SlideShare a Scribd company logo
1 of 4
Download to read offline
Saranya R., Kiruthika A., Sagunthala N.; International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, IJARIIT All Rights Reserved Page | 960
ISSN: 2454-132X
Impact factor: 4.295
(Volume3, Issue1)
Available online at: www.ijariit.com
PriGuard: A Semantic Approach to Detect Privacy Violation in
Online Social Networks
R. Saranya
(Pg Scholar)
Department of computer science
Dhanalakshmi Srinivasan college
College of arts & science for women,
Perambalur.
Bass9600280040@gmail.com
A. Kiruthika
M.C.A, M.Phil,
Department of computer science
Dhanalakshmi Srinivasan college
College of arts & science for women,
Perambalur.
kiruthikaa.17@gmail.com
N. Sagunthala
(Pg Scholar)
Department of computer science
Dhanalakshmi Srinivasan college
College of arts & science for women,
Perambalur.
sagunalla@gmail.com
Abstract-Social network users expect the social networks that they use to preserve their privacy. However, in online social
networks, privacy breaches are not necessarily .In this proposed, first categorizes to protect the consumer that take place in
online social networks. Our proposed approach is based on agent-based representation of a social network, where the agents
manage users’ privacy requirements by creating commitments with the system. The proposed detection algorithm performs
reasoning using the description logic and commitments on a varying depths of social networks. The proposed detection
algorithm performs reasoning using the description logic and commitments on a varying depths of social networks.
Keywords-Social Networks, Facebook, Privacy, Filtering.
INTRODUCTION
Online social systems have become an important part of everyday life. While initial examples were used to share personal content
with friend’s .Generally, these systems serve a large number of users; however each user shares content with only a small subset
of these users. This subset may even change based on the type of the content or the current context of the user For example, a user
might share contact information with all of her acquaintances, while a picture might be shared with friends only. If say, the picture
shows the person sick, the user might not even want all her friends to see it. That is, privacy constraints vary based on person,
content, and context. This requires systems to employ a customizable privacy agreement with their users. However, when that
happens, it is difficult to enforce users’ privacy requirements.
ADVANTAGES
The aim of the present work is therefore to propose and experimentally evaluate an automated system, called Filtered Wall
(FW), able to filter unwanted messages from OSN user walls. To specify Filtering Rules (FRs), by which users can state what
contents, should not be displayed on their walls. Both the security and efficiency of our proposed scheme
Identified the unwanted Content.
Can’t able to leak the information
Providing intimation through the Email
DISADVANTAGES
In the existing Online Social Networks, provide very little support to prevent unwanted messages on user walls. For example,
Face book allows users to state who is allowed to insert messages in their walls (i.e., friends, friends of friends, or defined groups
of friends). However, no content-based preferences are supported and therefore it is not possible to prevent undesired messages,
such as political or vulgar ones, no matter of the user who posts them.
Profile Leakages
No filtering Approach
Saranya R., Kiruthika A., Sagunthala N.; International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, IJARIIT All Rights Reserved Page | 961
Prevention concepts implements
Collusion Attack
Less Intimation
TYPES
 Network scenario
 Filtering rules
 Online setup assistant for FRS thresholds
 Blacklists
 Blocked unwanted message
 Relative frequency
 Mail notification
NETWORK SCENARIO
Given the social network scenario, creators may also be identified by exploiting information on their social graph. This implies to
state conditions on type, depth and trust values of the relationship(s) creators should be involved in order to apply them the
specified rules. All these options are formalized by the notion of creator specification, defined as follows.
FILTERING RULES
In defining the language for FRs specification, we consider three main issues that, in our opinion, should affect a message filtering
decision. First of all, in OSNs like in everyday life, the same message may have different meanings and relevance based on who
writes it. As a consequence, FRs should allow users to state constraints on message creators. Creators on which a FR applies can
be selected on the basis of several different criteria; one of the most relevant is by imposing possible to conditions on their
