SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2015, IRJET ISO 9001:2008 Certified Journal Page 93
Detecting and Resolving Privacy Conflicts in Online Social Networks
Prof. Subhash V. Pingale1, Sandip S. Shirgave2
1 Professor in Department Of Computer Engineering, SKN Sinhgad College of Engineering, Korti, Pandharpur,
India-413 304
2 ME Student in Department Of Computer Engineering, SKN Sinhgad College of Engineering, Korti, Pandharpur,
India-413 304
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - We have seen lot of growth in online social
networks (OSNs) in last few years. These online social
networks are not only offer attractive means for virtual
social interactions and information and resource
sharing but also raise a number of security and privacy
issue regarding particular to that shared data.
Although online social networks allow a single user to
govern access to his or her data, currently they do not
provide any system or mechanism to provide privacy
over data associated with multiple users. In this paper,
we propose an approach to enable collaborative
privacy management of shared data and resources in
online social networks (OSNs).
Key Words: Social network, privacy, collaborative
access, security.
1. INTRODUCTION
Social networks are the sites where people can
connect with each other, these people are each other’s
school friends, college friends co-workers in office and
sometimes may be stranger’s too. Social networking is
used my many reasons some of them is given below.
Because of social networking sites many users are
attracted to these social networking sites. With the help of
these social networking sites peoples can connect with
each other, sometimes they can share information and
sometimes they can share private and public information
with each other. With the help of social network peoples
are connected with each from all over the world. There are
many social networking sites are available on internet for
example facebook, linked-in, twitter etc.
Online social networks (OSNs) are web based and
they work as a client server architecture which is very
common in web based services. Some of the online social
networking sites are having premium account means
where user need to pay money for surfing and checking
the events on social networks.
The tremendous growth in the use of online social
networks, (developed on web 2.0) such as linked-In,
twitter, facebook, myspace and YouTube etc. If we see the
internet usage report then it will shows the huge use of
activities in social networking sites. These online social
networking sites are developed on Web 2.0 technologies.
Facebook claims that it having 1.44 billion monthly active
users and 936 million daily active users. This means about
70 percent of Facebook’s users use the service daily, and
65 percent of its mobile members use it daily on mobile
phones. Twitter has 400 million monthly active users and
around 500 million Tweets are sent per day, the study
shown that 80% of Twitter active users are on mobile
phones. Twitter supports 33 main languages; because of
this it is easy to use for particular regions peoples. Twitter
gives everyone the power to create and share ideas and
information instantly, without barriers.
The main goal of online social network is
communication between peoples, and makes available
information which is published and shared by online
users. The information may be anything (e.g. photos,
videos, web-contents, and opinions about particular topic
or event, contacts) and another purpose to meet other
peoples for different kinds of reasons; it may be
entertainment, business, and dating and religion occasion
etc.
This type of available information creates privacy
and confidentiality issues. Typically users do not want to
share every information or contents with everyone.
Today’s online social network provide mechanism to
protect the information shared in online space, it gives
access control to the user for the distributed of their
information or resources. Recent social networking sites
provides user can control only own information or
resources. It means currently online social networking
sites (OSN) provide simple and easy access control
