SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 444
A Survey on Multi-party Privacy Disputes in Social Networks
Somanagouda M Moolimani1, A.S.Hiremath2,
1Student, CSE dept., BLDEA College, Karnataka, India
2Assistant professor, CSE dept., BLDEA College, Karnataka, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Nowadays everyone uses the social media such
as Facebook, twitter to share item with friends, public, groups
— e.g., Images, posts, videos. They have their own concern in
sharing item. Sometime these items example-image with that
depicts multiple clients, comments that includes many users
leads to privacy issue as the priority regarding item will be in
the hand of uploader only.at present, therearelessmechanism
that can handle this type of privacy issues.to provide solution
to privacy issues is very complex mechanism, as the different
user have different preference for item, one may wish to share
with and one may not as it may include some sensitive
information about him. The users will be more involved in
current mechanism. Existing methods are very constrained to
fixed ways of aggregating privacy priorities. So there is need
for mechanism which provide a solution such that it will be
accepted by all users involved in image or post with
satisfaction. We proposeamechanismwhichhelps in detecting
in privacy issues and providing solution to these issues which
will be accepted by the all user involved in item in social
media.it will adapt to various users privacy preferences in
more customized manner compared to present mechanism.
Here we show how solution is provided by comparing various
privacy priorities of different users and decide to whom the
item can be shared and allow them to access the item [1]. We
try to reduce the user’s involvement in our approaches by
allowing System captures userbehavior basedontheirinterest
to allowance/reject right to use specific user for that
uploading item.
Key Words: social media, privacy, Priorities, issues,
user’s involvement upload item.
1. INTRODUCTION
Social media users upload the thing such as image, post,
comments based on their interest. They can have their own
priority with respect to item. But social media best allows
uploader to set his privacy course of action for that item i.e.
who may have get right of entry to the object. This is may
lead to privacy violations that other users who troubled by
that object cant set privacy choices for it. [1]. for example
picture in which a cluster of users are covered andoneofthe
consumer desires to add that image on social media (up
loader) then actual he having rights approximately towhom
he wants to share that picture. But right here the otherusers
in that image can also have privacy issues regarding this
case. The present approach uses negotiation to resolve this
trouble via using e-mail, SMSs, smartphone calls and so on.
But this approaches require extra timetocope withsituation
manually due to the fact there are more than one uploader
and accessor are present on social media. In this paper
scheme introduces a new techniquetoaddresstheseprivacy
issues. Here scheme considering all users personal privacy
options and perceive at the least two rules that having
contradictorychoicesaboutgranting/denyingaccessfor that
unique item i.e. Privacy warfare. Systempresents answer by
modelling get right of entry to manipulate inthiskindof way
that all customers worried in that uploading object receive
that solution and make sure about their privacy.
2. LITERATURE SURVEY
Literature survey is the most important step in software
development process. Before developing the tool it is
necessary to determine the time factor, economyncompany
strength. Once these things r satisfied, ten next steps are to
determine which operatingsystemandlanguagecanbeused
for developing the tool. Once theprogrammersstartbuilding
the tool the programmers need lot of external support. This
support can be obtained from senior programmers, from
book or from websites. Before building thesystemtheabove
consideration r taken into account for developing the
proposed system.
2.1 Summary of the project
As suggested by existing research, negotiations about
privacy in social media are collaborative most of the time.
That is, users would consider other preferences when
deciding to whom they share, so users may be willing to
concede and change their initial most preferred option.
Being able to model the situations in which these
concessions happen is of crucial importance to propose the
best solution to the conflicts found one that would be
acceptable by all the users involved. We conducted a user
study comparing our mechanism to what users would do
themselves in a number of situations. The results obtained
suggest that our mechanism was able to match participant’s
concession behavior significantly more often than other
existing approaches. This has the potential to reduce the
amount of manual user interventions to achieve a
satisfactory solution for all parties involved in multi-party
privacy conflicts.
In proposed system the computational mechanismforsocial
media that, given the individual privacy preferences of each
user involved in an item, is able to find and resolve conflicts
by applying a different conflict resolution method based on
the concessions users’ may be willing to make in different
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 445
situations. We also present a user study comparing our
computational mechanism of conflict resolution and other
previous approaches to what users would do themselves
manually in a number of situations. The results obtained
suggestourproposed mechanismsignificantlyoutperformed
other previously proposed approaches in terms of the
number of times it matched participants’ behavior in the
study. Negotiating users have their own individual privacy
preferences about the item — i.e., to whom of their online
friends they would like to share the item if they were to
decide it unilaterally. In this paper, we assume negotiating
users specify their individual privacy preferences using
group-based access control, which is nowadays mainstream
in Social Media (e.g., Facebook lists or Google+ circles), to
highlight the practical applicability of our proposed
approach.
2.2 Detecting and resolving privacy conflicts for
collaborative data sharing in online social networks
Until now, very few researchers considered the problem of
resolving conflicts in multi-party privacy management for
Social Media. Wish art et al. Proposed a method to define
privacy policies collaboratively. In their approach all of the
parties involved can define strong and weak privacy
preferences. However, this approach does not involve any
