Title: Privacy architectures in social networks' state-of-the-art survey

Authors: Mohammad Badiul Islam; Renato Iannella; Jason Watson; Shlomo Geva

Addresses: Software Systems Research Group, NICTA, 70-72 Bowen St., Spring Hill, Brisbane QLD 4000, Australia; Queensland University of Technology (QUT), 2 George St, Brisbane QLD 4000, Australia ' KnowledgeFlux, Level 7, 100 Edward St, Brisbane 4000, Australia; Queensland University of Technology, 2 George St, Brisbane QLD 4000, Australia ' Science and Engineering Faculty, Information Systems School, Queensland University of Technology, Gardens Point, Y Block Level 7, 706C, CRICOS No. 00213J, Australia ' Science and Engineering Faculty, Electrical Engineering, Computer Science, Computational Intelligence and Signal Processing, Queensland University of Technology, Gardens Point, S Block Level 10, 2 George St., Brisbane QLD 4000, Australia

Abstract: The use of social networking has exploded, with millions of people using various web- and mobile-based services around the world. This increase in social networking use has led to user anxiety related to privacy and the unauthorised exposure of personal information. Large-scale sharing in virtual spaces means that researchers, designers and developers now need to re-consider the issues and challenges of maintaining privacy when using social networking services. This paper provides a comprehensive survey of the current state-of-the-art privacy in social networks for both desktop and mobile uses and devices from various architectural vantage points. The survey will assist researchers and analysts in academia and industry to move towards mitigating many of the privacy issues in social networks.

Keywords: privacy architectures; social networking; access control; distributed social networks; mobile social networks; open source social networks; privacy by design; PbD; desktop users; privacy protection; privacy preservation; network security.

DOI: 10.1504/IJIPSI.2015.075438

International Journal of Information Privacy, Security and Integrity, 2015 Vol.2 No.2, pp.102 - 137

Available online: 18 Mar 2016 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article