SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2015, IRJET ISO 9001:2008 Certified Journal Page 93
Detecting and Resolving Privacy Conflicts in Online Social Networks
Prof. Subhash V. Pingale1, Sandip S. Shirgave2
1 Professor in Department Of Computer Engineering, SKN Sinhgad College of Engineering, Korti, Pandharpur,
India-413 304
2 ME Student in Department Of Computer Engineering, SKN Sinhgad College of Engineering, Korti, Pandharpur,
India-413 304
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - We have seen lot of growth in online social
networks (OSNs) in last few years. These online social
networks are not only offer attractive means for virtual
social interactions and information and resource
sharing but also raise a number of security and privacy
issue regarding particular to that shared data.
Although online social networks allow a single user to
govern access to his or her data, currently they do not
provide any system or mechanism to provide privacy
over data associated with multiple users. In this paper,
we propose an approach to enable collaborative
privacy management of shared data and resources in
online social networks (OSNs).
Key Words: Social network, privacy, collaborative
access, security.
1. INTRODUCTION
Social networks are the sites where people can
connect with each other, these people are each other’s
school friends, college friends co-workers in office and
sometimes may be stranger’s too. Social networking is
used my many reasons some of them is given below.
Because of social networking sites many users are
attracted to these social networking sites. With the help of
these social networking sites peoples can connect with
each other, sometimes they can share information and
sometimes they can share private and public information
with each other. With the help of social network peoples
are connected with each from all over the world. There are
many social networking sites are available on internet for
example facebook, linked-in, twitter etc.
Online social networks (OSNs) are web based and
they work as a client server architecture which is very
common in web based services. Some of the online social
networking sites are having premium account means
where user need to pay money for surfing and checking
the events on social networks.
The tremendous growth in the use of online social
networks, (developed on web 2.0) such as linked-In,
twitter, facebook, myspace and YouTube etc. If we see the
internet usage report then it will shows the huge use of
activities in social networking sites. These online social
networking sites are developed on Web 2.0 technologies.
Facebook claims that it having 1.44 billion monthly active
users and 936 million daily active users. This means about
70 percent of Facebook’s users use the service daily, and
65 percent of its mobile members use it daily on mobile
phones. Twitter has 400 million monthly active users and
around 500 million Tweets are sent per day, the study
shown that 80% of Twitter active users are on mobile
phones. Twitter supports 33 main languages; because of
this it is easy to use for particular regions peoples. Twitter
gives everyone the power to create and share ideas and
information instantly, without barriers.
The main goal of online social network is
communication between peoples, and makes available
information which is published and shared by online
users. The information may be anything (e.g. photos,
videos, web-contents, and opinions about particular topic
or event, contacts) and another purpose to meet other
peoples for different kinds of reasons; it may be
entertainment, business, and dating and religion occasion
etc.
This type of available information creates privacy
and confidentiality issues. Typically users do not want to
share every information or contents with everyone.
Today’s online social network provide mechanism to
protect the information shared in online space, it gives
access control to the user for the distributed of their
information or resources. Recent social networking sites
provides user can control only own information or
resources. It means currently online social networking
sites (OSN) provide simple and easy access control
technique permitting users to access to information
obtained in their own profile.
Most of the recent online social networking sites
only provide the basic access control policies for example
user only can specify the policy that whether the
information shall be publicly available, private or that
information is only accessible by directly connected users.
We have seen tremendous growth in online social
networks (OSNs) in recent years. These OSNs not only
offer attractive means for virtual social interactions and
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2015, IRJET ISO 9001:2008 Certified Journal Page 94
information sharing, but also raise a number of security
and privacy issues.
2. RELATED WORK
a. Rule-Based Access Control for Social Networks
(Barbara Carminati, Elena Ferrari, and Andrea
Perego)
In this paper, author represented an access
control model for web based online social networks,
where policies are is in the terms of type, depth and
trust level of relationship which is present between
the online social network users.
The feature of this model is the use of certificate
granting based on authenticity and client based access
control which is rule based ,where subject is
requesting to access an object must demonstrate that
it has the rights of doing that.
b. A Reachability Based Access Control Model for Online
Social Networks(Talel Abdessalem, Imen Ben Dhia)
In this paper, author developed an access control
model for online social networks that enables a fine-
grained description of privacy policies. These policies
are specified in terms of constraints on the type,
direction, depth of relationships and trust levels
between users, as well as on the user’s properties.
In this model author developed a model which
relies on a reachability-based approach, where a
subject requesting to access an object must satisfy
policies determined by the object owner.
For developing the model author used the
following algorithm for access control protocol.
Author also used the Access control architecture
which is shown below.
