Submit Search
Upload
Detecting and Resolving Privacy Conflicts in Online Social Networks
•
0 likes
•
31 views
IRJET Journal
Follow
https://irjet.net/archives/V3/i1/IRJET-V3I115.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 3
Download now
Download to read offline
Recommended
IRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text Mining
IRJET Journal
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
Zac Darcy
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
IRJET Journal
549 458-465
549 458-465
idescitation
Faculty presentation 21 st december 2015
Faculty presentation 21 st december 2015
Kamoru Abiodun Balogun(Bsc,MIT,CCNA,OCA,PhD inview UPM)
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
IOSR Journals
204
204
vivatechijri
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
IJERA Editor
Recommended
IRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text Mining
IRJET Journal
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
Zac Darcy
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
IRJET Journal
549 458-465
549 458-465
idescitation
Faculty presentation 21 st december 2015
Faculty presentation 21 st december 2015
Kamoru Abiodun Balogun(Bsc,MIT,CCNA,OCA,PhD inview UPM)
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
IOSR Journals
204
204
vivatechijri
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
IJERA Editor
Social media platform and Our right to privacy
Social media platform and Our right to privacy
vivatechijri
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Editor IJCATR
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
IAEME Publication
Intelligent access control policies for Social network site
Intelligent access control policies for Social network site
ijcsit
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...
IJECEIAES
Ijcatr04041017
Ijcatr04041017
Editor IJCATR
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
Maurice Dawson
Security Dangers of Social Networking
Security Dangers of Social Networking
BillBrenner70
Mobile Cyber Security
Mobile Cyber Security
Bob's Business
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Eswar Publications
Cyberbullying Resources
Cyberbullying Resources
Andy Jeter
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET Journal
OSINT EXPLOITATION OF UNIVERSITY TWEETS
OSINT EXPLOITATION OF UNIVERSITY TWEETS
Maurice Dawson
Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World
Thamalsha Wijayarathna
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
pharmaindexing
Data mining applied about polygamy using sentiment analysis on Twitters in In...
Data mining applied about polygamy using sentiment analysis on Twitters in In...
journalBEEI
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
IRJET Journal
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social network
eSAT Publishing House
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
ijtsrd
Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...
Anil Dhami
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
IRJET Journal
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
IRJET Journal
More Related Content
What's hot
Social media platform and Our right to privacy
Social media platform and Our right to privacy
vivatechijri
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Editor IJCATR
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
IAEME Publication
Intelligent access control policies for Social network site
Intelligent access control policies for Social network site
ijcsit
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...
IJECEIAES
Ijcatr04041017
Ijcatr04041017
Editor IJCATR
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
Maurice Dawson
Security Dangers of Social Networking
Security Dangers of Social Networking
BillBrenner70
Mobile Cyber Security
Mobile Cyber Security
Bob's Business
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Eswar Publications
Cyberbullying Resources
Cyberbullying Resources
Andy Jeter
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET Journal
OSINT EXPLOITATION OF UNIVERSITY TWEETS
OSINT EXPLOITATION OF UNIVERSITY TWEETS
Maurice Dawson
Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World
Thamalsha Wijayarathna
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
pharmaindexing
Data mining applied about polygamy using sentiment analysis on Twitters in In...
Data mining applied about polygamy using sentiment analysis on Twitters in In...
journalBEEI
What's hot
(16)
Social media platform and Our right to privacy
Social media platform and Our right to privacy
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
Intelligent access control policies for Social network site
Intelligent access control policies for Social network site
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...
Ijcatr04041017
Ijcatr04041017
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
Security Dangers of Social Networking
Security Dangers of Social Networking
Mobile Cyber Security
Mobile Cyber Security
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Cyberbullying Resources
Cyberbullying Resources
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
OSINT EXPLOITATION OF UNIVERSITY TWEETS
OSINT EXPLOITATION OF UNIVERSITY TWEETS
Data Communication Networking Issues in Real World
Data Communication Networking Issues in Real World
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
Data mining applied about polygamy using sentiment analysis on Twitters in In...
Data mining applied about polygamy using sentiment analysis on Twitters in In...
Similar to Detecting and Resolving Privacy Conflicts in Online Social Networks
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
IRJET Journal
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social network
eSAT Publishing House
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
ijtsrd
Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...
Anil Dhami
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
IRJET Journal
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
IRJET Journal
IRJET- Identification of Prevalent News from Twitter and Traditional Media us...