automated method to solve conflicts, only some suggestions
that the users might want to consider when they try to solve
the conflicts manually.
The work described in is based on an incentive mechanism
where users are rewarded with a quantityofnumeraireeach
time they share information or acknowledge thepresenceof
other users (called co-owners) who are affected bythesame
item. When there are conflicts among co-owners’ policies,
users can spend their numerairebiddingforthepolicythatis
best for them. Then, the use of the Clark Tax mechanism is
suggested to obtain the highest bid. As stated in , users may
have difficulties to comprehend the mechanism and specify
appropriate bid values in auctions. Furthermore, users that
earned much numeraire in the past will have more
numeraire to spend it at will, potentiallyleadingtounilateral
decisions.
In users must manually define for each item: the privacy
settings for the item, their trust to the other users, the
sensitivity of the item, and how much privacy risk they
would like to take. These parameters are used to calculate
what the authors call privacy risk and sharing loss on
segments — they define segments as the set of conflicting
target users among a set of negotiatingusers.Then, based on
these measures all of the conflicting target users in each
segment are assigned the same action. That is, all of the
conflicts that a set of negotiating users have wouldbesolved
either by granting or denying access.Clearly,notconsidering
that each individual conflict can have a different solution
leads to outcomes that are far from what the users would be
willing to accept.
2.3 Condition Conflict Resolution and Malicious Owner
When collaboratively writing a policy, owners may specify
conflicting conditions for the policy. Other work within our
group has focused on policy conflict analysis and we will use
this to detect policy conflicts. We assume that the conditions
are regularly evaluated during the authoring process to
detect such conflicts. Once detected, theauthoringprocessis
halted and all owners involved notified. If the conflict is due
to a co-owner that placed overly restrictive conditions over
content, the other co-owners should either respect that co-
owner’s wishes or modify the contentsothattheco-owneris
no longer affected e.g., for a photograph one could blur the
co-owner’s face or crop them from the picture.
Alternatively, the conflict may be caused by a malicious co-
owner purposely sabotaging the policy authoring with
unreasonable conditions. In this case, we assume such
behavior can be detected by the resource owner and other
co-owners. This will require support from the policy
authoring tool. Once notified of this maliciousbehaviour,the
owner and co-owners can then vote to excludethemalicious
co-owner from the policy authoring process. The owner can
then restart the policy authoring protocol and not invite the
malicious co-owner to participate. In following this
approach, we assume that (1) a co-owner’s reasonable
concerns for her privacy will not be interpreted asmalicious
and (2) the majority of co-owners are not themselves
malicious.
2.4 Exploring self-censorship on Facebook
We sought to explore situations with different degrees of
sensitivity, as users’ behavior to resolve conflicts may be
different depending on how sensitive items are. However,
this would have involved participants sharing with us
sensitive items of them. Participants sharing sensitive
information in user studies about privacy in Social Media
was already identified as problematicin relatedliterature,as
participants would always seem reluctant to share sensitive
information, which biases the study towards non-sensitive
issues only. Indeed, this reluctance to shareinformationthat
may be sensitive with researchers during usersurveysis not
only associated with studies about privacy and Social Media,
but it has also been extensively proven to happen in many
other survey situations, including other scientificdisciplines
such as psychology. A possible alternative to avoid this
problem could be one in which participants just self-report
how they behave when they experience a multiparty privacy
conflict without askingforanysensitiveinformationofthem.
However, the results obtained in that case may not match
participants’ actual behavior in practice, as previous
research on privacy and Social Media showed that there is a
dichotomy between users’ stated privacy attitudesandtheir
actual behavior . As a trade-off between these two
alternatives, we chose to recreate situations in which
participants would be immersed, following a similar
approach to , maximizing actual behavior elicitation while
avoiding biasing the study to non-sensitive situations only.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 446
To this aim, we described a situation to the participants and
asked them to immerse themselves in the situation by
thinking they were a particular person in a particular photo
that was to be shared through a Social Media site and that
they were tagged in it, and participants showed very
different individual privacy policies and concession
decisions depending on the situation asdetailedbelow.Each
participant was presented with 10 different scenarios.
Scenarios were different across participants as they were
composed of: (i) one photo involving multiple users; and (ii)
a conflict created based on the individual privacy policy the
participant specified forthephoto.Aswehad50participants
(as detailed below), we were able to gather participant-
specified data relative to 500 different scenarios. Photos
referred to different situations (e.g., travelling, playing with
friends, partying, dating, etc.) and were of different
sensitivities a priori — though the participants were asked
to specify their privacy policy for the photo as their firsttask
for each scenario (as detailed below), which was different
according to how sensitive each photo was for each
participant.
3. SYSTEM ARCHITECTURE
Fig-1 System architecture
The proposed system will executes in five phases
 User authentication
 Data sharing
 Assigning priority to users
 Issue detection
 Issue resolution
3.1 PHASES
1) User Authentication
Every user log onto application by using their usernameand
passwords. New users has register by register phase
providing necessaryinformationrequiredbytheapplication.
The username and passwords will be verified by server side
And after login to application the user can shareinformation
to friends, family or public.
2) Data Sharing
User allowed to share any information with anyone based
on their interests. User can upload any image or post any
comment or post text in application. Once user decide to