c. The Walls Have Ears: Optimize Sharing for Visibility
and Privacy in Online Social Networks (Thang N.
Dinh*, Yilin Shen*, and My T. Thai)
Author formulated the optimization problem,
namely maximizing a circle of trust (MCT), of which
author construct a circle of trust to maximize the
expected visible friends such that the probability of
information leakage is reduced to some degree. We
have proven the inapproximability and provided a
randomized algorithm with theoretical guarantees for
the 2-MCT problem.
d. Identifying hidden social circles for advanced privacy
configuration (Anna Squicciarini , Sushama
Karumanchi , Dan Lin , Nicole DeSisto)
In this paper, author proposed an approach which
helps online social users in managing their social
network friend circle (contacts) into relevant groups
automatically, and also helps online social users set up
their privacy policies automatically for their uploaded
content on the online users own wall or others wall.
Organizing friend circle (contacts) into groups helps
users set privacy settings for newly added content or
new contacts joining their social circles.
3. CONCLUSION
In this paper we have seen different author’s
related work and their methodology; we have also seen
the protection in the online social network.
ACKNOWLEDGEMENT
First and foremost, I would like to thank Prof. S. V.
Pingale for his most support and encouragement. He
kindly read my paper and offered invaluable detailed
advices on grammar, organization, and the theme of the
paper. Finally, I sincerely thank to my parents, family, and
friends, who provide the advice and financial support. The
product of this review paper would not be possible
without all of them.
REFERENCES
[1] P. Fong, M. Anwar, and Z. Zhao, “A Privacy
Preservation Model for Facebook-Style Social Network
Systems”, Proc. 14th European Conf. Research in
Computer Security, pp. 303-320, 2009.
[2] Jun Pang and Yang Zhang "A New Access Control
Scheme for Facebook-style Social Networks", ,
arXiv:1304.2504v2 [cs.CR] 16 Dec 2013
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2015, IRJET ISO 9001:2008 Certified Journal Page 95
[3] Thang N. Dinh, Yilin Shen, and My T. Thai. "The Walls
Have Ears: Optimize Sharing for Visibility and Privacy
in Online Social Networks" CIKM’12, October 29–
November 2, 2012, Maui, HI, USA. Copyright 2012
ACM 978-1-4503-1156-4/12/10
[4] Karr-Wisniewski, Pamela; Wilson, D; and Richter-
Lipford, "A New Social Order: Mechanisms for Social
Network Site Boundary Regulation" (2011). AMCIS
2011 Proceedings - All Submissions. Paper 101.
[5] Victoria Kisekka , Sharmistha Bagchi-Sen , H. Raghav
Rao. "Extent of private information disclosure on
online social networks: An exploration of Facebook
mobile phone users" 0747-5632/$ - see front matter _
2013 Elsevier Ltd.
http://dx.doi.org/10.1016/j.chb.2013.07.023
[6] Y. Cheng, J. Park, and R. Sandhu. " A user-to-user
relationship-based access control model for online
social networks ". In Proceedings of the 26th IFIP
Annual WG 11.3 Conference on Data and Application
Security and Privacy (DBSec ’12), 2012.
[7] Mehmet Sahinoglua, Aysen Dener Akkayab, David
Angc "Can We Assess and Monitor Privacy and
Security Risk for Social Networks?", 2012.
International Conference on Asia Pacific Business
Innovation and Technology Management.
[8] Imen Ben Dhia "Access Control in Social Networks : A
reachability-Based Approach", EDBT/ICDT
Workshops March 26-30, 2012, Berlin, Germany.
Copyright 2012 ACM 978-1-4503-1143-4/12/03.
[9] S.M.A. Abbas, J.A. Pouwelse, D.H.J. Epema, and H.J. Sips.
A gossip-based distributed social networking system.
In Enabling Technologies: Infrastructures for
Collaborative Enterprises, 2009.WETICE '09. 18th
IEEE International Workshops on, pages 93 {98, 29
2009-july 1 2009.
[10] Alessandro Acquisti and Ralph Gross. Imagined
communities: Awareness, information sharing, and
privacy on the facebook. In Privacy Enhancing
Technologies, pages 36{58, 2006.
[11] Alessandro Acquisti and Ralph Gross. Predicting
social security numbers from public data. Proceedings
of the National Academy of Sciences, 106
(27):10975{10980, 2009.
[12] Jonathan Anderson, Claudia Diaz, Joseph Bonneau,
and Frank Stajano. Privacy-enabling social networking
over untrusted networks. In Proceedings of the 2nd
ACM workshop on Online social networks, WOSN '09,
pages 1{6, New York, NY, USA, 2009. ACM.
[13] L. Backstrom, P. Boldi, M. Rosa, J. Ugander, and S.
Vigna. Four degrees of separation. CoRR,
abs/1111.4570, 2011.
[14] S. Benferhat, R. El Baida, and F. Cuppens. A
stratification-based approach for handling conflicts in
access control. In Proceedings of the eighth ACM
symposium on Access control models and
technologies, SACMAT ’03, pages 189–195, New York,
NY, USA, 2003. ACM.
[15] E. Bertino, S. Jajodia, and P. Samarati. Supporting
multiple access control policies in database systems.
ACM Transactions on Database Systems, 26:2001,
1996.
[16] E. Bertino, S. Jajodia, and P. Samarati. A flexible
authorization mechanism for relational data
management systems. ACM Trans. Inf. Syst.,
17(2):101–140, Apr. 1999.
[17] E. Bertino, P. Samarati, and S. Jajodia.
Authorizations in relational database management
systems. In Proceedings of the 1st ACM confer-ence on
Computer and communications security, CCS ’93,
pages 130– 139, New York, NY, USA, 1993. ACM.
[18] B. Carminati, E. Ferrari, R. Heatherly, M.
Kantarcioglu, and B. Thu-raisingham. A semantic web
based framework for social network access control. In
Proceedings of the 14th ACM symposium on Access
control models and technologies, SACMAT ’09, pages
177–186, New York, NY, USA, 2009. ACM.
Prof. Subhash V.
Pingale is the professor of
the department of
Computer science and
engineering in SKN
Sinhgad College of
Engineering, Korti, and
Pandharpur, India. His
main areas of interest are
Social Networks and web
mining and their applications.
Mr. Sandip Shirgave born
in India, in 1988. He
received the B.E. degree in
Computer Science &
Engineering from D.K.T.E
College from Shivaji
University, Ichalkaranji,
India, in 2012, and pursuing
the Master of Engineering degrees in Computer Science &
Engineering from the SKN Sinhgad College of Engineering,
Korti, and Pandharpur India. His main areas of interest are
Social Networks and web mining and their Applications.
Ad

