Next-Generation Computing Systems and Technologies
ISSN: pending (Online)
Email: [email protected]

Submit Manuscript
Edit a Special Issue

TY - JOUR AU - Paul, Subrata AU - Samanta, Raj Kumar AU - Koner, Chandan PY - 2025 DA - 2025/12/14 TI - A Review on Privacy and Security in Dynamic Social Networks: Techniques, Challenges, and Future Directions JO - Next-Generation Computing Systems and Technologies T2 - Next-Generation Computing Systems and Technologies JF - Next-Generation Computing Systems and Technologies VL - 1 IS - 2 SP - 79 EP - 90 DO - 10.62762/NGCST.2025.232051 UR - https://www.icck.org/article/abs/NGCST.2025.232051 KW - dynamic social networks KW - privacy preservation KW - anonymization techniques KW - identity and access management KW - information diffusion KW - security challenges KW - data dissemination AB - Owing to their dynamic user interactions, ever-changing structure, and real-time content changes, dynamic social networks pose significant privacy and security risks. The state of security and privacy-preserving techniques in these developing platforms is thoroughly examined in this study. We highlight the benefits and drawbacks of various approaches as we review recent studies on privacy-preserving tactics, security updates, and anonymisation methods. Important findings indicate that present approaches often fail in dynamic situations, even when they operate well in static network conditions. Beyond common problems, we also point out important security aspects influenced by hierarchical systems and community formation. While hierarchical positions like leaders and influencers are high-value targets for adversaries, communities can hasten the dissemination of false information or coordinated attacks while also promoting trust and connection. Important topics including scalability, privacy, information sharing, and identity and access management are also covered. The need for adaptable, scalable, and context-aware security solutions that can handle the complexity of dynamic social networks is emphasised in the paper's conclusion, which also outlines open issues and future research directions. SN - pending PB - Institute of Central Computation and Knowledge LA - English ER -
@article{Paul2025A,
author = {Subrata Paul and Raj Kumar Samanta and Chandan Koner},
title = {A Review on Privacy and Security in Dynamic Social Networks: Techniques, Challenges, and Future Directions},
journal = {Next-Generation Computing Systems and Technologies},
year = {2025},
volume = {1},
number = {2},
pages = {79-90},
doi = {10.62762/NGCST.2025.232051},
url = {https://www.icck.org/article/abs/NGCST.2025.232051},
abstract = {Owing to their dynamic user interactions, ever-changing structure, and real-time content changes, dynamic social networks pose significant privacy and security risks. The state of security and privacy-preserving techniques in these developing platforms is thoroughly examined in this study. We highlight the benefits and drawbacks of various approaches as we review recent studies on privacy-preserving tactics, security updates, and anonymisation methods. Important findings indicate that present approaches often fail in dynamic situations, even when they operate well in static network conditions. Beyond common problems, we also point out important security aspects influenced by hierarchical systems and community formation. While hierarchical positions like leaders and influencers are high-value targets for adversaries, communities can hasten the dissemination of false information or coordinated attacks while also promoting trust and connection. Important topics including scalability, privacy, information sharing, and identity and access management are also covered. The need for adaptable, scalable, and context-aware security solutions that can handle the complexity of dynamic social networks is emphasised in the paper's conclusion, which also outlines open issues and future research directions.},
keywords = {dynamic social networks, privacy preservation, anonymization techniques, identity and access management, information diffusion, security challenges, data dissemination},
issn = {pending},
publisher = {Institute of Central Computation and Knowledge}
}
Copyright © 2025 by the Author(s). Published by Institute of Central Computation and Knowledge. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made.
Portico
All published articles are preserved here permanently:
https://www.portico.org/publishers/icck/