Efficient Privacy Protection in Social Networks
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

M.Tech / M.E / PhD Thesis | Information Technology | India | Volume 3 Issue 10, October 2014

Efficient Privacy Protection in Social Networks

Bharath Kumar Gowru, Ramadevi Polagani

Privacy is the main impression term in present days for accessing services from biggest company profile units. In this user profile privacy is the main constitute even approach for accessing services with their relevant data aspects present in social network. In this way we process sufficient data organization with their relevant data representation of the user profiles in social networks for providing privacy to their user profiles. Traditionally more number of techniques were introduced for providing privacy to this event management operations, but they are not provide an efficient communication privacy on user profiles when increasing the number users in social network. So in this paper we introduce a solution for three different problems with their relative data management operations. They are Social Privacy, Institutional Privacy and Surveillance Privacy. In social privacy every user share his services with their own friends or private users only, In Institutional privacy incoming mails from social network maintainer with their relative data management and communication network efficiency. In Surveillance privacy providing security from threats present in the social network process. Our experimental results demonstrate efficient privacy considerations in privacy issue management operations on user profiles.

Keywords: Social networks, Privacy, Attacks, Protection, Users

Edition: Volume 3 Issue 10, October 2014

Pages: 1390 - 1394

Share this Article

How to Cite this Article?

Bharath Kumar Gowru, Ramadevi Polagani, "Efficient Privacy Protection in Social Networks", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT14349, Volume 3 Issue 10, October 2014, 1390 - 1394

131 PDF Views | 90 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Social networks'

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 1390 - 1394

Efficient Privacy Protection in Social Networks

Bharath Kumar Gowru, Ramadevi Polagani

Share this Article

Research Paper, Information Technology, India, Volume 3 Issue 12, December 2014

Pages: 1877 - 1881

An Ensemble Classification Technique to Control Unwanted Messages in Online Social Networking

M. Lavanya, S. Subadra

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 9 Issue 6, June 2020

Pages: 424 - 426

Possible Misleading Information Identification from News Using Text Analysis

Dobariya Vipula V.

Share this Article

Research Paper, Information Technology, India, Volume 2 Issue 7, July 2013

Pages: 362 - 365

Statistical Outlook for Community Mining in Social Networks

Aditi Agrawal, Pawan Prakash Singh

Share this Article

Research Paper, