CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

A Mechanism to Preserve Private Data in Social Networking System

by Lakshmi Vidyadharan, Karthigha M, Mary Treesa Thomas
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 111 - Number 15
Year of Publication: 2015
Authors: Lakshmi Vidyadharan, Karthigha M, Mary Treesa Thomas
10.5120/19617-1515

Lakshmi Vidyadharan, Karthigha M, Mary Treesa Thomas . A Mechanism to Preserve Private Data in Social Networking System. International Journal of Computer Applications. 111, 15 ( February 2015), 35-39. DOI=10.5120/19617-1515

@article{ 10.5120/19617-1515,
author = { Lakshmi Vidyadharan, Karthigha M, Mary Treesa Thomas },
title = { A Mechanism to Preserve Private Data in Social Networking System },
journal = { International Journal of Computer Applications },
issue_date = { February 2015 },
volume = { 111 },
number = { 15 },
month = { February },
year = { 2015 },
issn = { 0975-8887 },
pages = { 35-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume111/number15/19617-1515/ },
doi = { 10.5120/19617-1515 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:48:00.655265+05:30
%A Lakshmi Vidyadharan
%A Karthigha M
%A Mary Treesa Thomas
%T A Mechanism to Preserve Private Data in Social Networking System
%J International Journal of Computer Applications
%@ 0975-8887
%V 111
%N 15
%P 35-39
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Social Networking System (SNS) like Facebook and Twitter have gained more popularity in this new era. It allows millions of individuals to create online profiles and share their personal information with vast networks of friend's. SNS allows third party extensions to access the users' information through Application Programming Interface (API). Since millions of users are using these sites it will lead to privacy problems and leakage of private information. This leakage happens without the knowledge of user, which leads to security problems like identity theft and phishing attack. Unknown user taking the information without our knowledge is called inference attack. This paper uses a permission based protection mechanism which limits the direct access of user data. Once an extension is certified by the user to access data from users' profile, then there is no more control on how it uses the data. Third party application can be built on trusted or un-trusted server. If it is an un-trusted server it will lead to inference attack and malicious user may use the information for unintended purposes and our data will be at risk. The main objective of this project is to enable the security access control scheme against inference attack.

References
  1. Ahmadinejad SH, Fong PW (2013)" On the feasibility of inference attacks by third-party extensions to social network systems", Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, ASIACCS, pp. 161- 166.
  2. Ahmadinejad S, Anwar M, Fong P, "Inference attacks by third party extensions to social network systems" (2011) In: Proceedings of IEEE 9th International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 282-2877.
  3. Chandra D,Antony Rosewelt. L (2014) "Sanitations To Prevent Inference Attack On Social Network Data" , International Conference on Engineering Technology and Science-(ICETS'14) , Volume 3,pp. 1265-1269
  4. Chen Li, Houtan Shirani-Mehr, Xiaochun Yang (2007) "Protecting Individual Information Against Inference Attacks in Data Publishing" vol. 4443, pp. 422-433
  5. Facebook Newsroom. URL http://newsroom. fb. com/.
  6. Gross Ralph, Acquisti Alessandro,(2005)" Information revelation and privacy in online social networks", In: Proceedings of the 4th ACM Workshop on Privacy in the Electronic Society, WPES '05. ACM, pp. 71-80.
  7. He J, Chu W, Liu Z (2006), " Inferring privacy information from social networks" In: Intelligence and Security Informatics, Vol. 3975, pp. 154-165.
  8. Network Security, en. wikipedia. org/wiki/ network security
  9. Raymond Heathery, Murat Kantarcioglu, and Bhavani Thuraisingham(2013) "Preventing Private Information Inference Attacks on Social Networks" IEEE Transactions on Knowledge and Data Engineering, vol. 25 pp. 1849- 1862
  10. Rajadurai . R, Nandini Priya . B, Swetha Sri . P (2014) "Overcoming Information Inference Attacks and Protecting Shared Data in OSN" Volume 4,pp. 414-417
  11. Seyed Hossein Ahmadinejad ,Philip W. L. Fong (2014)" Unintended disclosure of information: Inference attacks by third-party extensions to Social Network Systems" pp. 75-91.
  12. Thomas H. Hinke, Harry S. Delugach and Randall p. Wolf (1997) "Protecting databases from inference attacks" vol. 16, pp. 687-708.
  13. Luo W, Xie Q, Hengartner U. FaceCloak: an architecture for user privacy on social networking sites. In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, Vol. 3 of CSE '09. IEEE Computer Society Press; 2009. pp. 26-33.
  14. Lucas MM, Borisov N. FlyByNight: mitigating the privacy risks of social networking. In: Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society, WPES '08. ACM; 2008. pp. 1-8.
  15. Zheleva E, Getoor L. To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. In: Proceedings of the 18th international conference on World wide web, WWW '09; 2009. pp. 531e40.
Index Terms

Computer Science
Information Sciences

Keywords

Social Networking System Application Programming Interface and Online Social Networking.