profile’s attributes. In such a way it is, for instance, define rules applying only to young creators or to creators with a given
religious/political view.
ONLINE SETUP ASSISTANT FOR FRS THRESHOLDS
As mentioned in the previous section, we address the problem of setting thresholds to filter rules, by conceiving and implementing
within FW, an Online Setup Assistant (OSA) procedure. OSA presents the user with a set of messages selected from the dataset
discussed in Section VI-A. For each message, the user tells the system the decision to accept or reject the message. The collection
and processing of user decisions on an adequate set of messages distributed over all the classes allows to compute customized
thresholds representing the user attitude in accepting or rejecting certain contents. Such messages are selected according to the
following process. A certain amount of non neutral messages taken from a fraction of the dataset and not belonging to the
training/test sets, are classified by the ML in order to have, for each message, the second level class membership value
BLACKLISTS
A further component of our system is a BL mechanism to avoid messages from undesired creators, independent from their
contents. BLs are directly managed by the system, which should be able to determine who are the users to be inserted in the BL
and decide when users retention in the BL is finished. To enhance flexibility, such information are given to the system through a
set of rules, hereafter called BL rules. Such rules are not defined by the SNM, therefore they are not meant as general high level
directives to be applied to the whole community. Rather, we decide to let the users themselves, i.e., the wall’s owners to specify
BL rules regulating who has to be banned from their walls and for how long. Therefore, a user might be banned from a wall, by, at
the same time, being able to post in other walls.
BLOCKED UNWANTED MESSAGE
Similar to FRs, our BL rules make the wall owner able to identify users to be blocked according to their profiles as well as their
relationships in the OSN. Therefore, by means of a BL rule, wall owners are for example able to ban from their walls users they
do not directly know (i.e., with which they have only indirect relationships), or users that are friend of a given person as they may
have a bad sopinion of this person. This banning can be adopted for an undetermined time period or for a specific time window.
Moreover, banning criteria may also take into account users’ behavior in the OSN. More precisely, among possible information
denoting users’ bad behavior we have focused on two main measures. The first is related to the principle that if within a given
time interval a user has been inserted into a BL for several times, say greater than a given threshold, he/she might deserve to stay
in the BL for another while, as his/her behavior is not improved. This principle works for those users that have been already
inserted in the considered BL at least one time.
Saranya R., Kiruthika A., Sagunthala N.; International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, IJARIIT All Rights Reserved Page | 962
BLOCKED UNWANTED MESSAGE
 Relative frequency
In contrast, to catch new bad behaviors, we use the Relative Frequency (RF) that let the system be able to detect those users whose
messages continue to fail the FRs. The two measures can be computed either locally, that is, by considering only the messages
and/or the BL of the user specifying the BL rule or globally, that is, by considering all OSN users walls and/or BLs.
MAIL NOTIFICATION
In the mail contribution it enhance the system by creating a instance randomly notifying a message system that should instead be
blocked, or detecting modifications to profile attributes that have been made for the only purpose of defeating the filtering system.
Automatically user will get a mail notification.
DETECTION OF PRIVACY VIOLATIONS
Detection, PRIGUARD uses the domain information, norms, the view information and the violation statements as depicted in A
violation statement is identified for each commitment. PRIGUARD checks the violation statements in the system. A commitment
violation means that: osn failed to bring about the consequent of the commitment. The creditor agent should be notified about its
commitment violations to take an action accordingly.
PRIGUARDTOOL
We develop a tool called PRIGUARDTOOL in Java, which implements the PRIGUARD model described in Section 5. Recall
that each user is represented by an agent. The execution is as follows :(i) The user’s agent takes the privacy constraints of its user.
(ii)Then the agent processes these constraints to generate corresponding commitments. (iii) The agent sends this set of
