SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1255
PRIVACY PROTECTION USING FORMAL LOGICS IN ONLINE SOCIAL
NETWORKS
Chrsitina Rini.R1, Jathursana.L2, Dhivya Keerthana.S3, Ms.V.Sathiya4
123Student, Department of CSE, Panimalar Engineering College, Chennai, India.
4Associate Professor, Department of CSE,Panimalar Engineering College,Chennai, India
------------------------------------------------------------------------------------------------------------------------------------------------------------------
Abstract- Privacy breaches have been understood as the
malfunctioning of a given system. However, a byproduct of
its workings. The users are allowed to create and share
content about themselves can reach unintended
individuals and inference can reveal more information
about the user. Social networks our categorization yields
that the privacy violations in online social networks of
events. Our proposed approach is based on agent-based
representation of a social network, The privacy context,
including the relations among users or content types, are
captured using and our approach using real-life social
networks.
Index Terms— Privacy, social networks, ontology, formal
model
I. INTRODUCTION
Were used to share personal content with friends
(e.g., Facebook.com), more and more a large number of
users; however each user shares content with only a small
subset of these of the user. For example, a user might share
contact information with all of her acquaintances, the user
might not even want all her friends to see it. That is,
privacy constraints vary based with their users. However,
when that happens, it is difficult to enforce users’ privacy
requirements. That is, each user can contribute to the
sharing of content by putting up posts. It accessible for
others. These interactions privacy violations, some of
which are to deal with privacy violations [2].
That is shared in the online social network (OSN). The
content that might be shared by the user herself or by
others; the content may vary, entire social network.
Whenever this content reveals information to an
unintended audience, the user’s privacy is breached.
It is important that if a user’s privacy will be breached,
then either the system takes an appropriate action to avoid
this or if it is unavoidable at least let the user know so that
she can address circulates in the system and manually find
out if their privacy has been breached. This is of social
networks, where each user is represented by a software
agent. Each agent keeps track them over time. The agent is
then responsible for checking if these privacy
requirements are expectations from the system. Since
privacy requirements differ per person, the agent is
responsible for creating on-demand privacy agreements
with the system. Formalization of users’ privacy
requirements is important since privacy violations result
because of the variance in expectation violation for a
second user. By individually representing these for each
user, one can check for the violations per situation. Once
the agent forms the agreements then it can query the
system for privacy violations at particular states of the
system. Since privacy violations require semantic
understanding of situations.
Checking for privacy violation can be useful in two
ways. First is to find out whether the current system
currently violates a privacy constraint of a user. That is, to
decide if the actions of others or the user have already
created a violation. Second is to find out whether taking a
particular action will lead to a violation (e.g., becoming
friends with a new person). That is, to decide if a future
state will cause a violation. If so, the system can act to
prevent the violation, for example by disallowing a certain
friendship or removing some contextual there are .
Using the meta-model,we formally define agent-
based social networks, privacy requirements, PRIGUARD
for representing a model that conforms to the meta-
model.This semantic approach uses description logic (DL)
[3] to represent information about the social network core
of the approach is an algorithm that checks if
commitments are violated, leading to a an open-source
software tool, PRIGUARDTOOL that implements the
approach using ontologies of our approach through this
tool shows that different types of privacy violations can be
detected are available in the literature..
Section 5 uses the meta-model to model a real-life
social network and constructs with pointers for future
work.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1256
II.RELATED WORK
Privacy in social networks has been studied in
various stances. The first set of approaches study to find
out the private personal information that can be
discovered for a user. Zhou based on what they have
exposed so far. Heatherly et al. [10] use using social
inference attacks. here is on capturing privacy
requirements and detecting their violations automatically.
While these approaches do not attempt that, they
successfully show the power of capturing inferences. Our
work currently
is based on defined inference rules but could very well
benefit from data-driven inferences done in these works.
Privacy Akcora, Carminati, and Ferrari [11] develop a
graph-based approach and a risk model to learn risk labels
of strangers with the intuition that risky strangers are
more likely to and visible a profile item is and can be used
to adjust the privacy settings of friends. These approaches
identify risky users in general, rather than considering
individual privacy requirements privacy violations but to
form a general opinion of the network.
(Semi-) automatically suggest policies. Fang and
LeFevre propose a privacy wizard that automatically
configures the user’s privacy settings based on an active
learning paradigm [13]. The user provides privacy labels
for some of her friends and the proposed privacy wizard
automatically Privacy Policy Prediction (A3P) system that
guides users to compose privacy settings for their first
classify an image into a category based on content and
metadata. Then, they find privacy to their policy prediction
algorithm. These approaches are complementary to our
approach. In developing would be useful to have a method
that can recommend users privacy policies.
The last set of approaches detect privacy violations in
