CFP last date
20 January 2025
Reseach Article

Securing Sensitive Data Sharing in Web and Social Networks: A Dynamic Trust-based Approach

by Shyam Prasad Teegala, T. Shekar Reddy, T. Sunil Kumar, Majeti Srinadh Swamy
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 186 - Number 17
Year of Publication: 2024
Authors: Shyam Prasad Teegala, T. Shekar Reddy, T. Sunil Kumar, Majeti Srinadh Swamy
10.5120/ijca2024923563

Shyam Prasad Teegala, T. Shekar Reddy, T. Sunil Kumar, Majeti Srinadh Swamy . Securing Sensitive Data Sharing in Web and Social Networks: A Dynamic Trust-based Approach. International Journal of Computer Applications. 186, 17 ( Apr 2024), 47-55. DOI=10.5120/ijca2024923563

@article{ 10.5120/ijca2024923563,
author = { Shyam Prasad Teegala, T. Shekar Reddy, T. Sunil Kumar, Majeti Srinadh Swamy },
title = { Securing Sensitive Data Sharing in Web and Social Networks: A Dynamic Trust-based Approach },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2024 },
volume = { 186 },
number = { 17 },
month = { Apr },
year = { 2024 },
issn = { 0975-8887 },
pages = { 47-55 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume186/number17/securing-sensitive-data-sharing-in-web-and-social-networks-a-dynamic-trust-based-approach/ },
doi = { 10.5120/ijca2024923563 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-04-27T03:06:53.421814+05:30
%A Shyam Prasad Teegala
%A T. Shekar Reddy
%A T. Sunil Kumar
%A Majeti Srinadh Swamy
%T Securing Sensitive Data Sharing in Web and Social Networks: A Dynamic Trust-based Approach
%J International Journal of Computer Applications
%@ 0975-8887
%V 186
%N 17
%P 47-55
%D 2024
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Objective: In this research, we aim to address the challenges posed by the surge in Security Method for Web and Social Network Applications. It is based on dynamic trust, focusing on the need to safeguard sensitive information amidst the dynamic nature of these platforms. Method: We developed framework for web and social network apps. This ensures security. It relies on dynamic trust for effective implementation. Users can trust their sensitive data sharing within this framework. This method utilizes innovative criteria for evaluating trust factors and employs dynamic trust assessments to adapt to the unpredictable behaviors of users within these platforms. Findings: Our investigation reveals that conventional static access control mechanisms are insufficient to mitigate the risks associated with data sharing in W-SNA. Through this implementation, we demonstrate the capability to effectively monitor and regulate negative behaviors, dynamically adjusting access levels to prevent inadvertent data disclosures. Implications: The adoption of DT-BSM offers significant implications for enhancing the security and confidentiality of data shared within W-SNA platforms. By empowering users to safeguard sensitive information effectively, this approach contributes to fostering a safer and more trustworthy digital ecosystem. Conclusion: In conclusion, our research underscores the importance of implementing a dynamic trust-based approach to address the complexities of data sharing in W-SNA environments. Through this adoption, users can navigate these platforms with greater confidence, mitigating the risks of breaches of confidentiality and misinformation dissemination.