commitments to PRIGUARDTOOL, which generates the statements wherein these commitments would be violated. (iv) Finally,
PRIGUARDTOOL checks whether these statements hold in an ABSN view, which would mean a violation of privacy and notifies
the requesting agent about the results.
CONCULSION
This paper introduced a meta-model to define online social networks as agent-based social networks to formalize privacy
requirements of users and their violations. In order to understand privacy violations that happen in real online social networks, we
have conducted a survey with Facebook users and categorized the violations in terms of their causation. We further propose
PRIGUARD, an approach that adheres to the proposed meta model and uses description logic to describe the social network
domain and commitments to specify the privacy requirements of the users. Our proposed algorithm in PRIGUARD to detect
privacy violations is both sound and complete. The algorithm can be used before taking an action to check if it will lead to a
violation, thereby preventing it upfront. Conversely, it can be used to do sporadic checks on the system to see if any violations
have occurred. In both cases, the system, together with the user, can work to undo the violations. In the implemented PRIGUARD
in a tool called PRIGUARDTOOL and demonstrated that it can handle example scenarios from various violation categories
successfully. Its performance results on real-life networks are promising.
BLOCKED UNWANTED MESSAGE
USER WALLS ADMIN
UNWANTED
MESSAGE
BLOCK THE
MESSAGE
Saranya R., Kiruthika A., Sagunthala N.; International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, IJARIIT All Rights Reserved Page | 963
ACKNOWLEDGEMENT
First and foremost I bow my heads to LORD almighty for blessing me to complete my paper work successfully by overcoming all
hurdles.
I express my immense gratitude to our Correspondent Shri. A. SRINIVASAN and Vice Chairman Shri. R. KATHIRAVAN our
Secretary Shri. P. NEELRAJ Dhanalakshmi Srinivasan Educational Institutions, Perambalur, for providing the necessary facilited
for completion of this paper.
I admit my heartfelt thanks to my honourable Principal DR. ARUNADINAKARAN our Vice Principal Ms. S. H.
AFROZE Dhanalakshmi Srinivasan college of Arts & Science for Women, Perambalur, who gave me permission to do my
journal.
I profound my sincere thanks to Miss A.KIRUTHIKA M.C.A., M.Phil., Asst. Prof., of the Department of computer
science, Dhanalakshmi Srinivasan college of Arts & Science for Women, Perambalur, for encouraging me to do my paper and
giving valuable suggestion for completion of my journal.
I am very proud of my parent who encourages me to do the same. I am rendering my heartfelt thanks to my friends, who
helped me to complete this paper.
REFERENCES
[1] M. Mondal, P. Druschel, K. P. Gummadi, and A. Mislove, “Beyony Access Control: Managing Online Privacy via Exposure,”
in Proceedings of the Workshop on Useable Security (USEC), February 2014.
[2] R. Fogues, J. M. Such, A. Espinosa, and A. Garcia-Fornes, “Open challenges in relationship-based privacy mechanisms for
social network services,” International Journal of Human-Computer Interaction, vol. 31, no. 5, pp. 350–370, 2015.
[3] F. Baader, D. Calvanese, D. L. McGuinness, D. Nardi, and P. F. Patel-Schneider, Eds., The Description Logic Handbook:
Theory, Implementation, and Applications. New York: Cambridge
[4] C. G. Akcora, B. Carminati, and E. Ferrari, “Risks of friendships on social networks,” in IEEE International Conference on
Data Mining (ICDM), 2012, pp. 810–815.
[5] K. Liu and E. Terzi, “A framework for computing the privacy scores of users in online social networks,” ACM Transactions
on Knowledge Discovery from Data (TKDD), vol. 5, no. 1, pp. 6:1–6:30, 2010.
[6] L. Fang and K. LeFevre, “Privacy wizards for social networking sites,” in Proceedings of the 19th international conference on
World wide web. ACM, 2010, pp. 351–360.
[7] B. Krishnamurthy, “Privacy and online social networks: can colorless green ideas sleep furiously?” IEEE Security Privacy,
vol. 11, no. 3, pp. 14–20, May 2013.
[8] O. Kafalı, A. G¨unay, and P. Yolum, “Detecting and predicting privacy violations in online social networks,” Distributed and
Parallel Databases, vol. 32, no. 1, pp. 161–190, 2014.
[9] A. J. I. Jones and M. Sergot, “On the characterisation of law and computer systems: The normative systems perspective,” in
Deontic Logic in Computer Science: Normative System Specification. John Wiley & Sons, 1993, pp. 275–307.
[10] B. Viswanath, A. Mislove, M. Cha, and K. P. Gummadi, “On the evolution of user Sinteraction in facebook,” in Proceedings
of the 2nd
ACM workshop on Online social networks. ACM, 2009, pp. 37–42.