a given system. Privacy IQ is a Facebook extension where
users can see the privacy reach of their posts and the effect
of their past privacy settings [15]. PRIGUARD shares a
similar intuition by comparing the user’s privacy
expectations with the actual state of the system. Our
contribution is on detecting privacy breaches that take
place because of interactions among users and inferences
on content.
Is huge and may not be applicable in large networks.
In PRIGUARD, privacy violations in OSNs policies are
specified in terms of the relationships between the
resource owner and the resource her privacy concerns in
terms of relationships with other users (e.g., friends of the
user)(such as the violation types iii and iv) and does not
provide results on the performance of [18]. In this work,
they introduce a social network model, a multiparty policy
specification scheme and a mechanism to enforce policies
to resolve multiparty privacy conflicts. They adopt Answer
Set Programming (ASP) to represent their proposed
model. Our model shares similar intuitions. Our proposed
semantic architecture uses SPARQL queries to detect
privacy violations, rather than an ASP solver. In their work,
each user manually specifies a policy per resource, which
is time-consuming for a user. Moreover, privacy concerns
of the users are not formally defined and the In PRIGUARD,
we advocate policies to represent privacy concerns of the
users and the detection framework tmanage access control
in OSNs by generating semantic policies [19]. The social
network. [19] and improves it in various ways. First,we
provide a rich ontology hence we are able to represent
privacy policies in a fine-grained way. Second, the
ontological reasoning task in our work is decidable since
we use Description Logics rules in our implementation in
contrast to Semantic Web Rule Language (SWRL) rules.
Third, it is known that access control policies are subject to
change often. If a SWRL rule is modified to reflect this
change then the ontology privacy concerns of the users as
commitments, which are widely-used constructs for
modeling interactions between agents [20]. Hence, our
model can deal with changes in privacy concerns of the
users.
III. EXISTING METHODOLOGY
The existing system is that the user has the activity in
their social networking account such as changing the
profile picture, posting the recent activity , sending friend
request ,accept or reject friend request, chatting with
friends , sharing the post that posted by some other user
etc ..The user privacy get affected in the existing system by,
imagine that if the user post the microblog with the view
privilege of “FRIENDS”. It means that the user who is
friend of the posted user can able to view, like, comment,
share the post. Here the users privacy get affected when
the viewing user share the post with the privilege of
“PUBLIC”or “FRIENDS”or“FRIEND OF FRIENDS” then the
post can be viewed by all the account holders.
IV.PROBLEMS IN THE EXISTING SYSTEM
The major problem that we face while you are having
an account holder in the social networking are the privacy
of the respective micro blog (post) holder may get affected
with some privacy issues, if the privileged view user for
respective post share the post in the non permitted
environment by the micro blog posted person.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1257
V. PROPOSED WORK
In order to reduce the privacy problem that we face
in social networking, they introduce an intermediate third
person called trusted-third party. And now, if the user post
the micro blog with the privilege “FRIEND” The third party
take the micro blog to the account and verify the privacy
policy that provided by the user. If the privileged user
shares the respective user micro blog, the share request
will be submitted to the third party. The third party
validate the share request and allow the share if the
privacy policy provided by the posted user don’t get
violated or deny if violated.
VI.CONCLUSION
The user privacy of the user post (micro blog) has
been preserved by preventing the unprivileged share and
full filled sharing for unprivileged post by submitting the
share request and share if the posted user permutes.
REFERENCES
[1] M. Mondal, P. Druschel, K. P. Gummadi, and A.
Mislove,“Beyond Access Control: Managing Online Privacy
via Exposure,” in Proc. Workshop Usable Security, Feb.
2014, pp. 1–6.
[2] R. Fogues, J. M. Such, A. Espinosa, and A. Garcia-Fornes,
“Open challenges in relationship-based privacy
mechanisms for social network services,” Int. J. Hum.-
Comput. Interact., vol. 31, no. 5,pp. 350–370, 2015.
[3] M. S. Bernstein, E. Bakshy, M. Burke, and B. Karrer,
“Quantifying
the invisible audience in social networks,” in Proc. SIGCHI
Conf.Hum. Factors Comput. Syst., 2013, pp. 21–30.
[4] L. Andrews, I Know Who You Are and I Saw What You
Did: Social
Networks and the Death of Privacy. New York, NY, USA:
The Free Press, 2013.
[5] M. X. Zhou, J. Nichols, T. Dignan, S. Lohr, J. Golbeck, and
J. W. Pennebaker, “Opportunities and risks of discovering
personality
traits from social media,” in Proc. Extended Abstracts
Hum.Factors Comput. Syst., 2014, pp. 1081–1086.
[6] J. Golbeck and D. Hansen, “A method for computing
political
preference among Twitter followers,” Soc. Netw., vol. 36,
pp. 177–184, 2014.
[7] R. Heatherly, M. Kantarcioglu, and B. Thuraisingham,
“Preventing private information inference attacks on social
networks,” IEEE Trans. Knowl. Data Eng., vol. 25, no. 8, pp.
1849–
1862, Aug. 2013.
[8] C. G. Akcora, B. Carminati, and E. Ferrari, “Risks of
friendships on social networks,” in Proc. IEEE Int. Conf.
Data Min., 2012,pp. 810–815.
[9] K. Liu and E. Terzi, “A framework for computing the
privacy
scores of users in online social networks,” ACM Trans.
Knowl. Discovery Data, vol. 5, no. 1, pp. 6:1–6:30, 2010.
[10] L. Fang and K. LeFevre, “Privacy wizards for social
networking sites,” in Proc. 19th Int. Conf. World Wide Web,
2010, pp. 351–360.
[11] A. C. Squicciarini, D. Lin, S. Sundareswaran, and J.
Wede,“Privacy policy inference of user-uploaded images
on content sharing sites,” IEEE Trans. Knowl. Data Eng.,
vol. 27, no. 1,pp. 193–206, Jan. 2015.
[12] B. Krishnamurthy, “Privacy and online social
networks: Can colorless green ideas sleep furiously?” IEEE
Secur. Priv., vol. 11,no. 3, pp. 14–20, May2013.