whom the item should be shared, it will be verified byadmin
whether to post the image or text on timeline instantly. The
users who are in the image will get a notification regarding
the uploaded item.
3) Assigning priority to users
The user who uploaded the item and users who are affected
by that item can have their own privacy situation for that
item. They decide to reject/allow to target users for that
particular item. The uploader assigns the users withpriority
such as close friends as 1, Family as 2, my Friends as 3 etc.,
Admin
4) Issue detection
Image that depicts the multiple users can cause privacy
violations.as differentusers havedifferent priorityregarding
the item.one user wish to upload the item and another user
does not want that item to be uploaded.it may contain some
sensitive information such as it may be party picture which
he does not wish his friends or family to access the item.by
comparing the individual priority of each communicating
users we decide whether there is issue in uploading item or
not. If communicating users assign grant action regarding
the item then there is no issue in uploading item. If any one
of user did not grant permit to upload the item then there is
an issue in uploading item.
How to find Conflict
The conflicts will be found in the following case.
1. If you share any message or images before
migrating any friend to some group.
2. If u share any message or images before mutual
friend acceptance.
5) Issue resolution
In this stage the admin find the issue and users who are
affected by the item. System models concession rule
estimating about uploader and affected user’s interest and
tie strength with targeted user automatically provides
solution for issue. After that message is throw to user who
uploaded item about the final conclusion.
How to Resolve Conflict
1. As soon as the user migrate to any group then
automatically the shared images or messages has to
send to corresponding user.
2. As soon as the other user accepts the mutual
friendship and then the shared images or messages
has to send to corresponding user.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 447
4. IMPLEMENTATION
Strategy of proposedsystem istobroadensocial networking
web site with recommended functionalities whereuserscan
utilize the utility and essential middle can system below it.
The social media have many no of users. The implement
proposes particularly varieties of users either from same or
one of a kind groups. Firstly communicating users is a fixed
of users who co-personal an item. One of them wants to add
an item and different customers come to be affected
customers for that identical item. Second one is Centered
users set to who object may be shared based totally on
negotiating person’s privacy possibilities.
4. Implementation Details
Issue Detection Algorithm:
System compares all negotiatingperson’sprivacyoptions for
uploading item as a way to detect conflicts among them. It
discover outs at least conflicted policies in which one
coverage giving supply to the focused consumer for object
and any other one denying for the identical.
Figure 2: Conflict Detection Algorithm:
Issue resolution algorithm
The conflicted user is given as input to the set of rules.
System locate outs consumer’s willingness to alternatetheir
preferred movement (furnish/deny) for particularcentered
person. Based on that system fashions concession rules and
sooner or later consumer gets the answer as a battle
resolved policy.
Figure 3: Conflict Detection Algorithm
5. CONCLUSIONS
In this paper, we gift the first mechanism for detecting and
resolving privacy issues in Social Media that is based on
cutting-edge empirical evidence about privacy negotiations
and disclosure using elements in Social Media andiscapable
of adapt the struggle decision approach based totally at the
specific situation. In a nutshell, the mediator firstly inspects
the person privacy rules of all customersworriedlookingfor
viable conflicts. If conflicts are observed, the mediator
proposes a solution for each battle in keeping with a set of
concession regulations that model how users could
absolutely negotiate in this domain. We conducted a user
take a look at evaluating our mechanism to what customers
would do themselves in some of situations. The results
acquired endorse that our mechanismturnedinto capableof
match contributors’ concession behavior significantly more
regularly than different current tactics.Thishastheabilityto
lessen the amount of manual person interventions to reap a
pleasant solution for all events worried in multi-celebration
privacy conflicts. Moreover, the examine also confirmed the
advantages that an adaptive mechanism just like the one we
presented in this paper can offer with recognize to extra
static methods of aggregating users’ individual privacy
possibilities, which can be not able to conform to one-of-a-
kind situations and had been far from what the customers
did themselves. The research supplied in this paper is a
stepping stone towards extra computerized decision of
conflicts in multi-party privacy control for Social Media. As
destiny paintings, we plan to preserve studying on what
makes customers concede or no longer while fixing conflicts
in this area. In specific, we are also inquisitive about
exploring if there are other elements that would also play a
role in this, like for example if concessions can be stimulated
via previous negotiations with the equal negotiating
customers or the relationships among negotiators
themselves.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 448
6. AKNOWLDENENT
I would like to take this opportunity to express my thanks to
my guide Prof.A.S.Hiremath for his esteemed guidance and
encouragement. His guidance always helps me to succeed in
this work. I am also very grateful for his guidance and
comments while designing part of my research paper and
learnt many things under his leadership.
REFERENCES
[1] “A survey on privacy conflicts detection and
resolution in online social networks “from
miss.patare Tnuja, Prof.N.G.Pardesh IJARIIE-ISSN
(O)-2395-4396.
[2] “Resolving multiparty privacy conflicts in social
media” by Jose M. Natalia Criado, IEEETransactions
on knowledge and data engineering, 2016.
[3] “unfriendly: multiparty privacy risks in social
networks” by K.Thomas,C.Grier, and D.M.Nicol
privacy Enhancing Technology”
[4] ”Multiparty access control for online social
networks: Models and Mechanics” by H.hu, G.Ahn
ND Jorgensen, and IEEE Trans Knowledge data Eng.
Vol 25, No: 7, PP 1614-1627, July 2013.
[5] “Privacy Policy negotiation in Social media” by
J.M.Such and M.Rovatsos, ACM Trans auton,
Adaptive System, Vol.11, No1, ART.NO 4, Feb 2016.