technique permitting users to access to information
obtained in their own profile.
Most of the recent online social networking sites
only provide the basic access control policies for example
user only can specify the policy that whether the
information shall be publicly available, private or that
information is only accessible by directly connected users.
We have seen tremendous growth in online social
networks (OSNs) in recent years. These OSNs not only
offer attractive means for virtual social interactions and
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2015, IRJET ISO 9001:2008 Certified Journal Page 94
information sharing, but also raise a number of security
and privacy issues.
2. RELATED WORK
a. Rule-Based Access Control for Social Networks
(Barbara Carminati, Elena Ferrari, and Andrea
Perego)
In this paper, author represented an access
control model for web based online social networks,
where policies are is in the terms of type, depth and
trust level of relationship which is present between
the online social network users.
The feature of this model is the use of certificate
granting based on authenticity and client based access
control which is rule based ,where subject is
requesting to access an object must demonstrate that
it has the rights of doing that.
b. A Reachability Based Access Control Model for Online
Social Networks(Talel Abdessalem, Imen Ben Dhia)
In this paper, author developed an access control
model for online social networks that enables a fine-
grained description of privacy policies. These policies
are specified in terms of constraints on the type,
direction, depth of relationships and trust levels
between users, as well as on the user’s properties.
In this model author developed a model which
relies on a reachability-based approach, where a
subject requesting to access an object must satisfy
policies determined by the object owner.
For developing the model author used the
following algorithm for access control protocol.
Author also used the Access control architecture
which is shown below.
c. The Walls Have Ears: Optimize Sharing for Visibility
and Privacy in Online Social Networks (Thang N.
Dinh*, Yilin Shen*, and My T. Thai)
Author formulated the optimization problem,
namely maximizing a circle of trust (MCT), of which
author construct a circle of trust to maximize the
expected visible friends such that the probability of
information leakage is reduced to some degree. We
have proven the inapproximability and provided a
randomized algorithm with theoretical guarantees for
the 2-MCT problem.
d. Identifying hidden social circles for advanced privacy
configuration (Anna Squicciarini , Sushama
Karumanchi , Dan Lin , Nicole DeSisto)
In this paper, author proposed an approach which
helps online social users in managing their social
network friend circle (contacts) into relevant groups
automatically, and also helps online social users set up
their privacy policies automatically for their uploaded
content on the online users own wall or others wall.
Organizing friend circle (contacts) into groups helps
users set privacy settings for newly added content or
new contacts joining their social circles.
3. CONCLUSION
In this paper we have seen different author’s
related work and their methodology; we have also seen
the protection in the online social network.
ACKNOWLEDGEMENT
First and foremost, I would like to thank Prof. S. V.
Pingale for his most support and encouragement. He
kindly read my paper and offered invaluable detailed
advices on grammar, organization, and the theme of the
paper. Finally, I sincerely thank to my parents, family, and
friends, who provide the advice and financial support. The
product of this review paper would not be possible
without all of them.
REFERENCES
[1] P. Fong, M. Anwar, and Z. Zhao, “A Privacy
Preservation Model for Facebook-Style Social Network
Systems”, Proc. 14th European Conf. Research in
Computer Security, pp. 303-320, 2009.
[2] Jun Pang and Yang Zhang "A New Access Control
Scheme for Facebook-style Social Networks", ,
arXiv:1304.2504v2 [cs.CR] 16 Dec 2013
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2015, IRJET ISO 9001:2008 Certified Journal Page 95
