Open Access Open Access  Restricted Access Subscription Access

Improving Data and Identity Privacy in Online Social Networks

S. Meera, R. Sharmikha Sree

Abstract


Facebook, MySpace, Twitter, Orkut, Linkedin, and other social networking sites are increasingly popular. Users can share details about themselves and their lives on these networks, as well as connect with friends and colleagues. Some of the information revealed in these networks, however, should be kept private and not made public. Identity thieves, scam artists, and stalkers can all benefit from the availability of personal information on the internet. As a result, privacy in social networks is a significant factor. As a result, it is preferable to assign privileges to each object we share in social media. However, the existing system is inefficient because the user who wishes to share a "post" is unaware of the privileges that have been assigned to that post. Furthermore, message transmission is completely transparent and vulnerable to hacking. In the proposed system, a "mutually shared algorithm" is introduced to allow users to request post access, and all messages are encrypted using the BASE-64 algorithm for security.


Full Text:

PDF

References


Kökciyan, N., & Yolum, P. (2016). P ri g uard: A semantic approach to detect privacy violations in online social networks. IEEE Transactions on Knowledge and Data Engineering, 28(10), 2724-2737.

Liang, K., Liu, J. K., Lu, R., & Wong, D. S. (2014). Privacy concerns for photo sharing in online social networks. IEEE Internet Computing, 19(2), 58-63.

Chen, J., Ping, J. W., Xu, Y., & Tan, B. C. (2015). Information privacy concern about peer disclosure in online social networks. IEEE Transactions on Engineering Management, 62(3), 311-324.

Wong, K., Wong, A., Yeung, A., Fan, W., & Tang, S. K. (2014). Trust and privacy exploitation in online social networks. IT professional, 16(5), 28-33.

Fogues, R., Such, J. M., Espinosa, A., & Garcia-Fornes, A. (2015). Open challenges in relationship-based privacy mechanisms for social network services. International Journal of Human-Computer Interaction, 31(5), 350-370..

Heatherly, R., Kantarcioglu, M., & Thuraisingham, B. (2012). Preventing private information inference attacks on social networks. IEEE Transactions on Knowledge and Data Engineering, 25(8), 1849-1862.

Solove, D. J. (2008). Understanding privacy..

Baader, F., Calvanese, D., McGuinness, D., Patel-Schneider, P., & Nardi, D. (Eds.). (2003). The description logic handbook: Theory, implementation and applications. Cambridge university press..

Meera, S., Sree, R. S., & Valarmathi, K. Effective Shopping Method for Visually Impaired People using Optical Character Recognition.

Sa, M., Rb, S. S., Ac, K. R., Manasviniic, S. R., Vd, H., & Valarmathie, K. (2021). IOT Based Weather Reporting System Using Arduino and Node MCU. Smart Intelligent Computing and Communication Technology, 38, 209.

Kumar, S. D., & Soundarapandiyan, K. (2022). The Effectiveness of Product Placement in Tamil movies: A Study with Reference to the State of Tamil Nadu, India. South Asian Journal of Social Sciences and Humanities, 3(5), 28-41.

Kumar, S. D., Soundarapandiyan, K., & Meera, S. (2022). Sentience of Career Opportunities and Career Development using Social Media–A Study with Reference to Tamil Nadu. Journal of Big Data Technology and Business Analytics, 1(1), 7-14.


Refbacks

  • There are currently no refbacks.