More Related Content

What's hot (16)

Social media platform and Our right to privacy
Social media platform and Our right to privacySocial media platform and Our right to privacy
Social media platform and Our right to privacy
vivatechijri
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Editor IJCATR
 
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
IAEME Publication
 
Intelligent access control policies for Social network site
Intelligent access control policies for Social network siteIntelligent access control policies for Social network site
Intelligent access control policies for Social network site
ijcsit
 
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...
IJECEIAES
 
Ijcatr04041017
Ijcatr04041017Ijcatr04041017
Ijcatr04041017
Editor IJCATR
 
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
Maurice Dawson
 
Security Dangers of Social Networking
Security Dangers of Social NetworkingSecurity Dangers of Social Networking
Security Dangers of Social Networking
BillBrenner70
 
Mobile Cyber Security
Mobile Cyber SecurityMobile Cyber Security
Mobile Cyber Security
Bob's Business
 
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Eswar Publications
 
Cyberbullying Resources
Cyberbullying ResourcesCyberbullying Resources
Cyberbullying Resources
Andy Jeter
 
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET Journal
 
OSINT EXPLOITATION OF UNIVERSITY TWEETS
OSINT EXPLOITATION OF UNIVERSITY TWEETSOSINT EXPLOITATION OF UNIVERSITY TWEETS
OSINT EXPLOITATION OF UNIVERSITY TWEETS
Maurice Dawson
 
Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World
Thamalsha Wijayarathna
 
