Towards secure data sharing processes in online social networks: Trusty

Gulsum Akkuzu, Benjamin Aziz, Mo Adda

Research output: Chapter in Book/Report/Conference proceedingConference contribution

115 Downloads (Pure)


The development of Web 2.0 has remarkably increased in today's world. These development has also been a reason for the increment of online social networks (OSNs). Web 2.0 is the roof of the online social networks since online social networks are built on Web 2.0. Users are given an environment in which they can communicate with others without considering other users locations. The way of communication in OSNs is done via sharing various contents of data, such as photos, texts, and videos. Sharing data sometimes cause privacy problems in OSNs, especially in the case that the content involves different users information on itself. Users are notified after the content is shared and they are allowed to remove tags. The content is still available in OSNs platforms, users, therefore, find a way to punish other users with being unfriend, or they quit from OSNs. However, both cases are contradictory with the main of OSNs. By considering the above issues, we develop a framework in which users' opinions are taken on data sharing process and based on the final decision, which is taken by the user who posts the content, punishing or rewarding technique is used. We also evaluate the proposed work with users interactions.
Original languageEnglish
Title of host publicationProceedings of the 15th International Conference on Software Technologies
Number of pages8
VolumeVolume 1: ICSOFT
ISBN (Print)978-989-758-443-5
Publication statusPublished - 6 Jul 2020
Event15th International Conference on Software Technologies - Online
Duration: 7 Jul 20209 Jul 2020


Conference15th International Conference on Software Technologies
Abbreviated titleICSOFT2020
Internet address


  • Web 2.0 application
  • sharing data
  • online social networks
  • noissn


Dive into the research topics of 'Towards secure data sharing processes in online social networks: Trusty'. Together they form a unique fingerprint.

Cite this