More Related Content

What's hot

A system to filter unwanted messages from OSN user walls
A system to filter unwanted messages from OSN user wallsA system to filter unwanted messages from OSN user walls
A system to filter unwanted messages from OSN user wallsGajanand Sharma
 
Toward Spam 2.0: An Evaluation of Web 2.0 Anti-Spam Methods
Toward Spam 2.0: An Evaluation of Web 2.0 Anti-Spam MethodsToward Spam 2.0: An Evaluation of Web 2.0 Anti-Spam Methods
Toward Spam 2.0: An Evaluation of Web 2.0 Anti-Spam MethodsPedram Hayati
 
Paper id 152013128
Paper id 152013128Paper id 152013128
Paper id 152013128IJRAT
 
Gam Documentation
Gam DocumentationGam Documentation
Gam DocumentationDavid Chen
 
Trust Based Content Distribution for Peer-ToPeer Overlay Networks
Trust Based Content Distribution for Peer-ToPeer Overlay NetworksTrust Based Content Distribution for Peer-ToPeer Overlay Networks
Trust Based Content Distribution for Peer-ToPeer Overlay NetworksIJNSA Journal
 
Iaetsd efficient filteration of unwanted messages
Iaetsd efficient filteration of unwanted messagesIaetsd efficient filteration of unwanted messages
Iaetsd efficient filteration of unwanted messagesIaetsd Iaetsd
 
Social Tagging Of Multimedia Content A Model
Social Tagging Of Multimedia Content A ModelSocial Tagging Of Multimedia Content A Model
Social Tagging Of Multimedia Content A ModelIJMER
 
An iac approach for detecting profile cloning
An iac approach for detecting profile cloningAn iac approach for detecting profile cloning
An iac approach for detecting profile cloningIJNSA Journal
 
Making Trust Relationship For Peer To Peer System With Secure Protocol
Making Trust Relationship For Peer To Peer System With Secure  ProtocolMaking Trust Relationship For Peer To Peer System With Secure  Protocol
Making Trust Relationship For Peer To Peer System With Secure ProtocolIJMER
 
Overview of Anti-spam filtering Techniques
Overview of Anti-spam filtering TechniquesOverview of Anti-spam filtering Techniques
Overview of Anti-spam filtering TechniquesIRJET Journal
 

What's hot (14)

A system to filter unwanted messages from OSN user walls
A system to filter unwanted messages from OSN user wallsA system to filter unwanted messages from OSN user walls
A system to filter unwanted messages from OSN user walls
 
ONLINE SOCIAL NETWORK
ONLINE SOCIAL NETWORKONLINE SOCIAL NETWORK
ONLINE SOCIAL NETWORK
 
Toward Spam 2.0: An Evaluation of Web 2.0 Anti-Spam Methods
Toward Spam 2.0: An Evaluation of Web 2.0 Anti-Spam MethodsToward Spam 2.0: An Evaluation of Web 2.0 Anti-Spam Methods
Toward Spam 2.0: An Evaluation of Web 2.0 Anti-Spam Methods
 
Paper id 152013128
Paper id 152013128Paper id 152013128
Paper id 152013128
 
Gam Documentation
Gam DocumentationGam Documentation
Gam Documentation
 
Trust Based Content Distribution for Peer-ToPeer Overlay Networks
Trust Based Content Distribution for Peer-ToPeer Overlay NetworksTrust Based Content Distribution for Peer-ToPeer Overlay Networks
Trust Based Content Distribution for Peer-ToPeer Overlay Networks
 
Iaetsd efficient filteration of unwanted messages
Iaetsd efficient filteration of unwanted messagesIaetsd efficient filteration of unwanted messages
Iaetsd efficient filteration of unwanted messages
 
Do4301690695
Do4301690695Do4301690695
Do4301690695
 
Social Tagging Of Multimedia Content A Model
Social Tagging Of Multimedia Content A ModelSocial Tagging Of Multimedia Content A Model
Social Tagging Of Multimedia Content A Model
 
Ijcatr04041017
Ijcatr04041017Ijcatr04041017
Ijcatr04041017
 
An iac approach for detecting profile cloning
An iac approach for detecting profile cloningAn iac approach for detecting profile cloning
An iac approach for detecting profile cloning
 
Ijnsa050203
Ijnsa050203Ijnsa050203
Ijnsa050203
 
Making Trust Relationship For Peer To Peer System With Secure Protocol
Making Trust Relationship For Peer To Peer System With Secure  ProtocolMaking Trust Relationship For Peer To Peer System With Secure  Protocol
Making Trust Relationship For Peer To Peer System With Secure Protocol
 
