Improved Privacy Preserving Profile Matching in Online Social Networks
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 1
Abstract
Social networking became popular because of its digital communication technologies tools for extending the social circle of people. Privacy preservation became a significant issue in social networking. This work discussed user profile matching with privacy preservation and introduced a group of profile matching protocols. Online social network with a mixture of public and private user profiles to predict the private attributes of users. We map this problem to a relational classification problem and we propose practical models that use friendship and group membership information (which is often not hidden) to infer sensitive attributes. The key novel idea is that in addition to friendship links, groups can be carriers of significant information. To the best of our knowledge, this is the first work that uses operation-based and group-based classification to study privacy implications in social networks with mixed public and private user profiles.
Authors and Affiliations
Nageswara Rao Yarlagadda| M.Tech research scholar,Asst. Prof in Department Of Computer Science And Engineering, Srkit,Vijayawada, B. Naresh| M.Tech research scholar,Asst. Prof in Department Of Computer Science And Engineering, Srkit,Vijayawada
A Comparison between RISC and CISC Microprocessor Architectures
In this paper, we have made a comparison between RISC (Reduced Instruction Set Computer) and CISC (Complex Instruction Set Computer.) RISC and CISC are two different types of microprocessor architectures. RISC is a c...
Enforce transmission of unnatural power flow of series converter with clamped multi level Neutral point converter
In my paper, enforcing of the unnatural power flow in a transmission grid can be controlled by using Unified power flow control (UPFC) to sustain the maximizing power. In the UPFC the direct power is valuable control...
Probity And Speculations Yielding Model For Multi Clouds
Cloud computing is a latest trend in present scenario. Cloud computing definitely makes sense if your own security is weak, missing features of understanding and privacy. The cloud acts as a big black box, nothing in...
Anomaly Detection on Firewall Logs from Multifold System Based on Email Classification
The greater part of the current frameworks sort the report or firewall logs-corpus in light of the term similitude by discover the archive term relationship. It can't distinguish the calculated comparability or conne...
Message Endorsement and Informant Confidentiality In Wireless Set of Connections
Privacy and security to the information is really given by verification. Verification includes the certain distinguishing proof of one gathering by another gathering or a procedure of affirming a personality .But now...