8 research outputs found

    Cyber Security Concerns in Social Networking Service

    Get PDF
    Today’s world is unimaginable without online social networks. Nowadays, millions of people connect with their friends and families by sharing their personal information with the help of different forms of social media. Sometimes, individuals face different types of issues while maintaining the multimedia contents like, audios, videos, photos because it is difficult to maintain the security and privacy of these multimedia contents uploaded on a daily basis. In fact, sometimes personal or sensitive information could get viral if that leaks out even unintentionally. Any leaked out content can be shared and made a topic of popular talk all over the world within few seconds with the help of the social networking sites. In the setting of Internet of Things (IoT) that would connect millions of devices, such contents could be shared from anywhere anytime. Considering such a setting, in this work, we investigate the key security and privacy concerns faced by individuals who use different social networking sites differently for different reasons. We also discuss the current state-of-the-art defense mechanisms that can bring somewhat long-term solutions to tackling these threats

    Disrupting violence while preserving encryption

    Get PDF
    Business models adopted by online platforms have enabled the proliferation of online hate speech. Platforms providing end-to-end encrypted (E2EE) services have been under increased scrutiny for hosting hate mongers. Legislators struggle to conceptualise the responsibilities of E2EE services to not host hate speech without infringing the users’ rights to freedom of expression, association, privacy, or data protection. This interdisciplinary article proposes a new legal minimum standard expanding corporate human rights responsibilities of E2EE services to mitigate a category of criminal hate speech - incitement to violence. We explore the regulation and application of metadata, hashing, and homomorphic encryption to disrupt incitement to violence in large groups on E2EE services in compliance with human rights

    Replication and availability in decentralised online social networks

    Get PDF
    A thesis submitted to the University of Bedfordshire in partial fulfilment of the requirements for the degree of Master of PhilosophyDuring the last few years’ online social networks (OSNs) have become increasingly popular among all age groups and professions but this has raised a number of issues around users’ privacy and security. To address these issues a number of attempts have been made in the literature to create the next generation of OSNs built on decentralised architectures. Maintaining high data availability in decentralised OSNs is a challenging task as users themselves are responsible for keeping their profiles available either by staying online for longer periods of time or by choosing trusted peers that can keep their data available on their behalf. The major findings of this research include algorithmically determining the users’ availability and the minimum number of replicas required to achieve the same availability as all mirror nodes combined. The thesis also investigates how the users’ availability, replication degree and the update propagation delay changes as we alter the number of mirror nodes their online patterns, number of sessions and session duration. We found as we increase the number of mirror nodes the availability increases and becomes stable after a certain point which may vary from node to node as it directly depends on the node’s number of mirror nodes and their online patterns. Moreover, we also found the minimum number of replicas required to achieve the same availability as all mirror nodes combined and update propagation delay directly depends on mirror nodes’ number of sessions and session duration. Furthermore, we also found as we increase the number of sessions with reduced session lengths the update propagation delay between the mirror nodes starts to decrease. Thus resulting in spreading the updates faster as compared to mirror nodes with fewer sessions but of longer durations

    Against remediation

    Get PDF
    No description supplie

    User-Centric Networking : Privacy- and Resource-Awareness in User-to-User Communication

    Get PDF
    corecore