Overview of Anti-spam filtering Techniques
Overview of Anti-spam filtering TechniquesOverview of Anti-spam filtering Techniques
Overview of Anti-spam filtering Techniques
 

Similar to PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Networks

Privacy Protection Using Formal Logics in Onlne Social Networks
Privacy Protection Using   Formal Logics in Onlne Social NetworksPrivacy Protection Using   Formal Logics in Onlne Social Networks
Privacy Protection Using Formal Logics in Onlne Social NetworksIRJET Journal
 
Need a project proposal for my computer science 3 course. I dont eve.pdf
Need a project proposal for my computer science 3 course. I dont eve.pdfNeed a project proposal for my computer science 3 course. I dont eve.pdf
Need a project proposal for my computer science 3 course. I dont eve.pdfaristogifts99
 
An automatic filtering task in osn using content based approach
An automatic filtering task in osn using content based approachAn automatic filtering task in osn using content based approach
An automatic filtering task in osn using content based approachIAEME Publication
 
Filter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnFilter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnIJSRD
 
Filter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnFilter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnIJSRD
 
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social NetworksMy Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social NetworksIRJET Journal
 
enabling trustworthy service evaluation in service-oriented mobile social net...
enabling trustworthy service evaluation in service-oriented mobile social net...enabling trustworthy service evaluation in service-oriented mobile social net...
enabling trustworthy service evaluation in service-oriented mobile social net...swathi78
 
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...syeda yasmeen
 
Measuring privacy in online social
Measuring privacy in online socialMeasuring privacy in online social
Measuring privacy in online socialijsptm
 
Trustworthy Service Enhancement in Mobile Social Network
Trustworthy Service Enhancement in Mobile Social NetworkTrustworthy Service Enhancement in Mobile Social Network
Trustworthy Service Enhancement in Mobile Social Networkijsrd.com
 
IRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET- Quantify Mutually Dependent Privacy Risks with Locality DataIRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET- Quantify Mutually Dependent Privacy Risks with Locality DataIRJET Journal
 
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesIRJET Journal
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...ijtsrd
 
Intelligent access control policies for Social network site
Intelligent access control policies for Social network siteIntelligent access control policies for Social network site
Intelligent access control policies for Social network siteijcsit
 
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...1crore projects
 
An Anonymous System using Single Sign-on Protocol
An Anonymous System using Single Sign-on ProtocolAn Anonymous System using Single Sign-on Protocol
An Anonymous System using Single Sign-on ProtocolIJERA Editor
 
An Access Control Model for Collaborative Management of Shared Data in OSNS
An Access Control Model for Collaborative Management of Shared Data in OSNSAn Access Control Model for Collaborative Management of Shared Data in OSNS
An Access Control Model for Collaborative Management of Shared Data in OSNSIJMER
 
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBSLPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBSIJNSA Journal
 

Similar to PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Networks (20)

Privacy Protection Using Formal Logics in Onlne Social Networks
Privacy Protection Using   Formal Logics in Onlne Social NetworksPrivacy Protection Using   Formal Logics in Onlne Social Networks
Privacy Protection Using Formal Logics in Onlne Social Networks
 
Need a project proposal for my computer science 3 course. I dont eve.pdf
Need a project proposal for my computer science 3 course. I dont eve.pdfNeed a project proposal for my computer science 3 course. I dont eve.pdf
Need a project proposal for my computer science 3 course. I dont eve.pdf
 
An automatic filtering task in osn using content based approach
An automatic filtering task in osn using content based approachAn automatic filtering task in osn using content based approach
An automatic filtering task in osn using content based approach
 
Filter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnFilter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osn
 
Filter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnFilter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osn
 
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social NetworksMy Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
 
enabling trustworthy service evaluation in service-oriented mobile social net...
enabling trustworthy service evaluation in service-oriented mobile social net...enabling trustworthy service evaluation in service-oriented mobile social net...
enabling trustworthy service evaluation in service-oriented mobile social net...
 
