International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



M.Tech / M.E / PhD Thesis | Information Technology | India | Volume 3 Issue 10, October 2014

Efficient Privacy Protection in Social Networks

Bharath Kumar Gowru, Ramadevi Polagani

Privacy is the main impression term in present days for accessing services from biggest company profile units. In this user profile privacy is the main constitute even approach for accessing services with their relevant data aspects present in social network. In this way we process sufficient data organization with their relevant data representation of the user profiles in social networks for providing privacy to their user profiles. Traditionally more number of techniques were introduced for providing privacy to this event management operations, but they are not provide an efficient communication privacy on user profiles when increasing the number users in social network. So in this paper we introduce a solution for three different problems with their relative data management operations. They are Social Privacy, Institutional Privacy and Surveillance Privacy. In social privacy every user share his services with their own friends or private users only, In Institutional privacy incoming mails from social network maintainer with their relative data management and communication network efficiency. In Surveillance privacy providing security from threats present in the social network process. Our experimental results demonstrate efficient privacy considerations in privacy issue management operations on user profiles.

Keywords: Social networks, Privacy, Attacks, Protection, Users

Edition: Volume 3 Issue 10, October 2014

Pages: 1390 - 1394


How to Cite this Article?

Bharath Kumar Gowru, Ramadevi Polagani, "Efficient Privacy Protection in Social Networks", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT14349, Volume 3 Issue 10, October 2014, 1390 - 1394

34 PDF Views | 24 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Social networks'

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 9 Issue 6, June 2020

Pages: 424 - 426

Possible Misleading Information Identification from News Using Text Analysis

Dobariya Vipula V.

Share this article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 1390 - 1394

Efficient Privacy Protection in Social Networks

Bharath Kumar Gowru, Ramadevi Polagani

Share this article

Research Paper, Information Technology, India, Volume 3 Issue 12, December 2014

Pages: 1877 - 1881

An Ensemble Classification Technique to Control Unwanted Messages in Online Social Networking

M. Lavanya, S. Subadra

Share this article

Research Paper, Information Technology, India, Volume 2 Issue 7, July 2013

Pages: 362 - 365

Statistical Outlook for Community Mining in Social Networks

Aditi Agrawal, Pawan Prakash Singh

Share this article

Research Paper, Information Technology, Malaysia, Volume 4 Issue 4, April 2015

Pages: 3227 - 3231

The Impact of Social Network Technology on Business

Sehnaz Ahmetoglu, Nuha Al-Yami, Jamaludine Ibrahim

Share this article



Similar Articles with Keyword 'Privacy'

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 91 - 93

A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud

Dilipprasad.E, Ajay.R, K. Durairaj

Share this article

Survey Paper, Information Technology, India, Volume 5 Issue 4, April 2016

Pages: 1868 - 1870

A Survey on Privacy Assurance in Personalized Web Search

Abhilasha V. Biradar, K. B. Sadafale

Share this article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2441 - 2444

Privacy-Preservation of Centralized and Distributed Social Network by Using L-Diversity Algorithm

Shankaranand, P. Rajasekar

Share this article

Survey Paper, Information Technology, India, Volume 5 Issue 4, April 2016

Pages: 1865 - 1867

Survey on Cloud Computing Security Algorithms

Akash Kanthale, S. P. Potdar

Share this article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 5, May 2015

Pages: 2565 - 2567

Cloud Storage with Added Data Security and Integrity

Reshmi Das M V, R Charanya

Share this article



Similar Articles with Keyword 'Attacks'

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2049 - 2054

Securing TCP/IP Stacks Using IP Tables

Hamisu I. Usman, J. Dharani

Share this article

Research Paper, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 2137 - 2142

Multiple Prevention Techniques for Different Attacks in Web Application

Tejal V. Kasture, Pinaki P. Dixit, Pooja S. Ovhal, Gayatri Sathe, Neelam A. Zambre

Share this article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1990 - 1993

Advanced Persistent Threat Detection System

Hanu Prasannan, Dharani.J

Share this article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 2923 - 2928

Hiding User Privacy in Location Based Services Through Clustering

Nilam V. Khandade, Snehal Nargundi

Share this article

Research Paper, Information Technology, India, Volume 4 Issue 7, July 2015

Pages: 2400 - 2403

Secure Deduplication in Cloud Backup Services

Nidhi Panpaliya, Prachi Sorte

Share this article



Similar Articles with Keyword 'Protection'

Research Paper, Information Technology, Nigeria, Volume 5 Issue 5, May 2016

Pages: 2051 - 2058

ICTs and Child Labour in Nigeria: Patterns, Implications and Prevention Strategies

Jimoh Femi Olatunji, Amah Nnachi Lofty, Dr. Oyedemi Jacob

Share this article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1990 - 1993

Advanced Persistent Threat Detection System

Hanu Prasannan, Dharani.J

Share this article

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2137 - 2140

Protection Figures Hitting by Refining Depiction Fragment Torrent

P Siddharthan, C Mahesh

Share this article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1051 - 1055

Enhancing the Protection scheme for FACTS-Based Transmission Lines using a Data Mining Model

Pallavi P. Wankhede, Rajesh K. Nasare

Share this article

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 753 - 755

RFID Security and Privacy

Richa Mishra, Dr. Nitin Pandey

Share this article



Similar Articles with Keyword 'Users'

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 91 - 93

A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud

Dilipprasad.E, Ajay.R, K. Durairaj

Share this article

Survey Paper, Information Technology, India, Volume 5 Issue 4, April 2016

Pages: 1868 - 1870

A Survey on Privacy Assurance in Personalized Web Search

Abhilasha V. Biradar, K. B. Sadafale

Share this article

Survey Paper, Information Technology, India, Volume 5 Issue 4, April 2016

Pages: 1865 - 1867

Survey on Cloud Computing Security Algorithms

Akash Kanthale, S. P. Potdar

Share this article

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2049 - 2054

Securing TCP/IP Stacks Using IP Tables

Hamisu I. Usman, J. Dharani

Share this article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1788 - 1791

Provision of Content Based Service Recommendations using Hadoop and MapReduce

M. Vigneesh, K. Nimala

Share this article
Top