[3] Thang N. Dinh, Yilin Shen, and My T. Thai. "The Walls
Have Ears: Optimize Sharing for Visibility and Privacy
in Online Social Networks" CIKM’12, October 29–
November 2, 2012, Maui, HI, USA. Copyright 2012
ACM 978-1-4503-1156-4/12/10
[4] Karr-Wisniewski, Pamela; Wilson, D; and Richter-
Lipford, "A New Social Order: Mechanisms for Social
Network Site Boundary Regulation" (2011). AMCIS
2011 Proceedings - All Submissions. Paper 101.
[5] Victoria Kisekka , Sharmistha Bagchi-Sen , H. Raghav
Rao. "Extent of private information disclosure on
online social networks: An exploration of Facebook
mobile phone users" 0747-5632/$ - see front matter _
2013 Elsevier Ltd.
http://dx.doi.org/10.1016/j.chb.2013.07.023
[6] Y. Cheng, J. Park, and R. Sandhu. " A user-to-user
relationship-based access control model for online
social networks ". In Proceedings of the 26th IFIP
Annual WG 11.3 Conference on Data and Application
Security and Privacy (DBSec ’12), 2012.
[7] Mehmet Sahinoglua, Aysen Dener Akkayab, David
Angc "Can We Assess and Monitor Privacy and
Security Risk for Social Networks?", 2012.
International Conference on Asia Pacific Business
Innovation and Technology Management.
[8] Imen Ben Dhia "Access Control in Social Networks : A
reachability-Based Approach", EDBT/ICDT
Workshops March 26-30, 2012, Berlin, Germany.
Copyright 2012 ACM 978-1-4503-1143-4/12/03.
[9] S.M.A. Abbas, J.A. Pouwelse, D.H.J. Epema, and H.J. Sips.
A gossip-based distributed social networking system.
In Enabling Technologies: Infrastructures for
Collaborative Enterprises, 2009.WETICE '09. 18th
IEEE International Workshops on, pages 93 {98, 29
2009-july 1 2009.
[10] Alessandro Acquisti and Ralph Gross. Imagined
communities: Awareness, information sharing, and
privacy on the facebook. In Privacy Enhancing
Technologies, pages 36{58, 2006.
[11] Alessandro Acquisti and Ralph Gross. Predicting
social security numbers from public data. Proceedings
of the National Academy of Sciences, 106
(27):10975{10980, 2009.
[12] Jonathan Anderson, Claudia Diaz, Joseph Bonneau,
and Frank Stajano. Privacy-enabling social networking
over untrusted networks. In Proceedings of the 2nd
ACM workshop on Online social networks, WOSN '09,
pages 1{6, New York, NY, USA, 2009. ACM.
[13] L. Backstrom, P. Boldi, M. Rosa, J. Ugander, and S.
Vigna. Four degrees of separation. CoRR,
abs/1111.4570, 2011.
[14] S. Benferhat, R. El Baida, and F. Cuppens. A
stratification-based approach for handling conflicts in
access control. In Proceedings of the eighth ACM
symposium on Access control models and
technologies, SACMAT ’03, pages 189–195, New York,
NY, USA, 2003. ACM.
[15] E. Bertino, S. Jajodia, and P. Samarati. Supporting
multiple access control policies in database systems.
ACM Transactions on Database Systems, 26:2001,
1996.
[16] E. Bertino, S. Jajodia, and P. Samarati. A flexible
authorization mechanism for relational data
management systems. ACM Trans. Inf. Syst.,
17(2):101–140, Apr. 1999.
[17] E. Bertino, P. Samarati, and S. Jajodia.
Authorizations in relational database management
systems. In Proceedings of the 1st ACM confer-ence on
Computer and communications security, CCS ’93,
pages 130– 139, New York, NY, USA, 1993. ACM.
[18] B. Carminati, E. Ferrari, R. Heatherly, M.
Kantarcioglu, and B. Thu-raisingham. A semantic web
based framework for social network access control. In
Proceedings of the 14th ACM symposium on Access
control models and technologies, SACMAT ’09, pages
177–186, New York, NY, USA, 2009. ACM.
Prof. Subhash V.
Pingale is the professor of
the department of
Computer science and
engineering in SKN
Sinhgad College of
Engineering, Korti, and
Pandharpur, India. His
main areas of interest are
Social Networks and web
mining and their applications.
Mr. Sandip Shirgave born
in India, in 1988. He
received the B.E. degree in
Computer Science &
Engineering from D.K.T.E
College from Shivaji
University, Ichalkaranji,
India, in 2012, and pursuing
the Master of Engineering degrees in Computer Science &
Engineering from the SKN Sinhgad College of Engineering,
Korti, and Pandharpur India. His main areas of interest are
Social Networks and web mining and their Applications.