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
 
Measuring privacy in online social
Measuring privacy in online socialMeasuring privacy in online social
Measuring privacy in online social
 
Trustworthy Service Enhancement in Mobile Social Network
Trustworthy Service Enhancement in Mobile Social NetworkTrustworthy Service Enhancement in Mobile Social Network
Trustworthy Service Enhancement in Mobile Social Network
 
IRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET- Quantify Mutually Dependent Privacy Risks with Locality DataIRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
 
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
 
Intelligent access control policies for Social network site
Intelligent access control policies for Social network siteIntelligent access control policies for Social network site
Intelligent access control policies for Social network site
 
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
 
Cb4301449454
Cb4301449454Cb4301449454
Cb4301449454
 
An Anonymous System using Single Sign-on Protocol
An Anonymous System using Single Sign-on ProtocolAn Anonymous System using Single Sign-on Protocol
An Anonymous System using Single Sign-on Protocol
 
D0351020025
D0351020025D0351020025
D0351020025
 
An Access Control Model for Collaborative Management of Shared Data in OSNS
An Access Control Model for Collaborative Management of Shared Data in OSNSAn Access Control Model for Collaborative Management of Shared Data in OSNS
An Access Control Model for Collaborative Management of Shared Data in OSNS
 
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBSLPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
 