More Related Content

Similar to A Survey on Multi-party Privacy Disputes in Social Networks

Detecting and Providing Solutions to Privacy Issues in Social Media
Detecting and Providing Solutions to Privacy Issues in Social MediaDetecting and Providing Solutions to Privacy Issues in Social Media
Detecting and Providing Solutions to Privacy Issues in Social MediaIRJET Journal
 
IRJET- Analysis on Existing Methodologies of User Service Rating Prediction S...
IRJET- Analysis on Existing Methodologies of User Service Rating Prediction S...IRJET- Analysis on Existing Methodologies of User Service Rating Prediction S...
IRJET- Analysis on Existing Methodologies of User Service Rating Prediction S...IRJET Journal
 
IRJET- An Intuitive Sky-High View of Recommendation Systems
IRJET- An Intuitive Sky-High View of Recommendation SystemsIRJET- An Intuitive Sky-High View of Recommendation Systems
IRJET- An Intuitive Sky-High View of Recommendation SystemsIRJET Journal
 
iCTRE: The Informal community Transformer into Recommendation Engine
iCTRE: The Informal community Transformer into Recommendation EngineiCTRE: The Informal community Transformer into Recommendation Engine
iCTRE: The Informal community Transformer into Recommendation EngineIRJET Journal
 
Personalized recommendation for cold start users
Personalized recommendation for cold start usersPersonalized recommendation for cold start users
Personalized recommendation for cold start usersIRJET Journal
 
8367 collaborative policy-administration-pdf
8367 collaborative policy-administration-pdf8367 collaborative policy-administration-pdf
8367 collaborative policy-administration-pdfChinnu SD
 
Steele_The Value of Using End-Users
Steele_The Value of Using End-UsersSteele_The Value of Using End-Users
Steele_The Value of Using End-UsersSummer Steele
 
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIARESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIANexgen Technology
 
An Access Control Model for Collaborative Management of Shared Data in OSNS
An Access Control Model for Collaborative Management of Shared Data in OSNSAn Access Control Model for Collaborative Management of Shared Data in OSNS
An Access Control Model for Collaborative Management of Shared Data in OSNSIJMER
 
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...cscpconf
 
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...IRJET Journal
 
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...Ijripublishers Ijri
 
Product Analyst Advisor
Product Analyst AdvisorProduct Analyst Advisor
Product Analyst AdvisorIRJET Journal
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...csandit
 