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
pharmaindexing
 
Data mining applied about polygamy using sentiment analysis on Twitters in In...
Data mining applied about polygamy using sentiment analysis on Twitters in In...Data mining applied about polygamy using sentiment analysis on Twitters in In...
Data mining applied about polygamy using sentiment analysis on Twitters in In...
journalBEEI
 
Social media platform and Our right to privacy
Social media platform and Our right to privacySocial media platform and Our right to privacy
Social media platform and Our right to privacy
vivatechijri
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Editor IJCATR
 
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
IAEME Publication
 
Intelligent access control policies for Social network site
Intelligent access control policies for Social network siteIntelligent access control policies for Social network site
Intelligent access control policies for Social network site
ijcsit
 
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...
IJECEIAES
 
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
Maurice Dawson
 
Security Dangers of Social Networking
Security Dangers of Social NetworkingSecurity Dangers of Social Networking
Security Dangers of Social Networking
BillBrenner70
 
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Eswar Publications
 
Cyberbullying Resources
Cyberbullying ResourcesCyberbullying Resources
Cyberbullying Resources
Andy Jeter
 
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET Journal
 
OSINT EXPLOITATION OF UNIVERSITY TWEETS
OSINT EXPLOITATION OF UNIVERSITY TWEETSOSINT EXPLOITATION OF UNIVERSITY TWEETS
OSINT EXPLOITATION OF UNIVERSITY TWEETS
Maurice Dawson
 
Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World
Thamalsha Wijayarathna
 
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
pharmaindexing
 
Data mining applied about polygamy using sentiment analysis on Twitters in In...
Data mining applied about polygamy using sentiment analysis on Twitters in In...Data mining applied about polygamy using sentiment analysis on Twitters in In...
Data mining applied about polygamy using sentiment analysis on Twitters in In...
journalBEEI
 

Similar to Detecting and Resolving Privacy Conflicts in Online Social Networks (20)

A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
IRJET Journal
 
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkAuthorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social network
eSAT Publishing House
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
ijtsrd
 
Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...
Anil Dhami
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
IRJET Journal
 
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
IRJET Journal
 
IRJET- Identification of Prevalent News from Twitter and Traditional Media us...
IRJET- Identification of Prevalent News from Twitter and Traditional Media us...IRJET- Identification of Prevalent News from Twitter and Traditional Media us...
IRJET- Identification of Prevalent News from Twitter and Traditional Media us...
IRJET Journal
 
Social Networking Websites and Image Privacy
Social Networking Websites and Image PrivacySocial Networking Websites and Image Privacy
Social Networking Websites and Image Privacy
IOSR Journals
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
CSCJournals
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
Kastriot Blakaj
Kastriot BlakajKastriot Blakaj
Kastriot Blakaj
UBT - Higher Education Institution
 
SOCIAL NETWORKING SITES COMMUNICATE USING HETEROGENEOUS SCHEMA
SOCIAL NETWORKING SITES COMMUNICATE USING HETEROGENEOUS SCHEMASOCIAL NETWORKING SITES COMMUNICATE USING HETEROGENEOUS SCHEMA
SOCIAL NETWORKING SITES COMMUNICATE USING HETEROGENEOUS SCHEMA
ijiert bestjournal
 
IRJET- Private Social Media and Data Security
IRJET- Private Social Media and Data SecurityIRJET- Private Social Media and Data Security
IRJET- Private Social Media and Data Security
IRJET Journal
 
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET Journal
 
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACYMUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
paperpublications3
 
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACYMUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
paperpublications3
 
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
IAEME Publication
 
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis
Marc Smith
 
A Novel Frame Work System Used In Mobile with Cloud Based Environment
A Novel Frame Work System Used In Mobile with Cloud Based EnvironmentA Novel Frame Work System Used In Mobile with Cloud Based Environment
A Novel Frame Work System Used In Mobile with Cloud Based Environment
paperpublications3
 
Survey of data mining techniques for social
Survey of data mining techniques for socialSurvey of data mining techniques for social
Survey of data mining techniques for social
Firas Husseini
 
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
IRJET Journal
 
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkAuthorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social network
eSAT Publishing House
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
ijtsrd
 
Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...
Anil Dhami
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
IRJET Journal
 
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
IRJET Journal
 
IRJET- Identification of Prevalent News from Twitter and Traditional Media us...
IRJET- Identification of Prevalent News from Twitter and Traditional Media us...IRJET- Identification of Prevalent News from Twitter and Traditional Media us...
IRJET- Identification of Prevalent News from Twitter and Traditional Media us...
IRJET Journal
 