More Related Content

What's hot

TULUNGAN: A SLANDERING-RESISTANT REPUTATION SYSTEM FOR COLLABORATIVE WEB FILT...
TULUNGAN: A SLANDERING-RESISTANT REPUTATION SYSTEM FOR COLLABORATIVE WEB FILT...TULUNGAN: A SLANDERING-RESISTANT REPUTATION SYSTEM FOR COLLABORATIVE WEB FILT...
TULUNGAN: A SLANDERING-RESISTANT REPUTATION SYSTEM FOR COLLABORATIVE WEB FILT...IJNSA Journal
 
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...The Constrained Method of Accessibility and Privacy Preserving Of Relational ...
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...IJERA Editor
 
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORKMALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORKijcseit
 
IRJET- Autobiographical Fallback Authentication using Smartphones
IRJET-  	  Autobiographical Fallback Authentication using SmartphonesIRJET-  	  Autobiographical Fallback Authentication using Smartphones
IRJET- Autobiographical Fallback Authentication using SmartphonesIRJET Journal
 
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET Journal
 
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...IJARIIT
 
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...IRJET Journal
 
Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
Detection and Analysis of Twitter Trending Topics via Link-Anomaly DetectionDetection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
Detection and Analysis of Twitter Trending Topics via Link-Anomaly DetectionIJERA Editor
 
Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.Kiran K.V.S.
 
Recommendation System Using Social Networking
Recommendation System Using Social Networking Recommendation System Using Social Networking
Recommendation System Using Social Networking ijcseit
 
IRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat ApplicationIRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat ApplicationIRJET Journal
 
Secure encounter based mobile social networks requirements, designs, and trad...
Secure encounter based mobile social networks requirements, designs, and trad...Secure encounter based mobile social networks requirements, designs, and trad...
Secure encounter based mobile social networks requirements, designs, and trad...JPINFOTECH JAYAPRAKASH
 
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...IOSR Journals
 
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEYPHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEYIJNSA Journal
 
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET-  	  Recognizing User Portrait for Fraudulent Identification on Online ...IRJET-  	  Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...IRJET Journal
 
IRJET- Tweet Segmentation and its Application to Named Entity Recognition
IRJET- Tweet Segmentation and its Application to Named Entity RecognitionIRJET- Tweet Segmentation and its Application to Named Entity Recognition
IRJET- Tweet Segmentation and its Application to Named Entity RecognitionIRJET Journal
 