IRJET- Identification of Prevalent News from Twitter and Traditional Media us...
IRJET Journal
Social Networking Websites and Image Privacy
Social Networking Websites and Image Privacy
IOSR Journals
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
CSCJournals
International Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
Kastriot Blakaj
Kastriot Blakaj
UBT - Higher Education Institution
SOCIAL NETWORKING SITES COMMUNICATE USING HETEROGENEOUS SCHEMA
SOCIAL NETWORKING SITES COMMUNICATE USING HETEROGENEOUS SCHEMA
ijiert bestjournal
IRJET- Private Social Media and Data Security
IRJET- Private Social Media and Data Security
IRJET Journal
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET Journal
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
paperpublications3
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
paperpublications3
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
IAEME Publication
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis
Marc Smith
A Novel Frame Work System Used In Mobile with Cloud Based Environment
A Novel Frame Work System Used In Mobile with Cloud Based Environment
paperpublications3
Survey of data mining techniques for social
Survey of data mining techniques for social
Firas Husseini
Similar to Detecting and Resolving Privacy Conflicts in Online Social Networks
(20)
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social network
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
IRJET- Identification of Prevalent News from Twitter and Traditional Media us...
IRJET- Identification of Prevalent News from Twitter and Traditional Media us...
Social Networking Websites and Image Privacy
Social Networking Websites and Image Privacy
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
International Journal of Engineering Research and Development
International Journal of Engineering Research and Development
Kastriot Blakaj
Kastriot Blakaj
SOCIAL NETWORKING SITES COMMUNICATE USING HETEROGENEOUS SCHEMA
SOCIAL NETWORKING SITES COMMUNICATE USING HETEROGENEOUS SCHEMA
IRJET- Private Social Media and Data Security
IRJET- Private Social Media and Data Security
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis
A Novel Frame Work System Used In Mobile with Cloud Based Environment
A Novel Frame Work System Used In Mobile with Cloud Based Environment
Survey of data mining techniques for social
Survey of data mining techniques for social
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
SIVASHANKAR N
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
AbhinavSharma374939
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
120cr0395
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
humanexperienceaaa
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
ranjana rawat
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Asutosh Ranjan
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
RajkumarAkumalla
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
Recently uploaded
(20)
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
Detecting and Resolving Privacy Conflicts in Online Social Networks
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2015, IRJET ISO 9001:2008 Certified Journal Page 93 Detecting and Resolving Privacy Conflicts in Online Social Networks Prof. Subhash V. Pingale1, Sandip S. Shirgave2 1 Professor in Department Of Computer Engineering, SKN Sinhgad College of Engineering, Korti, Pandharpur, India-413 304 2 ME Student in Department Of Computer Engineering, SKN Sinhgad College of Engineering, Korti, Pandharpur, India-413 304 ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - We have seen lot of growth in online social networks (OSNs) in last few years. These online social networks are not only offer attractive means for virtual social interactions and information and resource sharing but also raise a number of security and privacy issue regarding particular to that shared data. Although online social networks allow a single user to govern access to his or her data, currently they do not provide any system or mechanism to provide privacy over data associated with multiple users. In this paper, we propose an approach to enable collaborative privacy management of shared data and resources in online social networks (OSNs). Key Words: Social network, privacy, collaborative access, security. 1. INTRODUCTION Social networks are the sites where people can connect with each other, these people are each other’s school friends, college friends co-workers in office and sometimes may be stranger’s too. Social networking is used my many reasons some of them is given below. Because of social networking sites many users are attracted to these social networking sites. With the help of these social networking sites peoples can connect with each other, sometimes they can share information and sometimes they can share private and public information with each other. With the help of social network peoples are connected with each from all over the world. There are many social networking sites are available on internet for example facebook, linked-in, twitter etc. Online social networks (OSNs) are web based and they work as a client server architecture which is very common