Social Networking Websites and Image Privacy
Social Networking Websites and Image PrivacySocial Networking Websites and Image Privacy
Social Networking Websites and Image Privacy
IOSR Journals
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
CSCJournals
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
SOCIAL NETWORKING SITES COMMUNICATE USING HETEROGENEOUS SCHEMA
SOCIAL NETWORKING SITES COMMUNICATE USING HETEROGENEOUS SCHEMASOCIAL NETWORKING SITES COMMUNICATE USING HETEROGENEOUS SCHEMA
SOCIAL NETWORKING SITES COMMUNICATE USING HETEROGENEOUS SCHEMA
ijiert bestjournal
 
IRJET- Private Social Media and Data Security
IRJET- Private Social Media and Data SecurityIRJET- Private Social Media and Data Security
IRJET- Private Social Media and Data Security
IRJET Journal
 
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET Journal
 
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACYMUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
paperpublications3
 
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACYMUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
paperpublications3
 
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
IAEME Publication
 
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis
Marc Smith
 
A Novel Frame Work System Used In Mobile with Cloud Based Environment
A Novel Frame Work System Used In Mobile with Cloud Based EnvironmentA Novel Frame Work System Used In Mobile with Cloud Based Environment
A Novel Frame Work System Used In Mobile with Cloud Based Environment
paperpublications3
 
Survey of data mining techniques for social
Survey of data mining techniques for socialSurvey of data mining techniques for social
Survey of data mining techniques for social
Firas Husseini
 
Ad

More from IRJET Journal (20)

Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATIONBRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ..."Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer VisionBreast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
FIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACHFIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACH
IRJET Journal
 
Kiona – A Smart Society Automation Project
Kiona – A Smart Society Automation ProjectKiona – A Smart Society Automation Project
Kiona – A Smart Society Automation Project
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based CrowdfundingInvest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUBSPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
IRJET Journal
 
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATIONBRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ..."Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer VisionBreast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
FIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACHFIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACH
IRJET Journal
 
Kiona – A Smart Society Automation Project
Kiona – A Smart Society Automation ProjectKiona – A Smart Society Automation Project
Kiona – A Smart Society Automation Project
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based CrowdfundingInvest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUBSPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
IRJET Journal
 
Ad

Recently uploaded (20)

introduction to machine learining for beginers
introduction to machine learining for beginersintroduction to machine learining for beginers
introduction to machine learining for beginers
JoydebSheet
 
IntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdfIntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdf
Luiz Carneiro
 
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E..."Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
Infopitaara
 
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Journal of Soft Computing in Civil Engineering
 
Artificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptxArtificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptx
aditichinar
 
Compiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptxCompiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptx
RushaliDeshmukh2
 
Level 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical SafetyLevel 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical Safety
JoseAlbertoCariasDel
 
DSP and MV the Color image processing.ppt
DSP and MV the  Color image processing.pptDSP and MV the  Color image processing.ppt
DSP and MV the Color image processing.ppt
HafizAhamed8
 
fluke dealers in bangalore..............
fluke dealers in bangalore..............fluke dealers in bangalore..............
fluke dealers in bangalore..............
Haresh Vaswani
 
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptxLidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
RishavKumar530754
 
Reagent dosing (Bredel) presentation.pptx
Reagent dosing (Bredel) presentation.pptxReagent dosing (Bredel) presentation.pptx
Reagent dosing (Bredel) presentation.pptx
AlejandroOdio
 
theory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptxtheory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptx
sanchezvanessa7896
 
International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Distributed and Parallel systems (IJDPS)International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Distributed and Parallel systems (IJDPS)
samueljackson3773
 
Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.
anuragmk56
 
Degree_of_Automation.pdf for Instrumentation and industrial specialist
Degree_of_Automation.pdf for  Instrumentation  and industrial specialistDegree_of_Automation.pdf for  Instrumentation  and industrial specialist
Degree_of_Automation.pdf for Instrumentation and industrial specialist
shreyabhosale19
 
Introduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptxIntroduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptx
AS1920
 
Compiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptxCompiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptx
RushaliDeshmukh2
 
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
charlesdick1345
 
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITYADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ijscai
 
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
inmishra17121973
 
introduction to machine learining for beginers
introduction to machine learining for beginersintroduction to machine learining for beginers
introduction to machine learining for beginers
JoydebSheet
 
IntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdfIntroSlides-April-BuildWithAI-VertexAI.pdf
IntroSlides-April-BuildWithAI-VertexAI.pdf
Luiz Carneiro
 
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E..."Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
Infopitaara
 
Artificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptxArtificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptx
aditichinar
 
Compiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptxCompiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptx
RushaliDeshmukh2
 
Level 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical SafetyLevel 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical Safety
JoseAlbertoCariasDel
 
DSP and MV the Color image processing.ppt
DSP and MV the  Color image processing.pptDSP and MV the  Color image processing.ppt
DSP and MV the Color image processing.ppt
HafizAhamed8
 
fluke dealers in bangalore..............
fluke dealers in bangalore..............fluke dealers in bangalore..............
fluke dealers in bangalore..............
Haresh Vaswani
 
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptxLidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
RishavKumar530754
 
Reagent dosing (Bredel) presentation.pptx
Reagent dosing (Bredel) presentation.pptxReagent dosing (Bredel) presentation.pptx
Reagent dosing (Bredel) presentation.pptx
AlejandroOdio
 
theory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptxtheory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptx
sanchezvanessa7896
 
International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Distributed and Parallel systems (IJDPS)International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Distributed and Parallel systems (IJDPS)
samueljackson3773
 
Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.
anuragmk56
 
Degree_of_Automation.pdf for Instrumentation and industrial specialist
Degree_of_Automation.pdf for  Instrumentation  and industrial specialistDegree_of_Automation.pdf for  Instrumentation  and industrial specialist
Degree_of_Automation.pdf for Instrumentation and industrial specialist
shreyabhosale19
 
Introduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptxIntroduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptx
AS1920
 
Compiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptxCompiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptx
RushaliDeshmukh2
 
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
charlesdick1345
 
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITYADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ijscai
 
