You are on page 1of 4

IJRECS @ Feb Mar 2016, V-5, I-3

ISSN-2321-5485 (Online)
ISSN-2321-5784 (Print)

Security and Social in Preventing Private Information Inference Attacks


on Social Networks
G. Venkata Krishna1, R. S. Murali Nath2
1
M.Tech Student, Dept of CSE, Malla Reddy Engineering College, Hyderabad, India
2
Associate Professor, Dept of CSE, Malla Reddy Engineering College, Hyderabad, India
1
venkatakrishna2567.goda@gmail.com, 2rsmuralinath@mrec.ac.in
Abstract: Technology and its social service are
the one where these days market moves on and
the respective in the Horizon of the social
security. If we consider the technology with its
jewel of the social activity like Face book, Point
cognitive science Information technology will
have to make high level of demanding journey; in
that aspect we consider the best of the technical
revolution in the Social media where we share the
thoughts , informational to many more . If we
Consider the Face book like such popular network
sharing side leads us to the best of research ,
where technological Face book is high level to
manage such huge volume of Data effective and
efficiently, But Lacking with the point f loop
whole is the Information of Public and Private and
Preventive social Inference of the Aspect. In the
Modern era of the social globalized where we can
call as the information world leads to the next
level of the technology innovation.
Index TermsSocial network analysis, data
mining, social network privacy

with decentralized systems. For instance, the


authors state that more control over personal data
almost inevitably translates to more decisions,
which leads to cognitive overload, but this is not
a reason to avoid decentralized architectures.
What Facebook does not have is an incentive to
explore alternative schemes for privacy policy
configuration if those schemes hinder a free flow
of information within the network. In contrast, a
distributed system that does not extract monetary
value from user data has every incentive to
combat cognitive overload by accurately
capturing user intent. Keeping things looking
forward for the best of the illustration is the social
media.

1. Introduction
In the Socialistic internet media, registered
members form the nodes of the conversational
network. And, when two members of a project
group post in the same thread, a relationship
between those two members, or a link between
those two nodes, exists. Finally, the several
orthogonal cognitive considerations in social
networks generally, describing them as problems
227

www.ijrecs.com

Fig.1.1. Illustration of the Social Media and


Role

IJRECS @ Feb Mar 2016, V-5, I-3


ISSN-2321-5485 (Online)
ISSN-2321-5784 (Print)
Centralized services such as Facebook provide
very detailed and fine-grained control over some
personal data, capable of causing just as much
cognitive overload as an equivalent decision
matrix in a decentralized system.
2. Related Work
Data protection is a universal set of rules that
are written mostly from legal and organizational
perspective.The shortcomings of data
protection legislation within the countries where
they apply, or across borders, and the
impossibility of such universally applicable
regulation to cover user and community concerns
has been raised as critique points of current data
protection legislation. Further, legislation usually
follows behind technological changes and its
applicability can be challenged with new
technology.

228

www.ijrecs.com

Fig.2.1. Privacy of the Platform based Data


sender
All of these points provide us with the motivation
to look for an approach to privacy requirements
engineering that considers privacy concerns and
requirements beyond those necessary for legal
compliance. Ontology is based on the fact that
requirements-related information is elicited
through the communication.
3. Methodology
Twitter application environment we can post
the message with 140 characters. Each tweet size
is 1KB. It consists of useful and semantic text
data information. Tweet information contains
users account and location. One user connects
with many users in social networking site
environment.
Taken social network theory into account the
organizational network structure affects team
viability and team task performance. Team
viability involves the committed of team members
to stay together, where team task performance
involves attaining the goals of a team. Team
viability and team task performance can be
conceived as success measures of teams. And
Harrison noted although these two dimensions of
success are conceptually distinct, in reality there
is a close connection and cross-correlation
between team task performance and team
viability. In addition they found teams with
central leaders, and teams central in a network full
of other teams, tend to be better performers.
Todays OSNs provide rich platforms for thirdparty social applications.