Secure encounter based mobile social networks requirements, designs, and trad...
Secure encounter based mobile social networks requirements, designs, and trad...Secure encounter based mobile social networks requirements, designs, and trad...
Secure encounter based mobile social networks requirements, designs, and trad...IEEEFINALYEARPROJECTS
 

What's hot (18)

TULUNGAN: A SLANDERING-RESISTANT REPUTATION SYSTEM FOR COLLABORATIVE WEB FILT...
TULUNGAN: A SLANDERING-RESISTANT REPUTATION SYSTEM FOR COLLABORATIVE WEB FILT...TULUNGAN: A SLANDERING-RESISTANT REPUTATION SYSTEM FOR COLLABORATIVE WEB FILT...
TULUNGAN: A SLANDERING-RESISTANT REPUTATION SYSTEM FOR COLLABORATIVE WEB FILT...
 
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...The Constrained Method of Accessibility and Privacy Preserving Of Relational ...
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...
 
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORKMALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
 
IRJET- Autobiographical Fallback Authentication using Smartphones
IRJET-  	  Autobiographical Fallback Authentication using SmartphonesIRJET-  	  Autobiographical Fallback Authentication using Smartphones
IRJET- Autobiographical Fallback Authentication using Smartphones
 
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
 
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
 
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
 
Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
Detection and Analysis of Twitter Trending Topics via Link-Anomaly DetectionDetection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
 
Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.
 
Recommendation System Using Social Networking
Recommendation System Using Social Networking Recommendation System Using Social Networking
Recommendation System Using Social Networking
 
IRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat ApplicationIRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat Application
 
Secure encounter based mobile social networks requirements, designs, and trad...
Secure encounter based mobile social networks requirements, designs, and trad...Secure encounter based mobile social networks requirements, designs, and trad...
Secure encounter based mobile social networks requirements, designs, and trad...
 
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
 
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEYPHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
 
Kamel ben kmala_NLP
Kamel ben kmala_NLPKamel ben kmala_NLP
Kamel ben kmala_NLP
 
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET-  	  Recognizing User Portrait for Fraudulent Identification on Online ...IRJET-  	  Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
 
IRJET- Tweet Segmentation and its Application to Named Entity Recognition
IRJET- Tweet Segmentation and its Application to Named Entity RecognitionIRJET- Tweet Segmentation and its Application to Named Entity Recognition
IRJET- Tweet Segmentation and its Application to Named Entity Recognition
 
Secure encounter based mobile social networks requirements, designs, and trad...
Secure encounter based mobile social networks requirements, designs, and trad...Secure encounter based mobile social networks requirements, designs, and trad...
Secure encounter based mobile social networks requirements, designs, and trad...
 

Similar to Privacy Protection Using Formal Logics in Onlne Social Networks

My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social NetworksMy Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social NetworksIRJET Journal
 
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesIRJET Journal
 
Intelligent access control policies for Social network site
Intelligent access control policies for Social network siteIntelligent access control policies for Social network site
Intelligent access control policies for Social network siteijcsit
 
IRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET- Quantify Mutually Dependent Privacy Risks with Locality DataIRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET- Quantify Mutually Dependent Privacy Risks with Locality DataIRJET Journal
 
Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks IJECEIAES
 
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkAuthorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkeSAT Publishing House
 
Implementation of Privacy Policy Specification System for User Uploaded Image...
Implementation of Privacy Policy Specification System for User Uploaded Image...Implementation of Privacy Policy Specification System for User Uploaded Image...
Implementation of Privacy Policy Specification System for User Uploaded Image...rahulmonikasharma
 
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...Ijripublishers Ijri
 
Detecting and Providing Solutions to Privacy Issues in Social Media
Detecting and Providing Solutions to Privacy Issues in Social MediaDetecting and Providing Solutions to Privacy Issues in Social Media
Detecting and Providing Solutions to Privacy Issues in Social MediaIRJET Journal
 
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACYMUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACYpaperpublications3
 
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACYMUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACYpaperpublications3
 
PRIVACY PRESERVATION IN SOCIAL MEDIA BY IMAGE PROCESSING
PRIVACY PRESERVATION  IN  SOCIAL MEDIA BY IMAGE PROCESSINGPRIVACY PRESERVATION  IN  SOCIAL MEDIA BY IMAGE PROCESSING
PRIVACY PRESERVATION IN SOCIAL MEDIA BY IMAGE PROCESSINGAM Publications
 