More Related Content

What's hot

Social media platform and Our right to privacy
Social media platform and Our right to privacySocial media platform and Our right to privacy
Social media platform and Our right to privacyvivatechijri
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Editor IJCATR
 
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2Posn private information protection in online social networks 2
Posn private information protection in online social networks 2IAEME Publication
 
Intelligent access control policies for Social network site
Intelligent access control policies for Social network siteIntelligent access control policies for Social network site
Intelligent access control policies for Social network siteijcsit
 
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...IJECEIAES
 
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...Maurice Dawson
 
Security Dangers of Social Networking
Security Dangers of Social NetworkingSecurity Dangers of Social Networking
Security Dangers of Social NetworkingBillBrenner70
 
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...Eswar Publications
 
Cyberbullying Resources
Cyberbullying ResourcesCyberbullying Resources
Cyberbullying ResourcesAndy Jeter
 
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET Journal
 
OSINT EXPLOITATION OF UNIVERSITY TWEETS
OSINT EXPLOITATION OF UNIVERSITY TWEETSOSINT EXPLOITATION OF UNIVERSITY TWEETS
OSINT EXPLOITATION OF UNIVERSITY TWEETSMaurice Dawson
 
Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World Thamalsha Wijayarathna
 
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...pharmaindexing
 
Data mining applied about polygamy using sentiment analysis on Twitters in In...
Data mining applied about polygamy using sentiment analysis on Twitters in In...Data mining applied about polygamy using sentiment analysis on Twitters in In...
Data mining applied about polygamy using sentiment analysis on Twitters in In...journalBEEI
 

What's hot (16)

Social media platform and Our right to privacy
Social media platform and Our right to privacySocial media platform and Our right to privacy
Social media platform and Our right to privacy
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
 
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
 
Intelligent access control policies for Social network site
Intelligent access control policies for Social network siteIntelligent access control policies for Social network site
Intelligent access control policies for Social network site
 
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...
 
Ijcatr04041017
Ijcatr04041017Ijcatr04041017
Ijcatr04041017
 
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
 
Security Dangers of Social Networking
Security Dangers of Social NetworkingSecurity Dangers of Social Networking
Security Dangers of Social Networking
 
Mobile Cyber Security
Mobile Cyber SecurityMobile Cyber Security
Mobile Cyber Security
 
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
 
Cyberbullying Resources
Cyberbullying ResourcesCyberbullying Resources
Cyberbullying Resources
 
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
 
OSINT EXPLOITATION OF UNIVERSITY TWEETS
OSINT EXPLOITATION OF UNIVERSITY TWEETSOSINT EXPLOITATION OF UNIVERSITY TWEETS
OSINT EXPLOITATION OF UNIVERSITY TWEETS
 
Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World
 
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
 
Data mining applied about polygamy using sentiment analysis on Twitters in In...
Data mining applied about polygamy using sentiment analysis on Twitters in In...Data mining applied about polygamy using sentiment analysis on Twitters in In...
Data mining applied about polygamy using sentiment analysis on Twitters in In...
 

Similar to Detecting and Resolving Privacy Conflicts in Online Social Networks

A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesIRJET Journal
 
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkAuthorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkeSAT Publishing House
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...ijtsrd
 
Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Anil Dhami
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningIRJET Journal
 
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...IRJET Journal
 
IRJET- Identification of Prevalent News from Twitter and Traditional Media us...
IRJET- Identification of Prevalent News from Twitter and Traditional Media us...IRJET- Identification of Prevalent News from Twitter and Traditional Media us...
IRJET- Identification of Prevalent News from Twitter and Traditional Media us...IRJET Journal
 
Social Networking Websites and Image Privacy
Social Networking Websites and Image PrivacySocial Networking Websites and Image Privacy
Social Networking Websites and Image PrivacyIOSR Journals
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyCSCJournals
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
SOCIAL NETWORKING SITES COMMUNICATE USING HETEROGENEOUS SCHEMA
SOCIAL NETWORKING SITES COMMUNICATE USING HETEROGENEOUS SCHEMASOCIAL NETWORKING SITES COMMUNICATE USING HETEROGENEOUS SCHEMA
SOCIAL NETWORKING SITES COMMUNICATE USING HETEROGENEOUS SCHEMAijiert bestjournal
 
IRJET- Private Social Media and Data Security
IRJET- Private Social Media and Data SecurityIRJET- Private Social Media and Data Security
IRJET- Private Social Media and Data SecurityIRJET Journal
 
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...IRJET Journal
 
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACYMUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACYpaperpublications3
 
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACYMUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACYpaperpublications3
 
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2Posn private information protection in online social networks 2
Posn private information protection in online social networks 2IAEME Publication
 
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network AnalysisMarc Smith
 
A Novel Frame Work System Used In Mobile with Cloud Based Environment
A Novel Frame Work System Used In Mobile with Cloud Based EnvironmentA Novel Frame Work System Used In Mobile with Cloud Based Environment
A Novel Frame Work System Used In Mobile with Cloud Based Environmentpaperpublications3
 
Survey of data mining techniques for social
Survey of data mining techniques for socialSurvey of data mining techniques for social
Survey of data mining techniques for socialFiras Husseini
 

Similar to Detecting and Resolving Privacy Conflicts in Online Social Networks (20)

A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
 
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkAuthorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social network
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
 
Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
 
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
 
IRJET- Identification of Prevalent News from Twitter and Traditional Media us...
IRJET- Identification of Prevalent News from Twitter and Traditional Media us...IRJET- Identification of Prevalent News from Twitter and Traditional Media us...
IRJET- Identification of Prevalent News from Twitter and Traditional Media us...
 
