Inicio  /  Applied Sciences  /  Vol: 14 Par: 4 (2024)  /  Artículo
ARTÍCULO
TITULO

Design of a Trusted Content Authorization Security Framework for Social Media

Jiawei Han    
Qingsa Li    
Ying Xu    
Yan Zhu and Bingxin Wu    

Resumen

Artificial intelligence-generated content (AIGC) technology has had disruptive results in AI, representing a new trend in research and application and promoting a new era of AI. The potential benefits of this technology are both profound and diverse. However, the benefits of generative tools are accompanied by a series of significant challenges, the most critical of which is that it may cause AI information pollution on social media and mislead the public. Traditional network security models have shown their limitations in dealing with today?s complex network threats, so ensuring that generated content published on social media accurately reflects the true intentions of content creators has become particularly important. This paper proposes a security framework called ?secToken?. The framework adopts multi-level security and privacy protection measures. It combines deep learning and network security technology to ensure users? data integrity and confidentiality while ensuring credibility of the published content. In addition, the framework introduces the concept of zero trust security, integrates OAuth2.0 ideas, and provides advanced identity authentication, fine-grained access control, continuous identity verification, and other functions, to comprehensively guarantee the published content?s reliability on social media. This paper considers the main issues of generative content management in social media and offers some feasible solutions. Applying the security framework proposed in this paper, the credibility of generated content published on social media can be effectively ensured and can help detect and audit published content on social media. At the operational level, when extracting key information summaries from user-generated multimodal artificial intelligence-generated content and binding them to user identity information as a new token to identify user uniqueness, it can effectively associate user identity information with the current network status and the generated content to be published on the platform. This method significantly enhances system security and effectively prevents information pollution caused by generative artificial intelligence on social media platforms. This innovative method provides a powerful solution for addressing social and ethical challenges and network security issues.

 Artículos similares

       
 
S.E. Golikov     Pág. 50 - 55
Housing and communal services (hereinafter - housing and communal services) is one of the most important areas of the socio-economic structure of society. The quality of the provided housing and communal services directly affects people's need for comfor... ver más

 
Aelita Skar?auskiene and Monika Maciuliene    
The accessibility and quality of public open spaces (e.g., parks, gardens, squares and plazas) are critical for cultural identity development as they provide important gathering points in the urban fabric and offer a place for social activities, enabling... ver más
Revista: Informatics

 
Davide Calvaresi, Jean-Paul Calbimonte, Alevtina Dubovitskaya, Valerio Mattioli, Jean-Gabriel Piguet and Michael Schumacher    
The agent based approach is a well established methodology to model distributed intelligent systems. Multi-Agent Systems (MAS) are increasingly employed in applications dealing with safety and information critical tasks (e.g., in eHealth, financial, and ... ver más
Revista: Information

 
Liu Shuai, Liu Yuanning, Zhu Xiaodong, Zhang Kuo, Ding Tong, Li Xinlong and Wang Chaoqun    
Aimed at the one-to-one certification problem of unsteady state iris at different shooting times, a multi-algorithm parallel integration general model structure is proposed in this paper. The iris in the lightweight constrained state affected by defocusi... ver más
Revista: Algorithms

 
Tomasz Janus, Mateusz Skomra and Marcin Dziubinski    
Networks are beneficial to those being connected but can also be used as carriers of contagious hostile attacks. These attacks are often facilitated by exploiting corrupt network users. To protect against the attacks, users can resort to costly defense. ... ver más
Revista: Information