SlideShare a Scribd company logo
1 of 3
Ki-Tech Solutions
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND
TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB
PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU.
CELL: +91 888-379-0633 | +91 979-000-9190
Mail to: kitechsolutions.in@gmail.com
A TRUST-BASED PRIVACY-PRESERVING FRIEND
RECOMMENDATION SCHEME FOR ONLINE SOCIAL NETWORKS
ABSTRACT
Online Social Networks (OSNs), which attract thousands of million people to use every
day, greatly extend OSN users’ social circles by friend recommendations. OSN users’ existing
social relationship can be characterized as 1-hop trust relationship, and further establish a multi-
hop trust chain during the recommendation process. As the same as what people usually
experience in the daily life, the social relationship in cyberspaces are potentially formed by OSN
users’ shared attributes, e.g., colleagues, family members, or classmates, which indicates the
attribute-based recommendation process would lead to more fine-grained social relationships
between strangers. Unfortunately, privacy concerns raised in the recommendation process
impede the expansion of OSN users’ friend circle. Some OSN users refuse to disclose their
identities and their friends’ information to the public domain. In this paper, we propose a trust
based privacy-preserving friend recommendation scheme for OSNs, where OSN users apply
their attributes to find matched friends, and establish social relationships with strangers via a
multi-hop trust chain. Based on trace-driven experimental results and security analysis, we have
shown the feasibility and privacy preservation of our proposed scheme.
Ki-Tech Solutions
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND
TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB
PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU.
CELL: +91 888-379-0633 | +91 979-000-9190
Mail to: kitechsolutions.in@gmail.com
EXISTING SYSTEM
On the one hand, directly asking recommendations to strangers or a non close friend not
only reveals Alice’s identity, but also reveals her health condition and medical information. Even
worse, traditional recommendation approaches applying identity to recommend strangers will
disclose OSN users’ social relationships to the public, which impede patients from utilizing it,
and also decrease the possibility of establishing the multi-hop trust chain if one of OSN users on
the chain returns a negative result. On the other hand, current approaches cannot achieve the
fine-grained and context-aware results automatically, due to the fact that OSN users have to
determine the recommended friends based on their own judgments on the recommendation
query. As in our example, Alice would like to ask for help from her friends who work in a
hospital, but not a truck driver. To overcome the above issue, we consider the possibility of
singsong users’ social attributes to establish the multi-hop trust chain based on each context-
aware 1-hop trust relationship, where most of trust relationships are formed and strengthened by
the shared social attributes.
DISADVANTAGES
1. Privacy concerns raised in the recommendation process impede the expansion of
OSN users’ friend circle
2. Some OSN users refuse to disclose their identities and their friend’s information
to the public domain.
Ki-Tech Solutions
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND
TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB
PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU.
CELL: +91 888-379-0633 | +91 979-000-9190
Mail to: kitechsolutions.in@gmail.com
PROPOSED SYSTEM
In this paper, design a light-weighted privacy-preserving friend recommendation scheme
for OSNs by utilizing both users’ social attributes and their existing trust relationships to
establish a multi-hop trust chain between strangers. In our scheme, we jointly consider privacy
leakages and preservation approaches regarding the identity, social attributes, and their trust
relationships of OSN users during the recommendation process. By trace-driven experimental
results, we demonstrate both the security and efficiency of our proposed scheme
ADVANTAGES
1. Based on the 1-hop trust relationships, we extend existing friendships to multi-
hop trust chains without compromising recommenders identity privacy
2. Extensive trace-driven experiment are deployed to verify the performance of our
scheme in terms of security, efficiency, and feasibility.

More Related Content

Viewers also liked

Final EU Chair Letter-Published
Final EU Chair Letter-PublishedFinal EU Chair Letter-Published
Final EU Chair Letter-Published
Ryan Van Slyke
 
Manar Ghanim's resume 17
Manar Ghanim's resume 17Manar Ghanim's resume 17
Manar Ghanim's resume 17
Manar Ghanim
 

Viewers also liked (11)

Презентация о фонде
Презентация о фондеПрезентация о фонде
Презентация о фонде
 
Evaluatie van Sportevenementen
Evaluatie van SportevenementenEvaluatie van Sportevenementen
Evaluatie van Sportevenementen
 
İnovatif Kimya Dergisi Sayı-4
İnovatif Kimya Dergisi Sayı-4İnovatif Kimya Dergisi Sayı-4
İnovatif Kimya Dergisi Sayı-4
 
trabajo jose rossana
trabajo jose rossanatrabajo jose rossana
trabajo jose rossana
 
Mf0016 treasury management
Mf0016 treasury managementMf0016 treasury management
Mf0016 treasury management
 
SHPE Journey to success
SHPE Journey to successSHPE Journey to success
SHPE Journey to success
 
İnovatif Kimya Dergisi Sayı-9
İnovatif Kimya Dergisi Sayı-9İnovatif Kimya Dergisi Sayı-9
İnovatif Kimya Dergisi Sayı-9
 
Universidad fermin tor2
Universidad fermin tor2Universidad fermin tor2
Universidad fermin tor2
 
Final EU Chair Letter-Published
Final EU Chair Letter-PublishedFinal EU Chair Letter-Published
Final EU Chair Letter-Published
 
Manar Ghanim's resume 17
Manar Ghanim's resume 17Manar Ghanim's resume 17
Manar Ghanim's resume 17
 
Prediction of Contaminant Plumes (Shapes, Spatial Moments and Macro-dispersio...
Prediction of Contaminant Plumes (Shapes, Spatial Moments and Macro-dispersio...Prediction of Contaminant Plumes (Shapes, Spatial Moments and Macro-dispersio...
Prediction of Contaminant Plumes (Shapes, Spatial Moments and Macro-dispersio...
 