Social Networking Websites and Image Privacy
Social Networking Websites and Image PrivacySocial Networking Websites and Image Privacy
Social Networking Websites and Image Privacy
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Kastriot Blakaj
Kastriot BlakajKastriot Blakaj
Kastriot Blakaj
 
SOCIAL NETWORKING SITES COMMUNICATE USING HETEROGENEOUS SCHEMA
SOCIAL NETWORKING SITES COMMUNICATE USING HETEROGENEOUS SCHEMASOCIAL NETWORKING SITES COMMUNICATE USING HETEROGENEOUS SCHEMA
SOCIAL NETWORKING SITES COMMUNICATE USING HETEROGENEOUS SCHEMA
 
IRJET- Private Social Media and Data Security
IRJET- Private Social Media and Data SecurityIRJET- Private Social Media and Data Security
IRJET- Private Social Media and Data Security
 
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
 
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACYMUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
 
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACYMUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
 
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
 
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis
 
A Novel Frame Work System Used In Mobile with Cloud Based Environment
A Novel Frame Work System Used In Mobile with Cloud Based EnvironmentA Novel Frame Work System Used In Mobile with Cloud Based Environment
A Novel Frame Work System Used In Mobile with Cloud Based Environment
 
Survey of data mining techniques for social
Survey of data mining techniques for socialSurvey of data mining techniques for social
Survey of data mining techniques for social
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 

Recently uploaded (20)