An Access Control Model for Collaborative Management of Shared Data in OSNS
An Access Control Model for Collaborative Management of Shared Data in OSNSAn Access Control Model for Collaborative Management of Shared Data in OSNS
An Access Control Model for Collaborative Management of Shared Data in OSNSIJMER
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...ijsptm
 
IRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text MiningIRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text MiningIRJET Journal
 
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Privacy Management of Multi User Environment in Online Social Networks (OSNs)Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Privacy Management of Multi User Environment in Online Social Networks (OSNs)IOSR Journals
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSZac Darcy
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Editor IJCATR
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Editor IJCATR
 

Similar to Privacy Protection Using Formal Logics in Onlne Social Networks (20)

My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social NetworksMy Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
 
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
 
Intelligent access control policies for Social network site
Intelligent access control policies for Social network siteIntelligent access control policies for Social network site
Intelligent access control policies for Social network site
 
IRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET- Quantify Mutually Dependent Privacy Risks with Locality DataIRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
 
Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks
 
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkAuthorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social network
 
Implementation of Privacy Policy Specification System for User Uploaded Image...
Implementation of Privacy Policy Specification System for User Uploaded Image...Implementation of Privacy Policy Specification System for User Uploaded Image...
Implementation of Privacy Policy Specification System for User Uploaded Image...
 
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
 
Detecting and Providing Solutions to Privacy Issues in Social Media
Detecting and Providing Solutions to Privacy Issues in Social MediaDetecting and Providing Solutions to Privacy Issues in Social Media
Detecting and Providing Solutions to Privacy Issues in Social Media
 
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACYMUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
 
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACYMUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
 
PRIVACY PRESERVATION IN SOCIAL MEDIA BY IMAGE PROCESSING
PRIVACY PRESERVATION  IN  SOCIAL MEDIA BY IMAGE PROCESSINGPRIVACY PRESERVATION  IN  SOCIAL MEDIA BY IMAGE PROCESSING
PRIVACY PRESERVATION IN SOCIAL MEDIA BY IMAGE PROCESSING
 
Ijcatr04041017
Ijcatr04041017Ijcatr04041017
Ijcatr04041017
 
An Access Control Model for Collaborative Management of Shared Data in OSNS
An Access Control Model for Collaborative Management of Shared Data in OSNSAn Access Control Model for Collaborative Management of Shared Data in OSNS
An Access Control Model for Collaborative Management of Shared Data in OSNS
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
 
IRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text MiningIRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text Mining
 
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Privacy Management of Multi User Environment in Online Social Networks (OSNs)Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 

Recently uploaded (20)