Recently uploaded

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Networks

  • 1. Saranya R., Kiruthika A., Sagunthala N.; International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, IJARIIT All Rights Reserved Page | 960 ISSN: 2454-132X Impact factor: 4.295 (Volume3, Issue1) Available online at: www.ijariit.com PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Networks R. Saranya (Pg Scholar) Department of computer science Dhanalakshmi Srinivasan college College of arts & science for women, Perambalur. Bass9600280040@gmail.com A. Kiruthika M.C.A, M.Phil, Department of computer science Dhanalakshmi Srinivasan college College of arts & science for women, Perambalur. kiruthikaa.17@gmail.com N. Sagunthala (Pg Scholar) Department of computer science Dhanalakshmi Srinivasan college College of arts & science for women, Perambalur. sagunalla@gmail.com Abstract-Social network users expect the social networks that they use to preserve their privacy. However, in online social networks, privacy breaches are not necessarily .In this proposed, first categorizes to protect the consumer that take place in online social networks. Our proposed approach is based on agent-based representation of a social network, where the agents manage users’ privacy requirements by creating commitments with the system. The proposed detection algorithm performs reasoning using the description logic and commitments on a varying depths of social networks. The proposed detection algorithm performs reasoning using the description logic and commitments on a varying depths of social networks. Keywords-Social Networks, Facebook, Privacy, Filtering. INTRODUCTION Online social systems have become an important part of everyday life. While initial examples were used to share personal content with friend’s .Generally, these systems serve a large number of users; however each user shares content with only a small subset of these users. This subset may even change based on the type of the content or the current context of the user For example, a user might share contact information with all of her acquaintances, while a picture might be shared with friends only. If say, the picture shows the person sick, the user might not even want all her friends to see it. That is, privacy constraints vary based on person, content, and context. This requires systems to employ a customizable privacy agreement with their users. However, when that happens, it is difficult to enforce users’ privacy requirements. ADVANTAGES The aim of the present work is therefore to propose and experimentally evaluate an automated system, called Filtered Wall (FW), able to filter unwanted messages from OSN user walls. To specify Filtering Rules (FRs), by which users can state what contents, should not be displayed on their walls. Both the security and efficiency of our proposed scheme Identified the unwanted Content. Can’t able to leak the information Providing intimation through the Email DISADVANTAGES In the existing Online Social Networks, provide very little support to prevent unwanted messages on user walls. For example, Face book allows users to state who is allowed to insert messages in their walls (i.e., friends, friends of friends, or defined groups of friends). However, no content-based preferences are supported and therefore it is not possible to prevent undesired messages, such as political or vulgar ones, no matter of the user who posts them. Profile Leakages No filtering Approach
  • 2. Saranya R., Kiruthika A., Sagunthala N.; International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, IJARIIT All Rights Reserved Page | 961 Prevention concepts implements Collusion Attack Less Intimation TYPES  Network scenario  Filtering rules  Online setup assistant for FRS thresholds  Blacklists  Blocked unwanted message  Relative frequency  Mail notification NETWORK SCENARIO Given the social network scenario, creators may also be identified by exploiting information on their social graph. This implies to state conditions on type, depth and trust values of the relationship(s) creators should be involved in order to apply them the specified rules. All these options are formalized by the notion of creator specification, defined as follows. FILTERING RULES In defining the language for FRs specification, we consider three main issues that, in our opinion, should affect a message filtering decision. First of all, in OSNs like in everyday life, the same message may have different meanings and relevance based on who writes it. As a consequence, FRs should allow users to state constraints on message creators. Creators on which a FR applies can be selected on the basis of several different criteria; one of the most relevant is by imposing possible to conditions on their profile’s attributes. In such a way it is, for instance, define rules applying only to young creators or to creators with a given religious/political view. ONLINE SETUP ASSISTANT FOR FRS THRESHOLDS As mentioned in the previous section, we address the problem of setting thresholds to filter rules, by conceiving and implementing within FW, an Online Setup Assistant (OSA) procedure. OSA presents the user with a set of messages selected from the dataset discussed in Section VI-A. For each message, the user tells the system the decision to accept or reject the message. The collection and processing of user decisions on an adequate set of messages distributed over all the classes allows to compute customized thresholds representing the user attitude in accepting or rejecting certain contents. Such messages are selected according to the following process. A certain amount of non neutral messages taken from a fraction of the dataset and not belonging to the training/test sets, are classified by the ML in order to have, for each message, the second level class membership value BLACKLISTS A further component of our system is a BL mechanism to avoid messages from undesired creators, independent from their contents. BLs are directly managed by the system, which should be able to determine who are the users to be inserted in the BL and decide when users retention in the BL is finished. To enhance flexibility, such information are given to the system through a set of rules, hereafter called BL rules. Such rules are not defined by the SNM, therefore they are not meant as general high level directives to be applied to the whole community. Rather, we decide to let the users themselves, i.e., the wall’s owners to specify BL rules regulating who has to be banned from their walls and for how long. Therefore, a user might be banned from a wall, by, at the same time, being able to post in other walls. BLOCKED UNWANTED MESSAGE Similar to FRs, our BL rules make the wall owner able to identify users to be blocked according to their profiles as well as their relationships in the OSN. Therefore, by means of a BL rule, wall owners are for example able to ban from their walls users they do not directly know (i.e., with which they have only indirect relationships), or users that are friend of a given person as they may have a bad sopinion of this person. This banning can be adopted for an undetermined time period or for a specific time window. Moreover, banning criteria may also take into account users’ behavior in the OSN. More precisely, among possible information denoting users’ bad behavior we have focused on two main measures. The first is related to the principle that if within a given time interval a user has been inserted into a BL for several times, say greater than a given threshold, he/she might deserve to stay in the BL for another while, as his/her behavior is not improved. This principle works for those users that have been already inserted in the considered BL at least one time.