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 

Detecting and Resolving Privacy Conflicts in Online Social Networks

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2015, IRJET ISO 9001:2008 Certified Journal Page 93 Detecting and Resolving Privacy Conflicts in Online Social Networks Prof. Subhash V. Pingale1, Sandip S. Shirgave2 1 Professor in Department Of Computer Engineering, SKN Sinhgad College of Engineering, Korti, Pandharpur, India-413 304 2 ME Student in Department Of Computer Engineering, SKN Sinhgad College of Engineering, Korti, Pandharpur, India-413 304 ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - We have seen lot of growth in online social networks (OSNs) in last few years. These online social networks are not only offer attractive means for virtual social interactions and information and resource sharing but also raise a number of security and privacy issue regarding particular to that shared data. Although online social networks allow a single user to govern access to his or her data, currently they do not provide any system or mechanism to provide privacy over data associated with multiple users. In this paper, we propose an approach to enable collaborative privacy management of shared data and resources in online social networks (OSNs). Key Words: Social network, privacy, collaborative access, security. 1. INTRODUCTION Social networks are the sites where people can connect with each other, these people are each other’s school friends, college friends co-workers in office and sometimes may be stranger’s too. Social networking is used my many reasons some of them is given below. Because of social networking sites many users are attracted to these social networking sites. With the help of these social networking sites peoples can connect with each other, sometimes they can share information and sometimes they can share private and public information with each other. With the help of social network peoples are connected with each from all over the world. There are many social networking sites are available on internet for example facebook, linked-in, twitter etc. Online social networks (OSNs) are web based and they work as a client server architecture which is very common in web based services. Some of the online social networking sites are having premium account means where user need to pay money for surfing and checking the events on social networks. The tremendous growth in the use of online social networks, (developed on web 2.0) such as linked-In, twitter, facebook, myspace and YouTube etc. If we see the internet usage report then it will shows the huge use of activities in social networking sites. These online social networking sites are developed on Web 2.0 technologies. Facebook claims that it having 1.44 billion monthly active users and 936 million daily active users. This means about 70 percent of Facebook’s users use the service daily, and 65 percent of its mobile members use it daily on mobile phones. Twitter has 400 million monthly active users and around 500 million Tweets are sent per day, the study shown that 80% of Twitter active users are on mobile phones. Twitter supports 33 main languages; because of this it is easy to use for particular regions peoples. Twitter gives everyone the power to create and share ideas and information instantly, without barriers. The main goal of online social network is communication between peoples, and makes available information which is published and shared by online users. The information may be anything (e.g. photos, videos, web-contents, and opinions about particular topic or event, contacts) and another purpose to meet other peoples for different kinds of reasons; it may be entertainment, business, and dating and religion occasion etc. This type of available information creates privacy and confidentiality issues. Typically users do not want to share every information or contents with everyone. Today’s online social network provide mechanism to protect the information shared in online space, it gives access control to the user for the distributed of their information or resources. Recent social networking sites provides user can control only own information or resources. It means currently online social networking sites (OSN) provide simple and easy access control technique permitting users to access to information obtained in their own profile. Most of the recent online social networking sites only provide the basic access control policies for example user only can specify the policy that whether the information shall be publicly available, private or that information is only accessible by directly connected users. We have seen tremendous growth in online social networks (OSNs) in recent years. These OSNs not only offer attractive means for virtual social interactions and
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2015, IRJET ISO 9001:2008 Certified Journal Page 94 information sharing, but also raise a number of security and privacy issues. 2. RELATED WORK a. Rule-Based Access Control for Social Networks (Barbara Carminati, Elena Ferrari, and Andrea Perego) In this paper, author represented an access control model for web based online social networks, where policies are is in the terms of type, depth and trust level of relationship which is present between the online social network users. The feature of this model is the use of certificate granting based on authenticity and client based access control which is rule based ,where subject is requesting to access an object must demonstrate that it has the rights of doing that. b. A Reachability Based Access Control Model for Online Social Networks(Talel Abdessalem, Imen Ben Dhia) In this paper, author developed an access control model for online social networks that enables a fine- grained description of privacy policies. These policies are specified in terms of constraints on the type, direction, depth of relationships and trust levels between users, as well as on the user’s properties. In this model author developed a model which relies on a reachability-based approach, where a subject requesting to access an object must satisfy policies determined by the object owner. For developing the model author used the following algorithm for access control protocol. Author also used the Access