in web based services. Some of the online social networking sites are having premium account means where user need to pay money for surfing and checking the events on social networks. The tremendous growth in the use of online social networks, (developed on web 2.0) such as linked-In, twitter, facebook, myspace and YouTube etc. If we see the internet usage report then it will shows the huge use of activities in social networking sites. These online social networking sites are developed on Web 2.0 technologies. Facebook claims that it having 1.44 billion monthly active users and 936 million daily active users. This means about 70 percent of Facebook’s users use the service daily, and 65 percent of its mobile members use it daily on mobile phones. Twitter has 400 million monthly active users and around 500 million Tweets are sent per day, the study shown that 80% of Twitter active users are on mobile phones. Twitter supports 33 main languages; because of this it is easy to use for particular regions peoples. Twitter gives everyone the power to create and share ideas and information instantly, without barriers. The main goal of online social network is communication between peoples, and makes available information which is published and shared by online users. The information may be anything (e.g. photos, videos, web-contents, and opinions about particular topic or event, contacts) and another purpose to meet other peoples for different kinds of reasons; it may be entertainment, business, and dating and religion occasion etc. This type of available information creates privacy and confidentiality issues. Typically users do not want to share every information or contents with everyone. Today’s online social network provide mechanism to protect the information shared in online space, it gives access control to the user for the distributed of their information or resources. Recent social networking sites provides user can control only own information or resources. It means currently online social networking sites (OSN) provide simple and easy access control technique permitting users to access to information obtained in their own profile. Most of the recent online social networking sites only provide the basic access control policies for example user only can specify the policy that whether the information shall be publicly available, private or that information is only accessible by directly connected users. We have seen tremendous growth in online social networks (OSNs) in recent years. These OSNs not only offer attractive means for virtual social interactions and
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2015, IRJET ISO 9001:2008 Certified Journal Page 94 information sharing, but also raise a number of security and privacy issues. 2. RELATED WORK a. Rule-Based Access Control for Social Networks (Barbara Carminati, Elena Ferrari, and Andrea Perego) In this paper, author represented an access control model for web based online social networks, where policies are is in the terms of type, depth and trust level of relationship which is present between the online social network users. The feature of this model is the use of certificate granting based on authenticity and client based access control which is rule based ,where subject is requesting to access an object must demonstrate that it has the rights of doing that. b. A Reachability Based Access Control Model for Online Social Networks(Talel Abdessalem, Imen Ben Dhia) In this paper, author developed an access control model for online social networks that enables a fine- grained description of privacy policies. These policies are specified in terms of constraints on the type, direction, depth of relationships and trust levels between users, as well as on the user’s properties. In this model author developed a model which relies on a reachability-based approach, where a subject requesting to access an object must satisfy policies determined by the object owner. For developing the model author used the following algorithm for access control protocol. Author also used the Access control architecture which is shown below. c. The Walls Have Ears: Optimize Sharing for Visibility and Privacy in Online Social Networks (Thang N. Dinh*, Yilin Shen*, and My T. Thai) Author formulated the optimization problem, namely maximizing a circle of trust (MCT), of which author construct a circle of trust to maximize the expected visible friends such that the probability of information leakage is reduced to some degree. We have proven the inapproximability and provided a randomized algorithm with theoretical guarantees for the 2-MCT problem. d. Identifying hidden social circles for advanced privacy configuration (Anna Squicciarini , Sushama Karumanchi , Dan Lin , Nicole DeSisto) In this paper, author proposed an approach which helps online social users in managing their social network friend circle (contacts) into relevant groups automatically, and also helps online social users set up their privacy policies automatically for their uploaded content on the online users own wall or others wall. Organizing friend circle (contacts) into groups helps users set privacy settings for newly added content or new contacts joining their social circles. 