References
  1. G. Aydin, N. Uray, G. Silahtaroglu, "How to Engage Consumers through Effective Social Media Use—Guidelines for Consumer Goods Companies from an Emerging Market", Journal of Theoretical and Applied Electronic Commerce Research, Vol. 16, pp. 768–790, 2021.
  2. S. Patil, Pratiksha. “ A Secure Data Evaluation and Publishing Technique for Big Data” International Journal of Computer Applications (IJCA) 975:8887
  3. S. Tripathi, S. Verma, "Social media, an emerging platform for relationship building: A study of engagement with nongovernment organizations in India", International Journal of Nonprofit and Voluntary Sector Marketing, Vol. 23(1), 2018.
  4. S. H. Webb, S. J. Roberts, "Communication and social media approaches in small businesses", Journal of Marketing Development and Competitiveness, Vol. 10(1), 2016.
  5. F. Li, H. Li, B. Niu, and J. Chen, "Privacy computing: Concept, computing framework, and future development trends", Engineering, vol. 5, no. 6, pp. 1179-1192, 2019.
  6. Y. G. Wu, W. H. Yan, J. Z. Wang, "Real identity based access control technology under zero trust architecture", Int. Conference on Wireless Communications and Smart Grid (ICWCSG), 2021.
  7. S. Achleitner, Q. Burke, P. McDaniel, T. L. Porta, "MLSNet: A Policy Complying Multilevel Security Framework for Software Defined Networking", Networking and Internet Architecture, arXiv:2009.10021v1, 2020.
  8. S. Kaushik, G. Charu, "Capability Based Outsourced Data Access Control with Assured File Deletion and Efficient Revocation with Trust Factor in Cloud Computing", International Journal of Cloud Applications and Computing (IJCAC), Vol.10(1), pp.64-84, 2020.
  9. C. Blundo, S. Cimato, L. Siniscalchi, "Managing Constraints in Role Based Access Control", IEEE Access, Vol. 8, 2020.
  10. X. Jin, R. Krishnan, and R. Sandhu. "A unified attribute-based access control model covering DAC, MAC and RBAC", In IFIP Annual Conf. on Data and App. Security and Privacy, pp. 41–55, 2012.
  11. O. Ochoa, M. Rodney, N. D. Rio, "Accessing Provenance Records in Semantic Web Services", IEEE 14th International Conference on Semantic Computing (ICSC), 2020.
  12. S. Rouhani, R. Deters, "Data Trust Framework Using Blockchain Technology and Adaptive Transaction Validation", IEEE Access, Vol. 9, 2021.
  13. Y. Wang, X. Tong, "Trust Prediction Based on Extreme Learning Machine and Asymmetric Tri-Training", IEEE Access, Vol. 9, 2021.
  14. S. Hussain, R. A. Naqvi, S. Abbas, M. A. Khan, T. Sohail, D. Hussain, "Trait Based Trustworthiness Assessment in Human-Agent Collaboration Using Multi-Layer Fuzzy Inference Approach", IEEE Access, Vol. 9, 2021.
  15. F. Shang, W. Wu, Y. Gu, "A unified model of RBAC and DAC", IEEE 2nd Int. Conf. on Art. Intelligence, Management Sci. and Electronic. Commerce (AIMSEC), 2011.
  16. X. Liu, J. Fu, "SPWalk: Similar Property Oriented Feature Learning for Phishing Detection", IEEE Access, Vol. 8, 2020.
  17. G. D. Putra, V. Dedeoglu, S. S. Kanhere, R. Jurdak, A. Ignjatovic, "Trust-Based Blockchain Authorization for IoT", IEEE Transactions on Network and Service Management, Vol. 18(2), 2021.
  18. Y. G. Wu, W. H. Yan, J. Z. Wang, "Real identity based access control technology under zero trust architecture", IEEE Int. Conference on Wireless Comm. and Smart Grid (ICWCSG), 2021.
  19. K. Sohr, M. Drouineaud, G.-J. Ahn, M. Gogolla, "Analyzing and Managing Role-Based Access Control Policies", IEEE Transactions on Knowledge and Data Engineering, Vol. 20(7), 2008.
  20. H. Hu, G.-J. Ahn, J. Jorgensen, "Multiparty Access Control for Online Social Networks: Model and Mechanisms", IEEE Transactions On Knowledge and Data Engineering, Vol. 25, No. 7, 2013.