control architecture which is shown below. c. The Walls Have Ears: Optimize Sharing for Visibility and Privacy in Online Social Networks (Thang N. Dinh*, Yilin Shen*, and My T. Thai) Author formulated the optimization problem, namely maximizing a circle of trust (MCT), of which author construct a circle of trust to maximize the expected visible friends such that the probability of information leakage is reduced to some degree. We have proven the inapproximability and provided a randomized algorithm with theoretical guarantees for the 2-MCT problem. d. Identifying hidden social circles for advanced privacy configuration (Anna Squicciarini , Sushama Karumanchi , Dan Lin , Nicole DeSisto) In this paper, author proposed an approach which helps online social users in managing their social network friend circle (contacts) into relevant groups automatically, and also helps online social users set up their privacy policies automatically for their uploaded content on the online users own wall or others wall. Organizing friend circle (contacts) into groups helps users set privacy settings for newly added content or new contacts joining their social circles. 3. CONCLUSION In this paper we have seen different author’s related work and their methodology; we have also seen the protection in the online social network. ACKNOWLEDGEMENT First and foremost, I would like to thank Prof. S. V. Pingale for his most support and encouragement. He kindly read my paper and offered invaluable detailed advices on grammar, organization, and the theme of the paper. Finally, I sincerely thank to my parents, family, and friends, who provide the advice and financial support. The product of this review paper would not be possible without all of them. REFERENCES [1] P. Fong, M. Anwar, and Z. Zhao, “A Privacy Preservation Model for Facebook-Style Social Network Systems”, Proc. 14th European Conf. Research in Computer Security, pp. 303-320, 2009. [2] Jun Pang and Yang Zhang "A New Access Control Scheme for Facebook-style Social Networks", , arXiv:1304.2504v2 [cs.CR] 16 Dec 2013
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2015, IRJET ISO 9001:2008 Certified Journal Page 95 [3] Thang N. Dinh, Yilin Shen, and My T. Thai. "The Walls Have Ears: Optimize Sharing for Visibility and Privacy in Online Social Networks" CIKM’12, October 29– November 2, 2012, Maui, HI, USA. Copyright 2012 ACM 978-1-4503-1156-4/12/10 [4] Karr-Wisniewski, Pamela; Wilson, D; and Richter- Lipford, "A New Social Order: Mechanisms for Social Network Site Boundary Regulation" (2011). AMCIS 2011 Proceedings - All Submissions. Paper 101. [5] Victoria Kisekka , Sharmistha Bagchi-Sen , H. Raghav Rao. "Extent of private information disclosure on online social networks: An exploration of Facebook mobile phone users" 0747-5632/$ - see front matter _ 2013 Elsevier Ltd. http://dx.doi.org/10.1016/j.chb.2013.07.023 [6] Y. Cheng, J. Park, and R. Sandhu. " A user-to-user relationship-based access control model for online social networks ". In Proceedings of the 26th IFIP Annual WG 11.3 Conference on Data and Application Security and Privacy (DBSec ’12), 2012. [7] Mehmet Sahinoglua, Aysen Dener Akkayab, David Angc "Can We Assess and Monitor Privacy and Security Risk for Social Networks?", 2012. International Conference on Asia Pacific Business Innovation and Technology Management. [8] Imen Ben Dhia "Access Control in Social Networks : A reachability-Based Approach", EDBT/ICDT Workshops March 26-30, 2012, Berlin, Germany. Copyright 2012 ACM 978-1-4503-1143-4/12/03. [9] S.M.A. Abbas, J.A. Pouwelse, D.H.J. Epema, and H.J. Sips. A gossip-based distributed social networking system. In Enabling Technologies: Infrastructures for Collaborative Enterprises, 2009.WETICE '09. 18th IEEE International Workshops on, pages 93 {98, 29 2009-july 1 2009. [10] Alessandro Acquisti and Ralph Gross. Imagined communities: Awareness, information sharing, and privacy on the facebook. In Privacy Enhancing Technologies, pages 36{58, 2006. [11] Alessandro Acquisti and Ralph Gross. Predicting social security numbers from public data. Proceedings of the National Academy of Sciences, 106 (27):10975{10980, 2009. [12] Jonathan Anderson, Claudia Diaz, Joseph Bonneau, and Frank Stajano. Privacy-enabling social networking over untrusted networks. In Proceedings of the 2nd ACM workshop on Online social networks, WOSN '09, pages 1{6, New York, NY, USA, 2009. ACM. [13] L. Backstrom, P. Boldi, M. Rosa, J. Ugander, and S. Vigna. Four degrees of separation. CoRR, abs/1111.4570, 2011. [14] S. Benferhat, R. El Baida, and F. Cuppens. A stratification-based approach for handling conflicts in access control. In Proceedings of the eighth ACM symposium on Access control models and technologies, SACMAT ’03, pages 189–195, New York, NY, USA, 2003. ACM. [15] E. Bertino, S. Jajodia, and P. Samarati. Supporting multiple access control policies in database systems. ACM Transactions on Database Systems, 26:2001, 1996. [16] E. Bertino, S. Jajodia, and P. Samarati. A flexible authorization mechanism for relational data management systems. ACM Trans. Inf. Syst., 17(2):101–140, Apr. 1999. [17] E. Bertino, P. Samarati, and S. Jajodia. Authorizations in relational database management systems. In Proceedings of the 1st ACM confer-ence on Computer and communications security, CCS ’93, pages 130– 139, New York, NY, USA, 1993. ACM. [18] B. Carminati, E. Ferrari, R. Heatherly, M. Kantarcioglu, and B. Thu-raisingham. A semantic web based framework for social network access control. In Proceedings of the 14th ACM symposium on Access control models and technologies, SACMAT ’09, pages 177–186, New York, NY, USA, 2009. ACM. Prof. Subhash V. Pingale is the professor of the department of Computer science and engineering in SKN Sinhgad College of Engineering, Korti, and Pandharpur, India. His main areas of interest are Social Networks and web mining and their applications. Mr. Sandip Shirgave born in India, in 1988. He received the B.E. degree in Computer Science & Engineering from D.K.T.E College from Shivaji University, Ichalkaranji, India, in 2012, and pursuing the Master of Engineering degrees in Computer Science & Engineering from the SKN Sinhgad College of Engineering, Korti, and Pandharpur India. His main areas of interest are Social Networks and web mining and their Applications.