MOVIE RECOMMENDATION SYSTEM
MOVIE RECOMMENDATION SYSTEMMOVIE RECOMMENDATION SYSTEM
MOVIE RECOMMENDATION SYSTEMIRJET Journal
 
Socially augmented software empowering software operation through social cont...
Socially augmented software empowering software operation through social cont...Socially augmented software empowering software operation through social cont...
Socially augmented software empowering software operation through social cont...Engineering and Social Informatics (ESOTICS)
 
Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks IJECEIAES
 
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...IOSR Journals
 

Similar to A Survey on Multi-party Privacy Disputes in Social Networks (20)

Detecting and Providing Solutions to Privacy Issues in Social Media
Detecting and Providing Solutions to Privacy Issues in Social MediaDetecting and Providing Solutions to Privacy Issues in Social Media
Detecting and Providing Solutions to Privacy Issues in Social Media
 
IRJET- Analysis on Existing Methodologies of User Service Rating Prediction S...
IRJET- Analysis on Existing Methodologies of User Service Rating Prediction S...IRJET- Analysis on Existing Methodologies of User Service Rating Prediction S...
IRJET- Analysis on Existing Methodologies of User Service Rating Prediction S...
 
IRJET- An Intuitive Sky-High View of Recommendation Systems
IRJET- An Intuitive Sky-High View of Recommendation SystemsIRJET- An Intuitive Sky-High View of Recommendation Systems
IRJET- An Intuitive Sky-High View of Recommendation Systems
 
iCTRE: The Informal community Transformer into Recommendation Engine
iCTRE: The Informal community Transformer into Recommendation EngineiCTRE: The Informal community Transformer into Recommendation Engine
iCTRE: The Informal community Transformer into Recommendation Engine
 
Personalized recommendation for cold start users
Personalized recommendation for cold start usersPersonalized recommendation for cold start users
Personalized recommendation for cold start users
 
8367 collaborative policy-administration-pdf
8367 collaborative policy-administration-pdf8367 collaborative policy-administration-pdf
8367 collaborative policy-administration-pdf
 
Steele_The Value of Using End-Users
Steele_The Value of Using End-UsersSteele_The Value of Using End-Users
Steele_The Value of Using End-Users
 
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIARESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
 
An Access Control Model for Collaborative Management of Shared Data in OSNS
An Access Control Model for Collaborative Management of Shared Data in OSNSAn Access Control Model for Collaborative Management of Shared Data in OSNS
An Access Control Model for Collaborative Management of Shared Data in OSNS
 
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...
 
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
 
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
 
Product Analyst Advisor
Product Analyst AdvisorProduct Analyst Advisor
Product Analyst Advisor
 
A1060104
A1060104A1060104
A1060104
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...
 
MOVIE RECOMMENDATION SYSTEM
MOVIE RECOMMENDATION SYSTEMMOVIE RECOMMENDATION SYSTEM
MOVIE RECOMMENDATION SYSTEM
 
Socially augmented software empowering software operation through social cont...
Socially augmented software empowering software operation through social cont...Socially augmented software empowering software operation through social cont...
Socially augmented software empowering software operation through social cont...
 
Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks
 
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 

Recently uploaded (20)

APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 

A Survey on Multi-party Privacy Disputes in Social Networks

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 444 A Survey on Multi-party Privacy Disputes in Social Networks Somanagouda M Moolimani1, A.S.Hiremath2, 1Student, CSE dept., BLDEA College, Karnataka, India 2Assistant professor, CSE dept., BLDEA College, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Nowadays everyone uses the social media such as Facebook, twitter to share item with friends, public, groups — e.g., Images, posts, videos. They have their own concern in sharing item. Sometime these items example-image with that depicts multiple clients, comments that includes many users leads to privacy issue as the priority regarding item will be in the hand of uploader only.at present, therearelessmechanism that can handle this type of privacy issues.to provide solution to privacy issues is very complex mechanism, as the different user have different preference for item, one may wish to share with and one may not as it may include some sensitive information about him. The users will be more involved in current mechanism. Existing methods are very constrained to fixed ways of aggregating privacy priorities. So there is need for mechanism which provide a solution such that it will be accepted by all users involved in image or post with satisfaction. We proposeamechanismwhichhelps in detecting in privacy issues and providing solution to these issues which will be accepted by the all user involved in item in social media.it will adapt to various users privacy preferences in more customized manner compared to present mechanism. Here we show how solution is provided by comparing various privacy priorities of different users and decide to whom the item can be shared and allow them to access the item [1]. We try to reduce the user’s involvement in our approaches by allowing System captures userbehavior basedontheirinterest to allowance/reject right to use specific user for that uploading item. Key Words: social media, privacy, Priorities, issues, user’s involvement upload item. 1. INTRODUCTION Social media users upload the thing such as image, post, comments based on their interest. They can have their own priority with respect to item. But social media best allows uploader to set his privacy course of action for that item i.e. who may have get right of entry to the object. This is may lead to privacy violations that other users who troubled by that object cant set privacy choices for it. [1]. for example picture in which a cluster of users are covered andoneofthe consumer desires to add that image on social media (up loader) then actual he having rights approximately towhom he wants to share that picture. But right here the otherusers in that image can also have privacy issues regarding this case. The present approach uses negotiation to resolve this trouble via using e-mail, SMSs, smartphone calls and so on. But this approaches require extra timetocope withsituation manually due to the fact there are more than one uploader and accessor are present on social media. In this paper scheme introduces a new techniquetoaddresstheseprivacy issues. Here scheme considering all users personal privacy options and perceive at the least two rules that having contradictorychoicesaboutgranting/denyingaccessfor that unique item i.e. Privacy warfare. Systempresents answer by modelling get right of entry to manipulate inthiskindof way that all customers worried in that uploading object receive that solution and make sure about their privacy. 2. LITERATURE SURVEY Literature survey is the most important step in software development process. Before developing the tool it is necessary to determine the time factor, economyncompany strength. Once these things r satisfied, ten next steps are to determine which operatingsystemandlanguagecanbeused for developing the tool. Once theprogrammersstartbuilding the tool the programmers need lot of external support. This support can be obtained from senior programmers, from book or from websites. Before building thesystemtheabove consideration r taken into account for developing the proposed system. 2.1 Summary of the project As suggested by existing research, negotiations about privacy in social media are collaborative most of the time. That is, users would consider other preferences when deciding to whom they share, so users may be willing to concede and change their initial most preferred option. Being able to model the situations in which these concessions happen is of crucial importance to propose the best solution to the conflicts found one that would be acceptable by all the users involved. We conducted a user study comparing our mechanism to what users would do themselves in a number of situations. The results obtained suggest that our mechanism was able to match participant’s concession behavior significantly more often than other existing approaches. This has the potential to reduce the amount of manual user interventions to achieve a satisfactory solution for all parties involved in multi-party privacy conflicts. In proposed system the computational mechanismforsocial media that, given the individual privacy preferences of each user involved in an item, is able to find and resolve conflicts by applying a different conflict resolution method based on the concessions users’ may be willing to make in different
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 445 situations. We also present a user study comparing our computational mechanism of conflict resolution and other previous approaches to what users would do themselves manually in a number of situations. The results obtained suggestourproposed mechanismsignificantlyoutperformed other previously proposed approaches in terms of the number of times it matched participants’ behavior in the study. Negotiating users have their own individual privacy preferences about the item — i.e., to whom of their online friends they would like to share the item if they were to decide it unilaterally. In this paper, we assume negotiating users specify their individual privacy preferences using group-based access control, which is nowadays mainstream in Social Media (e.g., Facebook lists or Google+ circles), to highlight the practical applicability of our proposed approach. 