Mathematical Problems in Engineering

Security and Privacy Protection of Social Networks in Big Data Era


Status
Published

Lead Editor

1Beijing University of Posts and Telecommunications, Beijing, China

2TELECOM Lille, Villeneuve d’Ascq, France

3Muroran Institute of Technology, Hokkaido, Japan

4Santa Clara University, Santa Clara, USA


Security and Privacy Protection of Social Networks in Big Data Era

Description

As ubiquitous computing dramatically changes the way people think, work, and interact, it has become more convenient for individual users to proactively generate, share, and exchange digital contents through online social media, such as online social networks (e.g., Facebook and Twitter), review/rating websites (e.g., Amazon and Yelp rating systems), online crowd sourcing platforms (e.g. Amazon Mechanical Turk), and knowledge gathering and sharing platforms (e.g., Stack Overflow and Wikipedia). These user generated contents (UGC), which take various format as digital video, blogging, forums, online social conversations, mobile phone photography, and so on, have experienced exponential increase recently and become an essential source of Big Data.

However, profit-driven attacks are emerging rapidly, raising great challenges for data security, privacy, and trust. On one hand, malicious attackers can easily manipulate such contents to conduct unethical promotions, to spread rumors, and to mislead public’s decision makings. On the other hand, people carelessly posting their personal information on social media can easily have their privacy breached. In particular, the sheer amount and diverse format of user generated contents have led to emerging security and privacy issues that cannot be resolved by current defense solutions. Traditional security mechanisms and models, which are tailored to securing small-scale or isomorphic data, are inadequate to solve this challenge in Big Data era due to limited bandwidth, storage, and computation power, and so forth. Therefore, how to develop new lightweight cryptographic algorithms/protocols, data mining/organization/optimization models, and performance evaluation methods, to solve the big security challenges, becomes crucial for the success of Big Data.

The purpose of this special issue is to publish high-quality research papers as well as review articles covering the most recent research results that address the mathematical model and algorithms on security, privacy, and trust challenges in Big Data era. Original, high quality contributions that are not yet published or that are not currently under review by other journals or peer-reviewed conferences are sought.

Potential topics include but are not limited to the following:

  • Access control models and anonymization algorithms in Big Data
  • Authentication/authorization algorithms/protocols in Big Data
  • Big Data privacy model in social networks
  • Cryptography in Big Data
  • Data protection and integrity in Big Data
  • Data mining and provenance in Big Data
  • Encrypted searching in Big Data
  • Large-scale data collection and filtering problem
  • New trust mechanism in social networks
  • Privacy and security preserving protocol for social networking
  • Secure outsourcing computing in Big Data
  • Sparse data modeling, compressing, and sensing
  • System designs for secure data storage in Big Data
Mathematical Problems in Engineering
 Journal metrics
See full report
Acceptance rate11%
Submission to final decision118 days
Acceptance to publication28 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

Article of the Year Award: Impactful research contributions of 2022, as selected by our Chief Editors. Discover the winning articles.