-
CiteScore
-
Impact Factor
Volume 1, Issue 2, Next-Generation Computing Systems and Technologies
Volume 1, Issue 2, 2025
Submit Manuscript Edit a Special Issue
Article QR Code
Article QR Code
Scan the QR code for reading
Popular articles
Next-Generation Computing Systems and Technologies, Volume 1, Issue 2, 2025: 79-90

Open Access | Review Article | 14 December 2025
A Review on Privacy and Security in Dynamic Social Networks: Techniques, Challenges, and Future Directions
1 Department of CSE-AI, Brainware University, Barasat 700125, India
2 Department of CSE, Dr. B C Roy Engineering College, Durgapur 713206, India
3 Administrative Department, Kazi Nazrul University, Asansol 713340, India
* Corresponding Author: Subrata Paul, [email protected]
Received: 04 September 2025, Accepted: 29 September 2025, Published: 14 December 2025  
Abstract
Owing to their dynamic user interactions, ever-changing structure, and real-time content changes, dynamic social networks pose significant privacy and security risks. The state of security and privacy-preserving techniques in these developing platforms is thoroughly examined in this study. We highlight the benefits and drawbacks of various approaches as we review recent studies on privacy-preserving tactics, security updates, and anonymisation methods. Important findings indicate that present approaches often fail in dynamic situations, even when they operate well in static network conditions. Beyond common problems, we also point out important security aspects influenced by hierarchical systems and community formation. While hierarchical positions like leaders and influencers are high-value targets for adversaries, communities can hasten the dissemination of false information or coordinated attacks while also promoting trust and connection. Important topics including scalability, privacy, information sharing, and identity and access management are also covered. The need for adaptable, scalable, and context-aware security solutions that can handle the complexity of dynamic social networks is emphasised in the paper's conclusion, which also outlines open issues and future research directions.

Graphical Abstract
A Review on Privacy and Security in Dynamic Social Networks: Techniques, Challenges, and Future Directions

Keywords
dynamic social networks
privacy preservation
anonymization techniques
identity and access management
information diffusion
security challenges
data dissemination

Data Availability Statement
Not applicable.

Funding
This work was supported without any funding.

Conflicts of Interest
The authors declare no conflicts of interest.

Ethical Approval and Consent to Participate
Not applicable.