  21. S. M. Ghafari, A. Beheshti, A.Joshi, C. Paris, S. Yakhchi,M. A Orgun, A. Jolfaei, Q. Z. Sheng, "Modeling Personality Effect In Trust Prediction", Jr. of Data Intelligence, Vol. 2(4), pp. 401-417, 2021.
  22. S. Gustafsson, N. Gillespie, R. Searle, V. H. Hailey, G. Dietz, "Preserving Organizational Trust During Disruption" Organization Studies, Vol. 42(9), pp.1409–1433, 2021.
  23. P. W. L. Fong, M. Anwar, and Z. Zhao, "A privacy preservation model for facebook-style social network systems", in Proc. Eur. Symposium. Resarch Computing Security, pp. 303-320, 2009.
  24. T. Phillips, X. Yu, B. Haakenson, and X. Zou, "Design and implementation of privacy-preserving, flexible and scalable role-based hierarchical access control". In 1st IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), pp. 46–55, 2019.
  25. C. Yuan, J. Park, and R. Sandhu, "A user-to-user relationship based access control model for online social networks", in Data and Applications Security and Privacy, vol. 26, pp. 8-24, 2012.
  26. H. Nusantoro, R. Supriati, N. Azizah, N. P. L. Santoso, S. Maulana, "Blockchain Based Authentication for Identity Management", IEEE 9th Int. Conf. on Cyber and IT Service Management (CITSM), 2021.
  27. L. Mui, M. Mohtashemi, and A. Halberstadt, "A computational model of trust and reputation", in Proc. 35th Int. Conference System Science, pp. 2431-2439, 2002.
  28. N. B. Truong, T.-W. Um, G. M. Lee, "A reputation and knowledge based trust service platform for trustworthy", in Proc. 19th Int. Conf. Innov. Clouds, pp. 104-111, 2016.
  29. Y. Xu, J. Liu, M. Tang, and X. F. Liu, "An efficient trust propagation scheme for predicting trustworthiness of service providers in service oriented social networks", in Proc. IEEE 20th Int. Conf. Web Services, pp. 467-474, 2013.
  30. F. Shan, J. Liu, X. Wang, W. Liu, B. Zhou, "A Smart Access Control Method for Online Social Networks Based on Support Vector Machine", IEEE Access, Volume: 8, 2020.
  31. N. Voloch, P. L. M. Elmakies, E. Gudes, "An Access Control Model for Data Security in Online Social Networks Based on Role and User Credibility", International Symposium on Cyber Security Cryptography and Machine Learning(CSCML), pp 156-168, 2019.
  32. F. Shan, H. Li, F. Li, Y. Guo, Ben Niu, "HAC: Hybrid Access Control for Online Social Networks", Security and Communication Networks, Article ID 7384194, pp. 11 pages, 2018.
  33. Y. Cheng, J. Park, R. Sandhu, "An Access Control Model for Online Social Networks Using User-to-User Relationships", IEEE Transactions on Dependable and Secure Computing, Vol. 13(4), 2016.
  34. Y. Zheng, Z. Li, X. Xu, Q. Zhao, "Dynamic defenses in cyber security: Techniques, methods and challenges", Digital Communications and Networks, 2021.
  35. B. Carminati and E. Ferrari, "Enforcing relationships privacy through collaborative access control in Web-based Social Networks", in Proc. 5th Int. Conf. Collaborative Computer Network, pp. 1-9, 2009.
  36. W. Li, J. Wu, Q. Zhang, K. Hu, and J. Li, "Trust-driven and QoS demand clustering analysis based cloud workflow scheduling strategies", Cluster Computing, Vol. 17(3), pp. 1013-1030, 2014.
  37. Y. Wang, I.-R. Chen, J.-H. Cho, A. Swami, and K. S. Chan, "Trust-based service composition and binding with multiple objective optimization in service-oriented mobile ad hoc networks", IEEE Transaction Services Computing, Vol. 10(4), pp. 660-672, 2017.
  38. A. Das and M. M. Islam, "SecuredTrust: a dynamic trust computation model for secured communication in multiagent systems", IEEE Transactions on Dependable and Secure Computing, Vol. 9(2), pp. 261–274, 2012.
  39. "Dataset", http://algs4.cs.princeton.edu/43mst/mediumEWG.txt.
Index Terms

Computer Science
Information Sciences

Keywords

Dynamic Trust web applications Social networking apps