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
inmishra17121973
 

Detecting and Resolving Privacy Conflicts in Online Social Networks

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2015, IRJET ISO 9001:2008 Certified Journal Page 93 Detecting and Resolving Privacy Conflicts in Online Social Networks Prof. Subhash V. Pingale1, Sandip S. Shirgave2 1 Professor in Department Of Computer Engineering, SKN Sinhgad College of Engineering, Korti, Pandharpur, India-413 304 2 ME Student in Department Of Computer Engineering, SKN Sinhgad College of Engineering, Korti, Pandharpur, India-413 304 ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - We have seen lot of growth in online social networks (OSNs) in last few years. These online social networks are not only offer attractive means for virtual social interactions and information and resource sharing but also raise a number of security and privacy issue regarding particular to that shared data. Although online social networks allow a single user to govern access to his or her data, currently they do not provide any system or mechanism to provide privacy over data associated with multiple users. In this paper, we propose an approach to enable collaborative privacy management of shared data and resources in online social networks (OSNs). Key Words: Social network, privacy, collaborative access, security. 1. INTRODUCTION Social networks are the sites where people can connect with each other, these people are each other’s school friends, college friends co-workers in office and sometimes may be stranger’s too. Social networking is used my many reasons some of them is given below. Because of social networking sites many users are attracted to these social networking sites. With the help of these social networking sites peoples can connect with each other, sometimes they can share information and sometimes they can share private and public information with each other. With the help of social network peoples are connected with each from all over the world. There are many social networking sites are available on internet for example facebook, linked-in, twitter etc. Online social networks (OSNs) are web based and they work as a client server architecture which is very common in web based services. Some of the online social networking sites are having premium account means where user need to pay money for surfing and checking the events on social networks. The tremendous growth in the use of online social networks, (developed on web 2.0) such as linked-In, twitter, facebook, myspace and YouTube etc. If we see the internet usage report then it will shows the huge use of activities in social networking sites. These online social networking sites are developed on Web 2.0 technologies. Facebook claims that it having 1.44 billion monthly active users and 936 million daily active users. This means about 70 percent of Facebook’s users use the service daily, and 65 percent of its mobile members use it daily on mobile phones. Twitter has 400 million monthly active users and around 500 million Tweets are sent per day, the study shown that 80% of Twitter active users are on mobile phones. Twitter supports 33 main languages; because of this it is easy to use for particular regions peoples. Twitter gives everyone the power to create and share ideas and information instantly, without barriers. The main goal of online social network is communication between peoples, and makes available information which is published and shared by online users. The information may be anything (e.g. photos, videos, web-contents, and opinions about particular topic or event, contacts) and another purpose to meet other peoples for different kinds of reasons; it may be entertainment, business, and dating and religion occasion etc. This type of available information creates privacy and confidentiality issues. Typically users do not want to share every information or contents with everyone. Today’s online social network provide mechanism to protect the information shared in online space, it gives access control to the user for the distributed of their information or resources. Recent social networking sites provides user can control only own information or resources. It means currently online social networking sites (OSN) provide simple and easy access control technique permitting users to access to information obtained in their own profile. Most of the recent online social networking sites only provide the basic access control policies for example user only can specify the policy that whether the information shall be publicly available, private or that information is only accessible by directly connected users. We have seen tremendous growth in online social networks (OSNs) in recent years. These OSNs not only offer attractive means for virtual social interactions and
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2015, IRJET ISO 9001:2008 Certified Journal Page 94 information sharing, but also raise a number of security and privacy issues. 2. RELATED WORK a. Rule-Based Access Control for Social Networks (Barbara Carminati, Elena Ferrari, and Andrea Perego) In this paper, author represented an access control model for web based online social networks, where policies are is in the terms of type, depth and trust level of relationship which is present between the online social network users. The feature of this model is the use of certificate granting based on authenticity and client based access control which is rule based ,where subject is requesting to access an object must demonstrate that it has the rights of doing that. b. A Reachability Based Access Control Model for Online Social Networks(Talel Abdessalem, Imen Ben Dhia) In this paper, author developed an access control model for online social networks that enables a fine- grained description of privacy policies. These policies are specified in terms of constraints on the type, direction, depth of relationships and trust levels between users, as well as on the user’s properties. In this model author developed a model which relies on a reachability-based approach, where a subject requesting to access an object must satisfy policies determined by the object owner. For developing the model author used the following algorithm for access control protocol. Author also used the