Published 2022-05-25
Keywords
- Social Networks, Privacy, Social Media, Security, Transaction Security, Peer to Peer Security.
How to Cite
Abstract
In the present world, utilising Social media usage has grown at a phenomenal rate. The social network platforms such as Instagram, Facebook, WhatsApp, Twitter and many more provide services and facilitate peer-to-peer communication through chat, audio/video conferencing, and data sharing in a variety of formats. Using these platforms for their communication has become easier to communicate and adapt whereas the scams behind these underlying networks is unknown. As a potential case of zero trust, peer-to-peer technologies assert that they will support end-to-end communication while demanding access control, negligibility, and adaptability against suppression and enormous data breaches caused by abused trust.. This paper gives the survey of about how the security, confidentiality in social networks are prone to be in the first level. Second, how clueless people are of this demanding use of applications and analysis of the survey and the (P2P) technologies and its framework. Finally it gives a comprehensive examination of the frameworks, applications, and architectures for P2P-based online social networks.
Downloads
References
[2] He, Wu. (2013). A survey of security risks of mobile social media through blog mining and an extensive literature search. Information Management & Computer Security. 21. 10.1108/IMCS-12-2012-0068.
[3] Imrul Kayes, Adriana Iamnitchi, (2017) Privacy and security in online social networks: A survey, Online Social Networks and Media, Vol. 3–4, Pages 1- 21,ISSN 2468-6964, https://doi.org/10.1016/j.osnem.2017.09.001
[4] Masinde, N., Graffi, K. Peer-to-Peer-Based Social Networks: A Comprehensive Survey. SN COMPUT. SCI. 1, 299 (2020). https://doi.org/10.1007/s42979-020-00315-8
[5] Masinde, Newton & Khitman, Liat & Dlikman, Iakov & Graffi, Kalman. (2020). Systematic Evaluation of LibreSocial—A Peer-to-Peer Framework for Online Social Networks. Future Internet. 12. 140. 10.3390/fi12090140.
[6] Obiniyi, Afolayan & Olaide, Oyelade & Obiniyi, P. (2014). Social Network and Security Issues: Mitigating Threat through Reliable Security Model. International Journal of Computer Applications. 103. 1-7. 10.5120/18099-9163.
[7] Wondracek, G., Holz, T., Kirda, E., & Kruegel, C. (2010, May). A practical attack to de-anonymize social network users. In 2010 ieee symposium on security and privacy (pp. 223-238). IEEE.