References
  1. Paul, S., Koner, C., & Mitra, A. (2023). Modeling dynamic social networks using concept of neighborhood theory. Intelligent Decision Technologies, 17(4), 1383-1415.
    [CrossRef]   [Google Scholar]
  2. Bhattacharya, M., Roy, S., Chattopadhyay, S., Das, A. K., & Shetty, S. (2023). A comprehensive survey on online social networks security and privacy issues: Threats, machine learning‐based solutions, and open challenges. Security and Privacy, 6(1), e275.
    [CrossRef]   [Google Scholar]
  3. Bhagat, S., Cormode, G., & Srivastava, D. (2010). Prediction promotes privacy in dynamic social networks. In 3rd Workshop on Online Social Networks (WOSN 2010).
    [Google Scholar]
  4. Zhou, B., Pei, J., & Luk, W. (2008). A brief survey on anonymization techniques for privacy preserving publishing of social network data. ACM Sigkdd Explorations Newsletter, 10(2), 12-22.
    [CrossRef]   [Google Scholar]
  5. Bhagat, S., Cormode, G., Krishnamurthy, B., & Srivastava, D. (2010, April). Privacy in dynamic social networks. In Proceedings of the 19th international conference on World wide web (pp. 1059-1060).
    [CrossRef]   [Google Scholar]
  6. Joshi, P., & Kuo, C. C. J. (2011, July). Security and privacy in online social networks: A survey. In 2011 IEEE international conference on multimedia and Expo (pp. 1-6). IEEE.
    [CrossRef]   [Google Scholar]
  7. Kayes, I., & Iamnitchi, A. (2017). Privacy and security in online social networks: A survey. Online Social Networks and Media, 3, 1-21.
    [CrossRef]   [Google Scholar]
  8. Zhu, T., Li, J., Hu, X., Xiong, P., & Zhou, W. (2020). The dynamic privacy-preserving mechanisms for online dynamic social networks. IEEE Transactions on Knowledge and Data Engineering, 34(6), 2962-2974.
    [CrossRef]   [Google Scholar]
  9. Jain, A. K., Sahoo, S. R., & Kaubiyal, J. (2021). Online social networks security and privacy: comprehensive review and analysis. Complex & Intelligent Systems, 7(5), 2157-2177.
    [CrossRef]   [Google Scholar]
  10. Zhu, X., He, D., Bao, Z., Luo, M., & Peng, C. (2023). An efficient decentralized identity management system based on range proof for social networks. IEEE Open Journal of the Computer Society, 4, 84-96.
    [CrossRef]   [Google Scholar]
  11. Liu, K., Das, K., Grandison, T., & Kargupta, H. (2008). Privacy-preserving data analysis on graphs and social networks. In Next generation of data mining (pp. 443-462). Chapman and Hall/CRC.
    [Google Scholar]
  12. Kridera, S., & Kanavos, A. (2024). Exploring trust dynamics in online social networks: A social network analysis perspective. Mathematical and Computational Applications, 29(3), 37.
    [CrossRef]   [Google Scholar]
  13. Zhang, D. Y., Zheng, C., Wang, D., Thain, D., Mu, X., Madey, G., & Huang, C. (2017, June). Towards scalable and dynamic social sensing using a distributed computing framework. In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS) (pp. 966-976). IEEE.
    [CrossRef]   [Google Scholar]
  14. Mitra, A., Paul, S., Panda, S., & Padhi, P. (2016). A study on the representation of the various models for dynamic social networks. Procedia Computer Science, 79, 624-631.
    [CrossRef]   [Google Scholar]
  15. Paul, S., Samanta, R. K., Mitra, A., & Koner, C. Temporal Dynamics of Social Networks: A Study on Community and Hierarchical Evolution. 10.47857/irjms.2025.v06i03.04025
    [Google Scholar]
  16. Paul, S., Koner, C., Mitra, A., & Ghosh, S. (2023, January). A Study on Algorithms for Detection of Communities in Dynamic Social Networks: A Review. In International Conference on Computational Intelligence in Communications and Business Analytics (pp. 51-64). Cham: Springer Nature Switzerland.
    [CrossRef]   [Google Scholar]
  17. Jouyban, M., & Hosseini, S. (2025). Complex network security using community structure and dynamical analysis: spectral clustering and VEIP-WQU model. Applied Network Science, 10(1), 1-26.
    [CrossRef]   [Google Scholar]
  18. Katerenchuk, D. (2018). A Survey of Hierarchy Identification in Social Networks. arXiv preprint arXiv:1812.08425.
    [Google Scholar]
  19. Behrendt, S., Klier, J., Klier, M., & Richter, A. (2015). The impact of formal hierarchies on enterprise social networking behavior.
    [Google Scholar]
  20. Rathore, S., Sharma, P. K., Loia, V., Jeong, Y. S., & Park, J. H. (2017). Social network security: Issues, challenges, threats, and solutions. Information sciences, 421, 43-69.
    [CrossRef]   [Google Scholar]
  21. Gupta, T., Choudhary, G., & Sharma, V. (2018). A survey on the security of pervasive online social networks (POSNs). arXiv preprint arXiv:1806.07526.
    [Google Scholar]
  22. Gupta, B. B., & Sahoo, S. R. (2021). Online social networks security: principles, algorithm, applications, and perspectives. CRC Press.
    [Google Scholar]
  23. Abkenar, S. B., Kashani, M. H., Mahdipour, E., & Jameii, S. M. (2021). Big data analytics meets social media: A systematic review of techniques, open issues, and future directions. Telematics and informatics, 57, 101517.
    [CrossRef]   [Google Scholar]
  24. Rath, M., Pati, B., & Pattanayak, B. K. (2018). An overview on social networking: design, issues, emerging trends, and security. Social Network Analytics: Computational Research Methods and Techniques, 21.
    [Google Scholar]
  25. Zhang, Z., & Gupta, B. B. (2018). Social media security and trustworthiness: overview and new direction. Future Generation Computer Systems, 86, 914-925.
    [CrossRef]   [Google Scholar]
  26. Liu, J., Chen, Y., Huang, X., Li, J., & Min, G. (2023). GNN-based long and short term preference modeling for next-location prediction. Information Sciences, 629, 1-14.
    [CrossRef]   [Google Scholar]