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 

Privacy Protection Using Formal Logics in Onlne Social Networks

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1255 PRIVACY PROTECTION USING FORMAL LOGICS IN ONLINE SOCIAL NETWORKS Chrsitina Rini.R1, Jathursana.L2, Dhivya Keerthana.S3, Ms.V.Sathiya4 123Student, Department of CSE, Panimalar Engineering College, Chennai, India. 4Associate Professor, Department of CSE,Panimalar Engineering College,Chennai, India ------------------------------------------------------------------------------------------------------------------------------------------------------------------ Abstract- Privacy breaches have been understood as the malfunctioning of a given system. However, a byproduct of its workings. The users are allowed to create and share content about themselves can reach unintended individuals and inference can reveal more information about the user. Social networks our categorization yields that the privacy violations in online social networks of events. Our proposed approach is based on agent-based representation of a social network, The privacy context, including the relations among users or content types, are captured using and our approach using real-life social networks. Index Terms— Privacy, social networks, ontology, formal model I. INTRODUCTION Were used to share personal content with friends (e.g., Facebook.com), more and more a large number of users; however each user shares content with only a small subset of these of the user. For example, a user might share contact information with all of her acquaintances, the user might not even want all her friends to see it. That is, privacy constraints vary based with their users. However, when that happens, it is difficult to enforce users’ privacy requirements. That is, each user can contribute to the sharing of content by putting up posts. It accessible for others. These interactions privacy violations, some of which are to deal with privacy violations [2]. That is shared in the online social network (OSN). The content that might be shared by the user herself or by others; the content may vary, entire social network. Whenever this content reveals information to an unintended audience, the user’s privacy is breached. It is important that if a user’s privacy will be breached, then either the system takes an appropriate action to avoid this or if it is unavoidable at least let the user know so that she can address circulates in the system and manually find out if their privacy has been breached. This is of social networks, where each user is represented by a software agent. Each agent keeps track them over time. The agent is then responsible for checking if these privacy requirements are expectations from the system. Since privacy requirements differ per person, the agent is responsible for creating on-demand privacy agreements with the system. Formalization of users’ privacy requirements is important since privacy violations result because of the variance in expectation violation for a second user. By individually representing these for each user, one can check for the violations per situation. Once the agent forms the agreements then it can query the system for privacy violations at particular states of the system. Since privacy violations require semantic understanding of situations. Checking for privacy violation can be useful in two ways. First is to find out whether the current system currently violates a privacy constraint of a user. That is, to decide if the actions of others or the user have already created a violation. Second is to find out whether taking a particular action will lead to a violation (e.g., becoming friends with a new person). That is, to decide if a future state will cause a violation. If so, the system can act to prevent the violation, for example by disallowing a certain friendship or removing some contextual there are . Using the meta-model,we formally define agent- based social networks, privacy requirements, PRIGUARD for representing a model that conforms to the meta- model.This semantic approach uses description logic (DL) [3] to represent information about the social network core of the approach is an algorithm that checks if commitments are violated, leading to a an open-source software tool, PRIGUARDTOOL that implements the approach using ontologies of our approach through this tool shows that different types of privacy violations can be detected are available in the literature.. Section 5 uses the meta-model to model a real-life social network and constructs with pointers for future work.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1256 II.RELATED WORK Privacy in social networks has been studied in various stances. The first set of approaches study to find out the private personal information that can be discovered for a user. Zhou based on what they have exposed so far. Heatherly et al. [10] use using social inference attacks. here is on capturing privacy requirements and detecting their violations automatically. While these approaches do not attempt that, they successfully show the power of capturing inferences. Our work currently is based on defined inference rules but could very well benefit from data-driven inferences done in these works. Privacy Akcora, Carminati, and Ferrari [11] develop a graph-based approach and a risk model to learn risk labels of strangers with the intuition that risky strangers are more likely to and visible a profile item is and can be used to adjust the privacy settings of friends. These approaches identify risky users in general, rather than considering individual privacy requirements privacy violations but to form a general opinion of the network. (Semi-) automatically suggest policies. Fang and LeFevre propose a privacy wizard that automatically configures the user’s privacy settings based on an active learning paradigm [13]. The user provides privacy labels for some of her friends and the proposed privacy wizard automatically Privacy Policy Prediction (A3P) system that guides users to compose privacy settings for their first classify an image into a category based on content and metadata. Then, they find privacy to their policy prediction algorithm. These approaches are complementary to our approach. In developing would be useful to have a method that can recommend users privacy policies. The last