Access control architecture which is shown below. c. The Walls Have Ears: Optimize Sharing for Visibility and Privacy in Online Social Networks (Thang N. Dinh*, Yilin Shen*, and My T. Thai) Author formulated the optimization problem, namely maximizing a circle of trust (MCT), of which author construct a circle of trust to maximize the expected visible friends such that the probability of information leakage is reduced to some degree. We have proven the inapproximability and provided a randomized algorithm with theoretical guarantees for the 2-MCT problem. d. Identifying hidden social circles for advanced privacy configuration (Anna Squicciarini , Sushama Karumanchi , Dan Lin , Nicole DeSisto) In this paper, author proposed an approach which helps online social users in managing their social network friend circle (contacts) into relevant groups automatically, and also helps online social users set up their privacy policies automatically for their uploaded content on the online users own wall or others wall. Organizing friend circle (contacts) into groups helps users set privacy settings for newly added content or new contacts joining their social circles. 3. CONCLUSION In this paper we have seen different author’s related work and their methodology; we have also seen the protection in the online social network. ACKNOWLEDGEMENT First and foremost, I would like to thank Prof. S. V. Pingale for his most support and encouragement. He kindly read my paper and offered invaluable detailed advices on grammar, organization, and the theme of the paper. Finally, I sincerely thank to my parents, family, and friends, who provide the advice and financial support. The product of this review paper would not be possible without all of them. REFERENCES [1] P. Fong, M. Anwar, and Z. Zhao, “A Privacy Preservation Model for Facebook-Style Social Network Systems”, Proc. 14th European Conf. Research in Computer Security, pp. 303-320, 2009. [2] Jun Pang and Yang Zhang "A New Access Control Scheme for Facebook-style Social Networks", , arXiv:1304.2504v2 [cs.CR] 16 Dec 2013
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2015, IRJET ISO 9001:2008 Certified Journal Page 95 [3] Thang N. Dinh, Yilin Shen, and My T. Thai. "The Walls Have Ears: Optimize Sharing for Visibility and Privacy in Online Social Networks" CIKM’12, October 29– November 2, 2012, Maui, HI, USA. Copyright 2012 ACM 978-1-4503-1156-4/12/10 [4] Karr-Wisniewski, Pamela; Wilson, D; and Richter- Lipford, "A New Social Order: Mechanisms for Social Network Site Boundary Regulation" (2011). AMCIS 2011 Proceedings - All Submissions. Paper 101. [5] Victoria Kisekka , Sharmistha Bagchi-Sen , H. Raghav Rao. "Extent of private information disclosure on online social networks: An exploration of Facebook mobile phone users" 0747-5632/$ - see front matter _ 2013 Elsevier Ltd. http://dx.doi.org/10.1016/j.chb.2013.07.023 [6] Y. Cheng, J. Park, and R. Sandhu. " A user-to-user relationship-based access control model for online social networks ". In Proceedings of the 26th IFIP Annual WG 11.3 Conference on Data and Application Security and Privacy (DBSec ’12), 2012. [7] Mehmet Sahinoglua, Aysen Dener Akkayab, David Angc "Can We Assess and Monitor Privacy and Security Risk for Social Networks?", 2012. International Conference on Asia Pacific Business Innovation and Technology Management. [8] Imen Ben Dhia "Access Control in Social Networks : A reachability-Based Approach", EDBT/ICDT Workshops March 26-30, 2012, Berlin, Germany. Copyright 2012 ACM 978-1-4503-1143-4/12/03. [9] S.M.A. Abbas, J.A. Pouwelse, D.H.J. Epema, and H.J. Sips. A gossip-based distributed social networking system. In Enabling Technologies: Infrastructures for Collaborative Enterprises, 2009.WETICE '09. 18th IEEE International Workshops on, pages 93 {98, 29 2009-july 1 2009. [10] Alessandro Acquisti and Ralph Gross. Imagined communities: Awareness, information sharing, and privacy on the facebook. In Privacy Enhancing Technologies, pages 36{58, 2006. [11] Alessandro Acquisti and Ralph Gross. Predicting social security numbers from public data. Proceedings of the National Academy of Sciences, 106 (27):10975{10980, 2009. [12] Jonathan Anderson, Claudia Diaz, Joseph Bonneau, and Frank Stajano. Privacy-enabling social networking over untrusted networks. In Proceedings of the 2nd ACM workshop on Online social networks, WOSN '09, pages 1{6, New York, NY, USA, 2009. ACM. [13] L. Backstrom, P. Boldi, M. Rosa, J. Ugander, and S. Vigna. Four degrees of separation. CoRR, abs/1111.4570, 2011. [14] S. Benferhat, R. El Baida, and F. Cuppens. A stratification-based approach for handling conflicts in access control. In Proceedings of the eighth ACM symposium on Access control models and technologies, SACMAT ’03, pages 189–195, New York, NY, USA, 2003. ACM. [15] E. Bertino, S. Jajodia, and P. Samarati. Supporting multiple access control policies in database systems. ACM Transactions on Database Systems, 26:2001, 1996. [16] E. Bertino, S. Jajodia, and P. Samarati. A flexible authorization mechanism for relational data management systems. ACM Trans. Inf. Syst., 17(2):101–140, Apr. 1999. [17] E. Bertino, P. Samarati, and S. Jajodia. Authorizations in relational database management systems. In Proceedings of the 1st ACM confer-ence on Computer and communications security, CCS ’93, pages 130– 139, New York, NY, USA, 1993. ACM. [18] B. Carminati, E. Ferrari, R. Heatherly, M. Kantarcioglu, and B. Thu-raisingham. A semantic web based framework for social network access control. In Proceedings of the 14th ACM symposium on Access control models and technologies, SACMAT ’09, pages 177–186, New York, NY, USA, 2009. ACM. Prof. Subhash V. Pingale is the professor of the department of Computer science and engineering in SKN Sinhgad College of Engineering, Korti, and Pandharpur, India. His main areas of interest are Social Networks and web mining and their applications. Mr. Sandip Shirgave born in India, in 1988. He received the B.E. degree in Computer Science & Engineering from D.K.T.E College from Shivaji University, Ichalkaranji, India, in 2012, and pursuing the Master of Engineering degrees in Computer Science & Engineering from the SKN Sinhgad College of Engineering, Korti, and Pandharpur India. His main areas of interest are Social Networks and web mining and their Applications.