IJRECS @ Feb Mar 2016, V-5, I-3


ISSN-2321-5485 (Online)
ISSN-2321-5784 (Print)

Fig.3.1. Model View of the Social Security with Respect information Privacy
Application functionality is supported by
private user information, often served in greater
quantities than actually required. Safeguards
against misuse rely heavily on legal rather than
technical protection. Felt and Evans, in their
2008 study of 150 Facebook applications, found
that 90% of applications had no need of private
user data, but were being given it anyway.
Several applications used information in ways
that contravened Facebooks Terms of Service,
making information visible to users who would
normally be unable to view it. Further
information include address books of users
229

www.ijrecs.com

imported
from
other
services,
email
communications with non-users, the information
collected from mobile devices like smart
phones, information that the providers scrape
from other information sources and link to user
profiles, as well as information that partner
service providers share about the users
behaviors on their sites with the SNS service
provider. Surveillance information includes all
of the above and any aggregated or anonymized
derivatives thereof. SNS providers define a
minimal subset of this information as personal
data. We discuss the privacy concerns raised by

IJRECS @ Feb Mar 2016, V-5, I-3


ISSN-2321-5485 (Online)
ISSN-2321-5784 (Print)
the different stakeholders with respect to the
surveillance information collected, processed,
distributed, used and deleted in SNS and
concerns raised with respect to the limited
definition.
3.1 Evaluation and Analysis
The information is confidential or not.
Further, the evaluation of these matters may not
rely on facts, but rather on the reasonableness of
the inferences drawn, the quality and relevance
of the evidence offered in support, and the
extent to which that evidence permits or
constrains alternative interpretations. Markedly,
the different types of privacy concerns show
that not only the ability to keep certain
information confidential may be a privacy
concern.
4. Conclusion and Future work
A further concern with respect to the inability
to practice informational is self-determination,
or inability to determine the existence and
significance of links between a people. More or
less we are in the practice of sharing the
information leads to vulnerability, where more
and more constraint is coming in further more
research. In this we have concludes for the
further research on the ontology based
classification by using map based Hadoop
Programming.
REFERENCE
[1] Facebook Beacon, 2007
[2] C. Johnson, Project Gaydar, The Boston
Globe, Sept. 2009.
[3] L. Sweeney, k-Anonymity: A Model for
Protecting Privacy, J. Uncertainty, Fuzziness
and Knowledge-based Systems, pp. 557-570,
2002.
[4] J. Lindamood, R. Heatherly, M. Kantarciog
lu, and B. Thuraisingham, Inferring Private
230

www.ijrecs.com

Information Using Social Network Data,


Proc.18thIntlConf.
WorldWideWeb(WWW),
2009.
[5] N. Talukder, M. Ouzzani, A. KElmagarmid
H. Elmeleegy, and M. Yakout, Privometer:
Privacy Protection in Social Networks, Proc.
IEEE 26th Intl Conf. Data Eng. Workshops
(ICDE 10), pp. 266-269, 2010.
[6] E. Zheleva and L. Getoor, To Join or Not
To Join: The Illusion of Privacy in Social
Networks with Mixed Public and Private user
Profiles, Technical Report CS-TR-4926, Univ.
of Maryland, College Park, July 2008.
[7] A. Menon and C. Elkan, Predicting Labels
for Dyadic Data, Data Mining
and
Knowledge Discovery, vol. 21, pp. 327-343,
2010.
[8] B. Tasker, P. Abbeel, and K. Daphne,
Discriminative Prbabilistic Models for
Relational Data, Proc.18th Ann. Conf.
Uncertainty in Artificial Intelligence (UAI 02),
pp. 485-492, 2002.
[9] P. Sen and L. Getoor, Link-Based
Classification,TechnicalReportCS-TR4858,
Univ. of Maryland, Feb. 2007.
[10] H. Jones and J. H. Soltren, Facebook:
Threats
to Privacy, Technical
report
Massachusetts
Inst.
of
Technology, 2005.

You might also like