Mathematical Problems in Engineering

Security and Privacy Protection of Social Networks in Big Data Era


Status
Published

Lead Editor

1Beijing University of Posts and Telecommunications, Beijing, China

2TELECOM Lille, Villeneuve d’Ascq, France

3Muroran Institute of Technology, Hokkaido, Japan

4Santa Clara University, Santa Clara, USA


Security and Privacy Protection of Social Networks in Big Data Era

Description

As ubiquitous computing dramatically changes the way people think, work, and interact, it has become more convenient for individual users to proactively generate, share, and exchange digital contents through online social media, such as online social networks (e.g., Facebook and Twitter), review/rating websites (e.g., Amazon and Yelp rating systems), online crowd sourcing platforms (e.g. Amazon Mechanical Turk), and knowledge gathering and sharing platforms (e.g., Stack Overflow and Wikipedia). These user generated contents (UGC), which take various format as digital video, blogging, forums, online social conversations, mobile phone photography, and so on, have experienced exponential increase recently and become an essential source of Big Data.

However, profit-driven attacks are emerging rapidly, raising great challenges for data security, privacy, and trust. On one hand, malicious attackers can easily manipulate such contents to conduct unethical promotions, to spread rumors, and to mislead public’s decision makings. On the other hand, people carelessly posting their personal information on social media can easily have their privacy breached. In particular, the sheer amount and diverse format of user generated contents have led to emerging security and privacy issues that cannot be resolved by current defense solutions. Traditional security mechanisms and models, which are tailored to securing small-scale or isomorphic data, are inadequate to solve this challenge in Big Data era due to limited bandwidth, storage, and computation power, and so forth. Therefore, how to develop new lightweight cryptographic algorithms/protocols, data mining/organization/optimization models, and performance evaluation methods, to solve the big security challenges, becomes crucial for the success of Big Data.

The purpose of this special issue is to publish high-quality research papers as well as review articles covering the most recent research results that address the mathematical model and algorithms on security, privacy, and trust challenges in Big Data era. Original, high quality contributions that are not yet published or that are not currently under review by other journals or peer-reviewed conferences are sought.

Potential topics include but are not limited to the following:

  • Access control models and anonymization algorithms in Big Data
  • Authentication/authorization algorithms/protocols in Big Data
  • Big Data privacy model in social networks
  • Cryptography in Big Data
  • Data protection and integrity in Big Data
  • Data mining and provenance in Big Data
  • Encrypted searching in Big Data
  • Large-scale data collection and filtering problem
  • New trust mechanism in social networks
  • Privacy and security preserving protocol for social networking
  • Secure outsourcing computing in Big Data
  • Sparse data modeling, compressing, and sensing
  • System designs for secure data storage in Big Data

Articles

  • Special Issue
  • - Volume 2018
  • - Article ID 6872587
  • - Editorial

Security and Privacy Protection of Social Networks in Big Data Era

Lixiang Li | Kaoru Ota | ... | Yuhong Liu
  • Special Issue
  • - Volume 2017
  • - Article ID 6808190
  • - Research Article

Modified Ciphertext-Policy Attribute-Based Encryption Scheme with Efficient Revocation for PHR System

Hongying Zheng | Jieming Wu | ... | Jianyong Chen
  • Special Issue
  • - Volume 2017
  • - Article ID 1383891
  • - Research Article

SHMF: Interest Prediction Model with Social Hub Matrix Factorization

Chaoyuan Cui | Hongze Wang | ... | Shu Yan
  • Special Issue
  • - Volume 2017
  • - Article ID 3956415
  • - Research Article

A Quick Negative Selection Algorithm for One-Class Classification in Big Data Era

Fangdong Zhu | Wen Chen | ... | Fan Zhang
  • Special Issue
  • - Volume 2017
  • - Article ID 4541975
  • - Research Article

Economic Levers for Mitigating Interest Flooding Attack in Named Data Networking

Licheng Wang | Yun Pan | ... | Kun Wang
  • Special Issue
  • - Volume 2017
  • - Article ID 4070616
  • - Research Article

Research on Ciphertext-Policy Attribute-Based Encryption with Attribute Level User Revocation in Cloud Storage

Guangbo Wang | Jianhua Wang
  • Special Issue
  • - Volume 2017
  • - Article ID 8439706
  • - Research Article

A Universal High-Performance Correlation Analysis Detection Model and Algorithm for Network Intrusion Detection System

Hongliang Zhu | Wenhan Liu | ... | Yang Xin
  • Special Issue
  • - Volume 2017
  • - Article ID 8596893
  • - Research Article

Multiview Community Discovery Algorithm via Nonnegative Factorization Matrix in Heterogeneous Networks

Wang Tao | Liu Yang
  • Special Issue
  • - Volume 2017
  • - Article ID 8679079
  • - Research Article

Games Based Study of Nonblind Confrontation

Yixian Yang | Xinxin Niu | Haipeng Peng
  • Special Issue
  • - Volume 2017
  • - Article ID 4934082
  • - Research Article

An Effective Conversation-Based Botnet Detection Method

Ruidong Chen | Weina Niu | ... | Fengmao Lv
Mathematical Problems in Engineering
 Journal metrics
Acceptance rate27%
Submission to final decision64 days
Acceptance to publication34 days
CiteScore1.800
Impact Factor1.009
 Submit

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.