3. CONCLUSION In this paper we have seen different author’s related work and their methodology; we have also seen the protection in the online social network. ACKNOWLEDGEMENT First and foremost, I would like to thank Prof. S. V. Pingale for his most support and encouragement. He kindly read my paper and offered invaluable detailed advices on grammar, organization, and the theme of the paper. Finally, I sincerely thank to my parents, family, and friends, who provide the advice and financial support. The product of this review paper would not be possible without all of them. REFERENCES [1] P. Fong, M. Anwar, and Z. Zhao, “A Privacy Preservation Model for Facebook-Style Social Network Systems”, Proc. 14th European Conf. Research in Computer Security, pp. 303-320, 2009. [2] Jun Pang and Yang Zhang "A New Access Control Scheme for Facebook-style Social Networks", , arXiv:1304.2504v2 [cs.CR] 16 Dec 2013
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2015, IRJET ISO 9001:2008 Certified Journal Page 95 [3] Thang N. Dinh, Yilin Shen, and My T. Thai. "The Walls Have Ears: Optimize Sharing for Visibility and Privacy in Online Social Networks" CIKM’12, October 29– November 2, 2012, Maui, HI, USA. Copyright 2012 ACM 978-1-4503-1156-4/12/10 [4] Karr-Wisniewski, Pamela; Wilson, D; and Richter- Lipford, "A New Social Order: Mechanisms for Social Network Site Boundary Regulation" (2011). AMCIS 2011 Proceedings - All Submissions. Paper 101. [5] Victoria Kisekka , Sharmistha Bagchi-Sen , H. Raghav Rao. "Extent of private information disclosure on online social networks: An exploration of Facebook mobile phone users" 0747-5632/$ - see front matter _ 2013 Elsevier Ltd. http://dx.doi.org/10.1016/j.chb.2013.07.023 [6] Y. Cheng, J. Park, and R. Sandhu. " A user-to-user relationship-based access control model for online social networks ". In Proceedings of the 26th IFIP Annual WG 11.3 Conference on Data and Application Security and Privacy (DBSec ’12), 2012. [7] Mehmet Sahinoglua, Aysen Dener Akkayab, David Angc "Can We Assess and Monitor Privacy and Security Risk for Social Networks?", 2012. International Conference on Asia Pacific Business Innovation and Technology Management. [8] Imen Ben Dhia "Access Control in Social Networks : A reachability-Based Approach", EDBT/ICDT Workshops March 26-30, 2012, Berlin, Germany. Copyright 2012 ACM 978-1-4503-1143-4/12/03. [9] S.M.A. Abbas, J.A. Pouwelse, D.H.J. Epema, and H.J. Sips. A gossip-based distributed social networking system. In Enabling Technologies: Infrastructures for Collaborative Enterprises, 2009.WETICE '09. 18th IEEE International Workshops on, pages 93 {98, 29 2009-july 1 2009. [10] Alessandro Acquisti and Ralph Gross. Imagined communities: Awareness, information sharing, and privacy on the facebook. In Privacy Enhancing Technologies, pages 36{58, 2006. [11] Alessandro Acquisti and Ralph Gross. Predicting social security numbers from public data. Proceedings of the National Academy of Sciences, 106 (27):10975{10980, 2009. [12] Jonathan Anderson, Claudia Diaz, Joseph Bonneau, and Frank Stajano. Privacy-enabling social networking over untrusted networks. In Proceedings of the 2nd ACM workshop on Online social networks, WOSN '09, pages 1{6, New York, NY, USA, 2009. ACM. [13] L. Backstrom, P. Boldi, M. Rosa, J. Ugander, and S. Vigna. Four degrees of separation. CoRR, abs/1111.4570, 2011. [14] S. Benferhat, R. El Baida, and F. Cuppens. A stratification-based approach for handling conflicts in access control. In Proceedings of the eighth ACM symposium on Access control models and technologies, SACMAT ’03, pages 189–195, New York, NY, USA, 2003. ACM. [15] E. Bertino, S. Jajodia, and P. Samarati. Supporting multiple access control policies in database systems. ACM Transactions on Database Systems, 26:2001, 1996. [16] E. Bertino, S. Jajodia, and P. Samarati. A flexible authorization mechanism for relational data management systems. ACM Trans. Inf. Syst., 17(2):101–140, Apr. 1999. [17] E. Bertino, P. Samarati, and S. Jajodia. Authorizations in relational database management systems. In Proceedings of the 1st ACM confer-ence on Computer and communications security, CCS ’93, pages 130– 139, New York, NY, USA, 1993. ACM. [18] B. Carminati, E. Ferrari, R. Heatherly, M. Kantarcioglu, and B. Thu-raisingham. A semantic web based framework for social network access control. In Proceedings of the 14th ACM symposium on Access control models and technologies, SACMAT ’09, pages 177–186, New York, NY, USA, 2009. ACM. Prof. Subhash V. Pingale is the professor of the department of Computer science and engineering in SKN Sinhgad College of Engineering, Korti, and Pandharpur, India. His main areas of interest are Social Networks and web mining and their applications. Mr. Sandip Shirgave born in India, in 1988. He received the B.E. degree in Computer Science & Engineering from D.K.T.E College from Shivaji University, Ichalkaranji, India, in 2012, and pursuing the Master of Engineering degrees in Computer Science & Engineering from the SKN Sinhgad College of Engineering, Korti, and Pandharpur India. His main areas of interest are Social Networks and web mining and their Applications.
Download now