Blockchain Technology for Secure Social Media Computing

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This edited book covers advances, trends and future opportunities in the security framework of social media-computing. The authors focus on how to protect social media platforms, and present methods for making social media computing more reliable and effective to achieve trusted IoT-based social computing with Blockchain technology.

Author(s): Robin Singh Bhadoria, Neetetsh Saxena, Bharti Nagpa
Publisher: The Institution of Engineering and Technology
Year: 2023

Language: English
Pages: 265

Cover
Contents
Preface
Foreword
About the editors
1 The blockchain technologies in online social media: insights, technologies, and applications
Abstract
1.1 Introduction
1.2 Blockchain-based social media: insights from literature
1.3 Blockchain: a facilitator for social media
1.3.1 Freedom of expression and information privacy
1.3.2 Permanency of saving user content
1.3.3 Content producers to acquire money for generating and sharing owned content
1.4 Blockchain-based OSM proposals
1.4.1 SteemIt
1.4.2 SocialX
1.4.3 Sapien
1.4.4 Hyperspace
1.5 Summary and open problems
1.6 Conclusion
References
2 Blockchain-based security for social media computing
Abstract
2.1 Introduction
2.1.1 Basics of blockchain
2.1.2 Blockchain in social media
2.2 Expanding and protecting freedom of speech
2.3 Verifying the online user’s identity
2.4 Security with blockchain in app-payments
2.4.1 Blockchain advantages for app-payment security
2.4.2 Blockchain disadvantages for app-payment security
2.5 Authenticating legitimacy of social network content
2.5.1 Fake news detection by knowledge-based approach
2.5.2 Fake news detection by style-based approach
2.5.3 Fake news detection by propagation-based approach
2.5.4 Fake news detection by source-based approach
2.6 Finding verified online shopping marketplace
2.6.1 Verification steps for online marketplace
2.6.2 Cryptographic negotiation protocol modelling criteria for online marketplace
2.6.3 Verifying intermediates policies
2.6.4 Role of online business-to-business marketplace in trust formation
2.7 Conclusion
References
3 Emerging trends with social network – design, models and handling
Abstract
3.1 Introduction
3.1.1 Types of SNs
3.1.2 SN analysis
3.2 Social networking challenges
3.2.1 SN open challenges
3.2.2 Research-related challenges
3.3 Social networking models
3.3.1 Static SN model
3.3.2 Dynamic SN model
3.3.3 Static vs. dynamic SN
3.4 Social media fraud information handling and detection
3.4.1 Fraud detection
3.4.2 Fraud prevention
3.5 SNs design factors
3.6 SN threats and challenges
3.6.1 Security challenges
3.6.2 Promising security solutions
3.7 Security perspectives in social networking
3.7.1 Risk perspective
3.7.2 Student perspective
3.7.3 Company perspective
3.7.4 Trust perspective
3.7.5 Information sharing perspective
3.7.6 Cyber-crime perspective
3.8 Conclusion
References
4 Social networking: challenges, security issues, and emerging trends
Abstract
4.1 Introduction
4.2 Challenging aspects of social networking
4.2.1 Privacy
4.2.2 Access for those with disabilities
4.2.3 Cyber security
4.2.4 Commercial advertising
4.2.5 Terms of agreements
4.2.6 Data protection
4.2.7 Optimizing transparency
4.2.8 Fake profile detection
4.2.9 Understanding phishing risks
4.3 Network models: static and dynamic
4.4 Fake news detection and its prevention
4.4.1 Content based
4.4.2 Social context based
4.4.3 Fake news prevention
4.5 Factors that affect the design of social networks
4.5.1 The perception of social networking platform characteristics
4.5.2 The reasons that people use the Internet
4.5.3 Concerns about privacy
4.5.4 Level of innovation
4.5.5 Age
4.5.6 Gender
4.6 Security challenges and promising solutions in social networking
4.6.1 Multimedia social threats
4.6.2 Privacy-related threat
4.6.3 Traditional network and information security threats
4.7 Conclusion
References
5 Social media computing: tools and deployment platform for smart contract
Abstract
5.1 Introduction
5.2 What is blockchain
5.3 Hashing algorithm
5.4 Solidity
5.4.1 Smart contract
5.4.2 Compilation of smart contract
5.4.3 Mainnet vs. Testnet
5.4.4 Variables
5.4.5 Function
5.4.6 Constructor
5.4.7 Arrays in Solidity
5.4.8 Loops in Solidity
5.4.9 IF-ELSE statement in Solidity
5.4.10 Visibility in Solidity
5.5 BCOSN framework
5.5.1 Blockchain layer
5.5.2 Application layer
5.5.3 Storage layer
5.6 Limitations of BCOSN
5.7 Conclusions
References
6 Privacy provisioning on blockchain transactions of decentralized social media
Abstract