2.2 Detecting and resolving privacy conflicts for collaborative data sharing in online social networks Until now, very few researchers considered the problem of resolving conflicts in multi-party privacy management for Social Media. Wish art et al. Proposed a method to define privacy policies collaboratively. In their approach all of the parties involved can define strong and weak privacy preferences. However, this approach does not involve any automated method to solve conflicts, only some suggestions that the users might want to consider when they try to solve the conflicts manually. The work described in is based on an incentive mechanism where users are rewarded with a quantityofnumeraireeach time they share information or acknowledge thepresenceof other users (called co-owners) who are affected bythesame item. When there are conflicts among co-owners’ policies, users can spend their numerairebiddingforthepolicythatis best for them. Then, the use of the Clark Tax mechanism is suggested to obtain the highest bid. As stated in , users may have difficulties to comprehend the mechanism and specify appropriate bid values in auctions. Furthermore, users that earned much numeraire in the past will have more numeraire to spend it at will, potentiallyleadingtounilateral decisions. In users must manually define for each item: the privacy settings for the item, their trust to the other users, the sensitivity of the item, and how much privacy risk they would like to take. These parameters are used to calculate what the authors call privacy risk and sharing loss on segments — they define segments as the set of conflicting target users among a set of negotiatingusers.Then, based on these measures all of the conflicting target users in each segment are assigned the same action. That is, all of the conflicts that a set of negotiating users have wouldbesolved either by granting or denying access.Clearly,notconsidering that each individual conflict can have a different solution leads to outcomes that are far from what the users would be willing to accept. 2.3 Condition Conflict Resolution and Malicious Owner When collaboratively writing a policy, owners may specify conflicting conditions for the policy. Other work within our group has focused on policy conflict analysis and we will use this to detect policy conflicts. We assume that the conditions are regularly evaluated during the authoring process to detect such conflicts. Once detected, theauthoringprocessis halted and all owners involved notified. If the conflict is due to a co-owner that placed overly restrictive conditions over content, the other co-owners should either respect that co- owner’s wishes or modify the contentsothattheco-owneris no longer affected e.g., for a photograph one could blur the co-owner’s face or crop them from the picture. Alternatively, the conflict may be caused by a malicious co- owner purposely sabotaging the policy authoring with unreasonable conditions. In this case, we assume such behavior can be detected by the resource owner and other co-owners. This will require support from the policy authoring tool. Once notified of this maliciousbehaviour,the owner and co-owners can then vote to excludethemalicious co-owner from the policy authoring process. The owner can then restart the policy authoring protocol and not invite the malicious co-owner to participate. In following this approach, we assume that (1) a co-owner’s reasonable concerns for her privacy will not be interpreted asmalicious and (2) the majority of co-owners are not themselves malicious. 2.4 Exploring self-censorship on Facebook We sought to explore situations with different degrees of sensitivity, as users’ behavior to resolve conflicts may be different depending on how sensitive items are. However, this would have involved participants sharing with us sensitive items of them. Participants sharing sensitive information in user studies about privacy in Social Media was already identified as problematicin relatedliterature,as participants would always seem reluctant to share sensitive information, which biases the study towards non-sensitive issues only. Indeed, this reluctance to shareinformationthat may be sensitive with researchers during usersurveysis not only associated with studies about privacy and Social Media, but it has also been extensively proven to happen in many other survey situations, including other scientificdisciplines such as psychology. A possible alternative to avoid this problem could be one in which participants just self-report how they behave when they experience a multiparty privacy conflict without askingforanysensitiveinformationofthem. However, the results obtained in that case may not match participants’ actual behavior in practice, as previous research on privacy and Social Media showed that there is a dichotomy between users’ stated privacy attitudesandtheir actual behavior . As a trade-off between these two alternatives, we chose to recreate situations in which participants would be immersed, following a similar approach to , maximizing actual behavior elicitation while avoiding biasing the study to non-sensitive situations only.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 446 To this aim, we described a situation to the participants and asked them to immerse themselves in the situation by thinking they were a particular person in a particular photo that was to be shared through a Social Media site and that they were tagged in it, and participants showed very different individual privacy policies and concession decisions depending on the situation asdetailedbelow.Each participant was presented with 10 different scenarios. Scenarios were different across participants as they were composed of: (i) one photo involving multiple users; and (ii) a conflict created based on the individual privacy policy the participant specified forthephoto.Aswehad50participants (as detailed below), we were able to gather participant- specified data relative to 500 different scenarios. Photos referred to different situations (e.g., travelling, playing with friends, partying, dating, etc.) and were of different sensitivities a priori — though the participants were asked to specify their privacy policy for the photo as their firsttask for each scenario (as detailed below), which was different according to how sensitive each photo was for each participant. 3. SYSTEM ARCHITECTURE Fig-1 System architecture The proposed system will executes in five phases  User authentication  Data sharing  Assigning priority to users  Issue detection  Issue resolution 3.1 PHASES 1) User Authentication Every user log onto application by using their usernameand passwords. New users has register by register phase providing necessaryinformationrequiredbytheapplication. The username and passwords will be verified by server side And after login to application the user can shareinformation to friends, family or public. 