Cite This Article
APA Style
Paul, S., Samanta, R. K., & Koner, C. (2025). A Review on Privacy and Security in Dynamic Social Networks: Techniques, Challenges, and Future Directions. Next-Generation Computing Systems and Technologies, 1(2), 79–90. https://doi.org/10.62762/NGCST.2025.232051
Export Citation
RIS Format
Compatible with EndNote, Zotero, Mendeley, and other reference managers
RIS format data for reference managers
TY  - JOUR
AU  - Paul, Subrata
AU  - Samanta, Raj Kumar
AU  - Koner, Chandan
PY  - 2025
DA  - 2025/12/14
TI  - A Review on Privacy and Security in Dynamic Social Networks: Techniques, Challenges, and Future Directions
JO  - Next-Generation Computing Systems and Technologies
T2  - Next-Generation Computing Systems and Technologies
JF  - Next-Generation Computing Systems and Technologies
VL  - 1
IS  - 2
SP  - 79
EP  - 90
DO  - 10.62762/NGCST.2025.232051
UR  - https://www.icck.org/article/abs/NGCST.2025.232051
KW  - dynamic social networks
KW  - privacy preservation
KW  - anonymization techniques
KW  - identity and access management
KW  - information diffusion
KW  - security challenges
KW  - data dissemination
AB  - Owing to their dynamic user interactions, ever-changing structure, and real-time content changes, dynamic social networks pose significant privacy and security risks. The state of security and privacy-preserving techniques in these developing platforms is thoroughly examined in this study. We highlight the benefits and drawbacks of various approaches as we review recent studies on privacy-preserving tactics, security updates, and anonymisation methods. Important findings indicate that present approaches often fail in dynamic situations, even when they operate well in static network conditions. Beyond common problems, we also point out important security aspects influenced by hierarchical systems and community formation. While hierarchical positions like leaders and influencers are high-value targets for adversaries, communities can hasten the dissemination of false information or coordinated attacks while also promoting trust and connection. Important topics including scalability, privacy, information sharing, and identity and access management are also covered. The need for adaptable, scalable, and context-aware security solutions that can handle the complexity of dynamic social networks is emphasised in the paper's conclusion, which also outlines open issues and future research directions.
SN  - pending
PB  - Institute of Central Computation and Knowledge
LA  - English
ER  - 
BibTeX Format
Compatible with LaTeX, BibTeX, and other reference managers
BibTeX format data for LaTeX and reference managers
@article{Paul2025A,
  author = {Subrata Paul and Raj Kumar Samanta and Chandan Koner},
  title = {A Review on Privacy and Security in Dynamic Social Networks: Techniques, Challenges, and Future Directions},
  journal = {Next-Generation Computing Systems and Technologies},
  year = {2025},
  volume = {1},
  number = {2},
  pages = {79-90},
  doi = {10.62762/NGCST.2025.232051},
  url = {https://www.icck.org/article/abs/NGCST.2025.232051},
  abstract = {Owing to their dynamic user interactions, ever-changing structure, and real-time content changes, dynamic social networks pose significant privacy and security risks. The state of security and privacy-preserving techniques in these developing platforms is thoroughly examined in this study. We highlight the benefits and drawbacks of various approaches as we review recent studies on privacy-preserving tactics, security updates, and anonymisation methods. Important findings indicate that present approaches often fail in dynamic situations, even when they operate well in static network conditions. Beyond common problems, we also point out important security aspects influenced by hierarchical systems and community formation. While hierarchical positions like leaders and influencers are high-value targets for adversaries, communities can hasten the dissemination of false information or coordinated attacks while also promoting trust and connection. Important topics including scalability, privacy, information sharing, and identity and access management are also covered. The need for adaptable, scalable, and context-aware security solutions that can handle the complexity of dynamic social networks is emphasised in the paper's conclusion, which also outlines open issues and future research directions.},
  keywords = {dynamic social networks, privacy preservation, anonymization techniques, identity and access management, information diffusion, security challenges, data dissemination},
  issn = {pending},
  publisher = {Institute of Central Computation and Knowledge}
}

Article Metrics
Citations:

Crossref

0

Scopus

0

Web of Science

0
Article Access Statistics:
Views: 28
PDF Downloads: 10

Publisher's Note
ICCK stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and Permissions
CC BY Copyright © 2025 by the Author(s). Published by Institute of Central Computation and Knowledge. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made.
Next-Generation Computing Systems and Technologies

Next-Generation Computing Systems and Technologies

ISSN: pending (Online)

Email: [email protected]

Portico

Portico

All published articles are preserved here permanently:
https://www.portico.org/publishers/icck/