set of approaches detect privacy violations in a given system. Privacy IQ is a Facebook extension where users can see the privacy reach of their posts and the effect of their past privacy settings [15]. PRIGUARD shares a similar intuition by comparing the user’s privacy expectations with the actual state of the system. Our contribution is on detecting privacy breaches that take place because of interactions among users and inferences on content. Is huge and may not be applicable in large networks. In PRIGUARD, privacy violations in OSNs policies are specified in terms of the relationships between the resource owner and the resource her privacy concerns in terms of relationships with other users (e.g., friends of the user)(such as the violation types iii and iv) and does not provide results on the performance of [18]. In this work, they introduce a social network model, a multiparty policy specification scheme and a mechanism to enforce policies to resolve multiparty privacy conflicts. They adopt Answer Set Programming (ASP) to represent their proposed model. Our model shares similar intuitions. Our proposed semantic architecture uses SPARQL queries to detect privacy violations, rather than an ASP solver. In their work, each user manually specifies a policy per resource, which is time-consuming for a user. Moreover, privacy concerns of the users are not formally defined and the In PRIGUARD, we advocate policies to represent privacy concerns of the users and the detection framework tmanage access control in OSNs by generating semantic policies [19]. The social network. [19] and improves it in various ways. First,we provide a rich ontology hence we are able to represent privacy policies in a fine-grained way. Second, the ontological reasoning task in our work is decidable since we use Description Logics rules in our implementation in contrast to Semantic Web Rule Language (SWRL) rules. Third, it is known that access control policies are subject to change often. If a SWRL rule is modified to reflect this change then the ontology privacy concerns of the users as commitments, which are widely-used constructs for modeling interactions between agents [20]. Hence, our model can deal with changes in privacy concerns of the users. III. EXISTING METHODOLOGY The existing system is that the user has the activity in their social networking account such as changing the profile picture, posting the recent activity , sending friend request ,accept or reject friend request, chatting with friends , sharing the post that posted by some other user etc ..The user privacy get affected in the existing system by, imagine that if the user post the microblog with the view privilege of “FRIENDS”. It means that the user who is friend of the posted user can able to view, like, comment, share the post. Here the users privacy get affected when the viewing user share the post with the privilege of “PUBLIC”or “FRIENDS”or“FRIEND OF FRIENDS” then the post can be viewed by all the account holders. IV.PROBLEMS IN THE EXISTING SYSTEM The major problem that we face while you are having an account holder in the social networking are the privacy of the respective micro blog (post) holder may get affected with some privacy issues, if the privileged view user for respective post share the post in the non permitted environment by the micro blog posted person.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1257 V. PROPOSED WORK In order to reduce the privacy problem that we face in social networking, they introduce an intermediate third person called trusted-third party. And now, if the user post the micro blog with the privilege “FRIEND” The third party take the micro blog to the account and verify the privacy policy that provided by the user. If the privileged user shares the respective user micro blog, the share request will be submitted to the third party. The third party validate the share request and allow the share if the privacy policy provided by the posted user don’t get violated or deny if violated. VI.CONCLUSION The user privacy of the user post (micro blog) has been preserved by preventing the unprivileged share and full filled sharing for unprivileged post by submitting the share request and share if the posted user permutes. REFERENCES [1] M. Mondal, P. Druschel, K. P. Gummadi, and A. Mislove,“Beyond Access Control: Managing Online Privacy via Exposure,” in Proc. Workshop Usable Security, Feb. 2014, pp. 1–6. [2] R. Fogues, J. M. Such, A. Espinosa, and A. Garcia-Fornes, “Open challenges in relationship-based privacy mechanisms for social network services,” Int. J. Hum.- Comput. Interact., vol. 31, no. 5,pp. 350–370, 2015. [3] M. S. Bernstein, E. Bakshy, M. Burke, and B. Karrer, “Quantifying the invisible audience in social networks,” in Proc. SIGCHI Conf.Hum. Factors Comput. Syst., 2013, pp. 21–30. [4] L. Andrews, I Know Who You Are and I Saw What You Did: Social Networks and the Death of Privacy. New York, NY, USA: The Free Press, 2013. [5] M. X. Zhou, J. Nichols, T. Dignan, S. Lohr, J. Golbeck, and J. W. Pennebaker, “Opportunities and risks of discovering personality traits from social media,” in Proc. Extended Abstracts Hum.Factors Comput. Syst., 2014, pp. 1081–1086. [6] J. Golbeck and D. Hansen, “A method for computing political preference among Twitter followers,” Soc. Netw., vol. 36, pp. 177–184, 2014. [7] R. Heatherly, M. Kantarcioglu, and B. Thuraisingham, “Preventing private information inference attacks on social networks,” IEEE Trans. Knowl. Data Eng., vol. 25, no. 8, pp. 1849– 1862, Aug. 2013. [8] C. G. Akcora, B. Carminati, and E. Ferrari, “Risks of friendships on social networks,” in Proc. IEEE Int. Conf. Data Min., 2012,pp. 810–815. [9] K. Liu and E. Terzi, “A framework for computing the privacy scores of users in online social networks,” ACM Trans. Knowl. Discovery Data, vol. 5, no. 1, pp. 6:1–6:30, 2010. [10] L. Fang and K. LeFevre, “Privacy wizards for social networking sites,” in Proc. 19th Int. Conf. World Wide Web, 2010, pp. 351–360. [11] A. C. Squicciarini, D. Lin, S. Sundareswaran, and J. Wede,“Privacy policy inference of user-uploaded images on content sharing sites,” IEEE Trans. Knowl. Data Eng., vol. 27, no. 1,pp. 193–206, Jan. 2015. [12] B. Krishnamurthy, “Privacy and online social networks: Can colorless green ideas sleep furiously?” IEEE Secur. Priv., vol. 11,no. 3, pp. 14–20, May2013.