2) Data Sharing User allowed to share any information with anyone based on their interests. User can upload any image or post any comment or post text in application. Once user decide to whom the item should be shared, it will be verified byadmin whether to post the image or text on timeline instantly. The users who are in the image will get a notification regarding the uploaded item. 3) Assigning priority to users The user who uploaded the item and users who are affected by that item can have their own privacy situation for that item. They decide to reject/allow to target users for that particular item. The uploader assigns the users withpriority such as close friends as 1, Family as 2, my Friends as 3 etc., Admin 4) Issue detection Image that depicts the multiple users can cause privacy violations.as differentusers havedifferent priorityregarding the item.one user wish to upload the item and another user does not want that item to be uploaded.it may contain some sensitive information such as it may be party picture which he does not wish his friends or family to access the item.by comparing the individual priority of each communicating users we decide whether there is issue in uploading item or not. If communicating users assign grant action regarding the item then there is no issue in uploading item. If any one of user did not grant permit to upload the item then there is an issue in uploading item. How to find Conflict The conflicts will be found in the following case. 1. If you share any message or images before migrating any friend to some group. 2. If u share any message or images before mutual friend acceptance. 5) Issue resolution In this stage the admin find the issue and users who are affected by the item. System models concession rule estimating about uploader and affected user’s interest and tie strength with targeted user automatically provides solution for issue. After that message is throw to user who uploaded item about the final conclusion. How to Resolve Conflict 1. As soon as the user migrate to any group then automatically the shared images or messages has to send to corresponding user. 2. As soon as the other user accepts the mutual friendship and then the shared images or messages has to send to corresponding user.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 447 4. IMPLEMENTATION Strategy of proposedsystem istobroadensocial networking web site with recommended functionalities whereuserscan utilize the utility and essential middle can system below it. The social media have many no of users. The implement proposes particularly varieties of users either from same or one of a kind groups. Firstly communicating users is a fixed of users who co-personal an item. One of them wants to add an item and different customers come to be affected customers for that identical item. Second one is Centered users set to who object may be shared based totally on negotiating person’s privacy possibilities. 4. Implementation Details Issue Detection Algorithm: System compares all negotiatingperson’sprivacyoptions for uploading item as a way to detect conflicts among them. It discover outs at least conflicted policies in which one coverage giving supply to the focused consumer for object and any other one denying for the identical. Figure 2: Conflict Detection Algorithm: Issue resolution algorithm The conflicted user is given as input to the set of rules. System locate outs consumer’s willingness to alternatetheir preferred movement (furnish/deny) for particularcentered person. Based on that system fashions concession rules and sooner or later consumer gets the answer as a battle resolved policy. Figure 3: Conflict Detection Algorithm 5. CONCLUSIONS In this paper, we gift the first mechanism for detecting and resolving privacy issues in Social Media that is based on cutting-edge empirical evidence about privacy negotiations and disclosure using elements in Social Media andiscapable of adapt the struggle decision approach based totally at the specific situation. In a nutshell, the mediator firstly inspects the person privacy rules of all customersworriedlookingfor viable conflicts. If conflicts are observed, the mediator proposes a solution for each battle in keeping with a set of concession regulations that model how users could absolutely negotiate in this domain. We conducted a user take a look at evaluating our mechanism to what customers would do themselves in some of situations. The results acquired endorse that our mechanismturnedinto capableof match contributors’ concession behavior significantly more regularly than different current tactics.Thishastheabilityto lessen the amount of manual person interventions to reap a pleasant solution for all events worried in multi-celebration privacy conflicts. Moreover, the examine also confirmed the advantages that an adaptive mechanism just like the one we presented in this paper can offer with recognize to extra static methods of aggregating users’ individual privacy possibilities, which can be not able to conform to one-of-a- kind situations and had been far from what the customers did themselves. The research supplied in this paper is a stepping stone towards extra computerized decision of conflicts in multi-party privacy control for Social Media. As destiny paintings, we plan to preserve studying on what makes customers concede or no longer while fixing conflicts in this area. In specific, we are also inquisitive about exploring if there are other elements that would also play a role in this, like for example if concessions can be stimulated via previous negotiations with the equal negotiating customers or the relationships among negotiators themselves.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 448 6. AKNOWLDENENT I would like to take this opportunity to express my thanks to my guide Prof.A.S.Hiremath for his esteemed guidance and encouragement. His guidance always helps me to succeed in this work. I am also very grateful for his guidance and comments while designing part of my research paper and learnt many things under his leadership. REFERENCES [1] “A survey on privacy conflicts detection and resolution in online social networks “from miss.patare Tnuja, Prof.N.G.Pardesh IJARIIE-ISSN (O)-2395-4396. [2] “Resolving multiparty privacy conflicts in social media” by Jose M. Natalia Criado, IEEETransactions on knowledge and data engineering, 2016. [3] “unfriendly: multiparty privacy risks in social networks” by K.Thomas,C.Grier, and D.M.Nicol privacy Enhancing Technology” [4] ”Multiparty access control for online social networks: Models and Mechanics” by H.hu, G.Ahn ND Jorgensen, and IEEE Trans Knowledge data Eng. Vol 25, No: 7, PP 1614-1627, July 2013. [5] “Privacy Policy negotiation in Social media” by J.M.Such and M.Rovatsos, ACM Trans auton, Adaptive System, Vol.11, No1, ART.NO 4, Feb 2016.