engineers
T2 - 11th International Conference on Ubiquitous and Future Networks, ICUFN 2019
Y2 - 2 July 2019 through 5 July 2019
ER -