6.1 Introduction
6.2 Blockchain concepts
6.3 Privacy issues in blockchain
6.3.1 Transaction linkability
6.3.2 Recovery and management of private-keys
6.3.3 Nefarious smart contracts
6.3.4 Privacy of on-chain data and non-erasable data
6.3.5 Cryptographic-privacy performance
6.3.6 Malicious-curious TTPs
6.4 Review of blockchain privacy provisioning solutions
6.4.1 Key privacy provisioning approaches in blockchain
6.4.2 Anonymization methods for data
6.4.3 Methods for data protection
6.5 Analysis of privacy provisioning strategies
6.5.1 SMPC
6.5.2 Identity data anonymization
6.5.3 Transaction data anonymization
6.5.4 On-chain data protection
6.6 Conclusions
References
7 Blockchain-based knowledge graph for high-impact scientific collaboration networks
Abstract
7.1 Introduction
7.2 Background
7.2.1 Related works
7.2.2 Blockchain
7.2.3 Semantic technology and knowledge graph
7.2.4 Resource description framework
7.2.5 Knowledge graph on the blockchain network
7.3 Methodology
7.3.1 Knowledge graphs for managing efficient crowdsourcing in collaboration
7.3.2 Construction of the blockchain networks
7.3.3 Agent-based modelling and collective intelligence for knowledge extraction and knowledge integration
7.3.4 Data integration and protection on blockchain
7.4 Scenarios and use cases
7.4.1 Using blockchain and knowledge-driven application
in international collaboration of grant application in
pharmaceutical research
7.4.2 EHR data integration and collective diagnosis modeling through blockchain protected network for scientific collaboration
7.4.3 Computational knowledge sharing in the research of material science
7.5 Conclusion
References
8 5G multimedia communication and blockchain technology: emerging potential and challenges
Abstract
8.1 Introduction
8.2 Integration BC trust in 5G mobile networks
8.2.1 5G network architecture
8.2.2 Drivers for BC integration
8.3 Social network multimedia platforms
8.3.1 High-quality multimedia content
8.3.2 AR immersive communication
8.4 Concluding remarks
References
9 IoT-based system for intellectual property protection in social media using blockchain
Abstract
9.1 Introduction
9.1.1 Blockchain technology’s importance for IoT
9.1.2 Examples of how they can be combined are:
9.2 Key aspects of blockchain security
9.3 Design of an IoT and blockchain-based framework to secure intellectual property
9.4 Future of blockchain in IoT ecosystem
9.5 Conclusions
References
10 Blockchain architecture for social opinion vote-cast system
Abstract
10.1 Introduction
10.2 Background
10.2.1 Characteristics of blockchain architecture
10.2.2 Essential components of the blockchain architecture
10.3 Literature survey
10.3.1 Dalia et al. [11]
10.3.2 Shahandashti and Hao
10.3.3 Kiayias and Yung
10.3.4 Chaum et al.
10.3.5 McCorry et al.
10.3.6 Bell et al.
10.4 Analyzing existing blockchain implementation
10.4.1 Exonum
10.4.2 Quorum
10.4.3 Geth
10.5 Analyses of existing voting systems and requirements
10.5.1 Shortcoming of existing voting systems
10.5.2 Requirement for the proposed voting system
10.6 Analysis of existing voting solutions
10.6.1 FollowMyVote
10.6.2 Estonian e-Voting system
10.6.3 Civitas
10.7 Proposed system
10.7.1 Defining blocks in voting system
10.7.2 System structure
10.7.3 Smart contract
10.7.4 Voting registration
10.7.5 Tallying votes
10.8 Conclusion
Acknowledgement
References
11 Blockchain technology for next-generation society: current trends and future opportunities for smart era
Abstract
11.1 Introduction to blockchain
11.2 Related work
11.3 Evolution and timeline of blockchain
11.3.1 Phase 1 of blockchain evolution
11.3.2 Phase 2 of blockchain evolution
11.3.3 Phase 3 of blockchain evolution
11.4 Blockchain in IoT and other computing platforms
11.5 Characteristics of blockchain over other technologies
11.6 Types of blockchain and comparisons
11.7 Types of consensus algorithms
11.7.1 Types
11.8 Applications and use cases of blockchain
11.9 Attacks and threats
11.10 Challenges and future trends
11.11 Conclusion
References
12 Blockchain technologies in healthcare social media computing: trends and opportunities
Abstract
12.1 Introduction
12.2 Contemporary aspects of blockchain technology
12.3 Need of blockchain in social sectors
12.3.1 Blockchain impact on social computing
12.4 Blockchain technology in the healthcare industry
12.4.1 Capabilities of blockchain technology in healthcare
12.4.2 Healthcare security through blockchain
12.5 Healthcare social media computing architecture
12.6 Discussion
12.7 Conclusion
References
13 Conclusion and wrap-up
Further Reading
Index
Back Cover