CFP last date
20 January 2025
Reseach Article

User Intended Privacy Preserving Models in Online Social Networks

by Amal Twinkle Mathew, S.saravana Kumar, Karthikeyan. M
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 113 - Number 15
Year of Publication: 2015
Authors: Amal Twinkle Mathew, S.saravana Kumar, Karthikeyan. M
10.5120/19903-2014

Amal Twinkle Mathew, S.saravana Kumar, Karthikeyan. M . User Intended Privacy Preserving Models in Online Social Networks. International Journal of Computer Applications. 113, 15 ( March 2015), 28-32. DOI=10.5120/19903-2014

@article{ 10.5120/19903-2014,
author = { Amal Twinkle Mathew, S.saravana Kumar, Karthikeyan. M },
title = { User Intended Privacy Preserving Models in Online Social Networks },
journal = { International Journal of Computer Applications },
issue_date = { March 2015 },
volume = { 113 },
number = { 15 },
month = { March },
year = { 2015 },
issn = { 0975-8887 },
pages = { 28-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume113/number15/19903-2014/ },
doi = { 10.5120/19903-2014 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:51:01.648031+05:30
%A Amal Twinkle Mathew
%A S.saravana Kumar
%A Karthikeyan. M
%T User Intended Privacy Preserving Models in Online Social Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 113
%N 15
%P 28-32
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The proposed system introduces new social network privacy management models and it measures their human effects. Here it introduces a mechanism using clustering techniques which helps users to group their friends using policy management. Then it introduces new privacy management model which will give policies to other friends to find similar friends in the network. And thereby explored various ways that help users to find example friends. In addition, it will help to find privacy management models which can be further enhanced and also it helps to detect privacy sentiment of user. Assistant friend grouping will be done for effective friendship establishment. In a network user privacy will be maintained by setting privacy techniques. Privacy management models can be routinely customized to the privacy sentiment and done according to the needs of the user.

References
  1. Acquisti. A and Gross. R(2006), "Imagined Communities: Awareness, Information Sharing and Privacy on the Facebook," Proc. Sixth Int'l Conf. Privacy Enhancing Technologies (PET '06.
  2. Acquisti. A and Grossklags. J(2005), "Privacy and Rationality in Individual Decision Making," IEEE Security & Privacy, vol. 3, no. 1, pp. 26-33.
  3. Besmer. A, Watson. J(2010), and H. R. Lipford, "The Impact of Social Navigation on Privacy Policy Configuration," Proc. Symp. Usable Privacy and Security,
  4. Bonneau. J and Preibusch. S(2009), "The Privacy Jungle: On the Market for Data Protection in Social Networks," Proc. Workshop the Economics of Information Security (WEIS '09).
  5. Carminative. B, Ferrari. E(2009), Heatherly. R, Kantarcioglu. M, and Thuraisingham. B, "A Semantic Web Based Framework for Social Network Access Control," Proc. Symp. Access Control Models and TechnologieS.
  6. Carminati. B, Ferrari. E, Heatherly. R, Kantarcioglu. M, and Thuraisingham. B. M(2011), "Semantic Web-Based Social Network Access Control," Computers & Security, vol. 30, pp. 108-115.
  7. Cheng. Y, Park. P, and Sandhu. R. S(2012), "A User-to-User Relationship- Based Access Control Model for Online Social Networks," Proc. 26th Ann. IFIP WG 11. 3 Conf. Data and Applications Security and Privacy.
  8. Clauset. A,Newman. M and Moore. C(2004), "Finding Community Structure in Very Large Networks," Physical Rev. E, vol. 70, p. 066111.
  9. Cutrell. E, Czerwinski. M, and Horvitz. E(2001), "Notification, Disruption, and Memory: Effects of Messaging Interruptions on Memory and Performance," Proc. Conf. Human Computer Interaction.
  10. Dhamija and Perrig. A(2000), "Deja Vu: A User Study Using Images for Authentication," Proc. USENIX Security Symp.
  11. Dunphy. P, Heiner. A. P, and Asokan. N(2010), "A Closer Look at Recognition-Based Graphical Passwords on Mobile Devices," Proc. Symp. Usable Privacy and Security.
  12. Dwyer. C, Hiltz. S. R, and Passerini. K(2007), "Trust and Privacy Concern within Social Networking Sites: A Comparison of Facebook and MySpace," Proc. Am. Conf. Information Systems (AMCIS '07).
  13. Fang. L and LeFevre. K(2010), "Privacy Wizards for Social Networking Sites," Proc. Conf. World Wide Web.
  14. Ferraiolo. D and Kuhn. R(1992), "Role-Based Access Control," Proc. Nat'l Computer Security Conf.
  15. Fong. P. W(2011), "Relationship-Based Access Control: Protection Model and Policy Language," Proc. Conf. Data and Application Security and Privacy.
Index Terms

Computer Science
Information Sciences

Keywords

OSN online social network CNM clauset Newman's moore