2018
DOI: 10.48550/arxiv.1806.07526
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

A Survey on the Security of Pervasive Online Social Networks (POSNs)

Takshi Gupta,
Gaurav Choudhary,
Vishal Sharma

Abstract: Pervasive Online Social Networks (POSNs) are the extensions of Online Social Networks (OSNs) which facilitate connectivity irrespective of the domain and properties of users. POSNs have been accumulated with the convergence of a plethora of social networking platforms with a motivation of bridging their gap. Over the last decade, OSNs have visually perceived an altogether tremendous amount of advancement in terms of the number of users as well as technology enablers. A single OSN is the property of an organiza… Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 97 publications
0
2
0
Order By: Relevance
“…Some of the other works to follow for enhancing the understandings on the 5G and its security are discussed in Table 7. Features like virtual reality networks, connectivity to billions of IoT devices and information on the go are some of the major enablers in 5G setup [129]. However, with applications gaining new heights, security becomes primary as well as tedious objective to attain [130].…”
Section: Open Issues and Future Directionsmentioning
confidence: 99%
“…Some of the other works to follow for enhancing the understandings on the 5G and its security are discussed in Table 7. Features like virtual reality networks, connectivity to billions of IoT devices and information on the go are some of the major enablers in 5G setup [129]. However, with applications gaining new heights, security becomes primary as well as tedious objective to attain [130].…”
Section: Open Issues and Future Directionsmentioning
confidence: 99%
“…However, these complex security systems have not stopped cloud platforms and networks from being exploited by ransomware groups, botnets and advanced persistent threats (APT), the main culprit being poor security practices and configuration and internal vulnerabilities [5,6]. Cloud networks can also be exploited by third-party applications which introduce unforeseen bugs and even zero-day vulnerabilities, giving attackers access to sensitive customer data.…”
Section: Introductionmentioning
confidence: 99%