More from kitechsolutions

More from kitechsolutions (9)

Identity based encryption
Identity based encryptionIdentity based encryption
Identity based encryption
 
Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (Ia...
Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (Ia...Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (Ia...
Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (Ia...
 
BDCaM: Big Data for Context-aware Monitoring - A Personalized Knowledge Disco...
BDCaM: Big Data for Context-aware Monitoring - A Personalized Knowledge Disco...BDCaM: Big Data for Context-aware Monitoring - A Personalized Knowledge Disco...
BDCaM: Big Data for Context-aware Monitoring - A Personalized Knowledge Disco...
 
Privacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storagePrivacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storage
 
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
  Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation  Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
 
Statistical Dissemination Control in Large Machine-to-Machine Communication N...
Statistical Dissemination Control in Large Machine-to-Machine Communication N...Statistical Dissemination Control in Large Machine-to-Machine Communication N...
Statistical Dissemination Control in Large Machine-to-Machine Communication N...
 
Toward Transparent Coexistence for Multihop Secondary Cognitive Radio Networks
Toward Transparent Coexistence for Multihop Secondary Cognitive Radio NetworksToward Transparent Coexistence for Multihop Secondary Cognitive Radio Networks
Toward Transparent Coexistence for Multihop Secondary Cognitive Radio Networks
 
Wormhole attack detection algorithms
Wormhole attack detection algorithmsWormhole attack detection algorithms
Wormhole attack detection algorithms
 
BDCAM: big data for context-aware Monitoring
BDCAM: big data for context-aware MonitoringBDCAM: big data for context-aware Monitoring
BDCAM: big data for context-aware Monitoring
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Recently uploaded (20)

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 

A trust based privacy-preserving friend recommendation scheme for online social networks

  • 1. Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. CELL: +91 888-379-0633 | +91 979-000-9190 Mail to: kitechsolutions.in@gmail.com A TRUST-BASED PRIVACY-PRESERVING FRIEND RECOMMENDATION SCHEME FOR ONLINE SOCIAL NETWORKS ABSTRACT Online Social Networks (OSNs), which attract thousands of million people to use every day, greatly extend OSN users’ social circles by friend recommendations. OSN users’ existing social relationship can be characterized as 1-hop trust relationship, and further establish a multi- hop trust chain during the recommendation process. As the same as what people usually experience in the daily life, the social relationship in cyberspaces are potentially formed by OSN users’ shared attributes, e.g., colleagues, family members, or classmates, which indicates the attribute-based recommendation process would lead to more fine-grained social relationships between strangers. Unfortunately, privacy concerns raised in the recommendation process impede the expansion of OSN users’ friend circle. Some OSN users refuse to disclose their identities and their friends’ information to the public domain. In this paper, we propose a trust based privacy-preserving friend recommendation scheme for OSNs, where OSN users apply their attributes to find matched friends, and establish social relationships with strangers via a multi-hop trust chain. Based on trace-driven experimental results and security analysis, we have shown the feasibility and privacy preservation of our proposed scheme.
  • 2. Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. CELL: +91 888-379-0633 | +91 979-000-9190 Mail to: kitechsolutions.in@gmail.com EXISTING SYSTEM On the one hand, directly asking recommendations to strangers or a non close friend not only reveals Alice’s identity, but also reveals her health condition and medical information. Even worse, traditional recommendation approaches applying identity to recommend strangers will disclose OSN users’ social relationships to the public, which impede patients from utilizing it, and also decrease the possibility of establishing the multi-hop trust chain if one of OSN users on the chain returns a negative result. On the other hand, current approaches cannot achieve the fine-grained and context-aware results automatically, due to the fact that OSN users have to determine the recommended friends based on their own judgments on the recommendation query. As in our example, Alice would like to ask for help from her friends who work in a hospital, but not a truck driver. To overcome the above issue, we consider the possibility of singsong users’ social attributes to establish the multi-hop trust chain based on each context- aware 1-hop trust relationship, where most of trust relationships are formed and strengthened by the shared social attributes. DISADVANTAGES 1. Privacy concerns raised in the recommendation process impede the expansion of OSN users’ friend circle 2. Some OSN users refuse to disclose their identities and their friend’s information to the public domain.
  • 3. Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. CELL: +91 888-379-0633 | +91 979-000-9190 Mail to: kitechsolutions.in@gmail.com PROPOSED SYSTEM In this paper, design a light-weighted privacy-preserving friend recommendation scheme for OSNs by utilizing both users’ social attributes and their existing trust relationships to establish a multi-hop trust chain between strangers. In our scheme, we jointly consider privacy leakages and preservation approaches regarding the identity, social attributes, and their trust relationships of OSN users during the recommendation process. By trace-driven experimental results, we demonstrate both the security and efficiency of our proposed scheme ADVANTAGES 1. Based on the 1-hop trust relationships, we extend existing friendships to multi- hop trust chains without compromising recommenders identity privacy 2. Extensive trace-driven experiment are deployed to verify the performance of our scheme in terms of security, efficiency, and feasibility.