  • 3. Saranya R., Kiruthika A., Sagunthala N.; International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, IJARIIT All Rights Reserved Page | 962 BLOCKED UNWANTED MESSAGE  Relative frequency In contrast, to catch new bad behaviors, we use the Relative Frequency (RF) that let the system be able to detect those users whose messages continue to fail the FRs. The two measures can be computed either locally, that is, by considering only the messages and/or the BL of the user specifying the BL rule or globally, that is, by considering all OSN users walls and/or BLs. MAIL NOTIFICATION In the mail contribution it enhance the system by creating a instance randomly notifying a message system that should instead be blocked, or detecting modifications to profile attributes that have been made for the only purpose of defeating the filtering system. Automatically user will get a mail notification. DETECTION OF PRIVACY VIOLATIONS Detection, PRIGUARD uses the domain information, norms, the view information and the violation statements as depicted in A violation statement is identified for each commitment. PRIGUARD checks the violation statements in the system. A commitment violation means that: osn failed to bring about the consequent of the commitment. The creditor agent should be notified about its commitment violations to take an action accordingly. PRIGUARDTOOL We develop a tool called PRIGUARDTOOL in Java, which implements the PRIGUARD model described in Section 5. Recall that each user is represented by an agent. The execution is as follows :(i) The user’s agent takes the privacy constraints of its user. (ii)Then the agent processes these constraints to generate corresponding commitments. (iii) The agent sends this set of commitments to PRIGUARDTOOL, which generates the statements wherein these commitments would be violated. (iv) Finally, PRIGUARDTOOL checks whether these statements hold in an ABSN view, which would mean a violation of privacy and notifies the requesting agent about the results. CONCULSION This paper introduced a meta-model to define online social networks as agent-based social networks to formalize privacy requirements of users and their violations. In order to understand privacy violations that happen in real online social networks, we have conducted a survey with Facebook users and categorized the violations in terms of their causation. We further propose PRIGUARD, an approach that adheres to the proposed meta model and uses description logic to describe the social network domain and commitments to specify the privacy requirements of the users. Our proposed algorithm in PRIGUARD to detect privacy violations is both sound and complete. The algorithm can be used before taking an action to check if it will lead to a violation, thereby preventing it upfront. Conversely, it can be used to do sporadic checks on the system to see if any violations have occurred. In both cases, the system, together with the user, can work to undo the violations. In the implemented PRIGUARD in a tool called PRIGUARDTOOL and demonstrated that it can handle example scenarios from various violation categories successfully. Its performance results on real-life networks are promising. BLOCKED UNWANTED MESSAGE USER WALLS ADMIN UNWANTED MESSAGE BLOCK THE MESSAGE
  • 4. Saranya R., Kiruthika A., Sagunthala N.; International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, IJARIIT All Rights Reserved Page | 963 ACKNOWLEDGEMENT First and foremost I bow my heads to LORD almighty for blessing me to complete my paper work successfully by overcoming all hurdles. I express my immense gratitude to our Correspondent Shri. A. SRINIVASAN and Vice Chairman Shri. R. KATHIRAVAN our Secretary Shri. P. NEELRAJ Dhanalakshmi Srinivasan Educational Institutions, Perambalur, for providing the necessary facilited for completion of this paper. I admit my heartfelt thanks to my honourable Principal DR. ARUNADINAKARAN our Vice Principal Ms. S. H. AFROZE Dhanalakshmi Srinivasan college of Arts & Science for Women, Perambalur, who gave me permission to do my journal. I profound my sincere thanks to Miss A.KIRUTHIKA M.C.A., M.Phil., Asst. Prof., of the Department of computer science, Dhanalakshmi Srinivasan college of Arts & Science for Women, Perambalur, for encouraging me to do my paper and giving valuable suggestion for completion of my journal. I am very proud of my parent who encourages me to do the same. I am rendering my heartfelt thanks to my friends, who helped me to complete this paper. REFERENCES [1] M. Mondal, P. Druschel, K. P. Gummadi, and A. Mislove, “Beyony Access Control: Managing Online Privacy via Exposure,” in Proceedings of the Workshop on Useable Security (USEC), February 2014. [2] R. Fogues, J. M. Such, A. Espinosa, and A. Garcia-Fornes, “Open challenges in relationship-based privacy mechanisms for social network services,” International Journal of Human-Computer Interaction, vol. 31, no. 5, pp. 350–370, 2015. [3] F. Baader, D. Calvanese, D. L. McGuinness, D. Nardi, and P. F. Patel-Schneider, Eds., The Description Logic Handbook: Theory, Implementation, and Applications. New York: Cambridge [4] C. G. Akcora, B. Carminati, and E. Ferrari, “Risks of friendships on social networks,” in IEEE International Conference on Data Mining (ICDM), 2012, pp. 810–815. [5] K. Liu and E. Terzi, “A framework for computing the privacy scores of users in online social networks,” ACM Transactions on Knowledge Discovery from Data (TKDD), vol. 5, no. 1, pp. 6:1–6:30, 2010. [6] L. Fang and K. LeFevre, “Privacy wizards for social networking sites,” in Proceedings of the 19th international conference on World wide web. ACM, 2010, pp. 351–360. [7] B. Krishnamurthy, “Privacy and online social networks: can colorless green ideas sleep furiously?” IEEE Security Privacy, vol. 11, no. 3, pp. 14–20, May 2013. [8] O. Kafalı, A. G¨unay, and P. Yolum, “Detecting and predicting privacy violations in online social networks,” Distributed and Parallel Databases, vol. 32, no. 1, pp. 161–190, 2014. [9] A. J. I. Jones and M. Sergot, “On the characterisation of law and computer systems: The normative systems perspective,” in Deontic Logic in Computer Science: Normative System Specification. John Wiley & Sons, 1993, pp. 275–307. [10] B. Viswanath, A. Mislove, M. Cha, and K. P. Gummadi, “On the evolution of user Sinteraction in facebook,” in Proceedings of the 2nd ACM workshop on Online social networks. ACM, 2009, pp. 37–42.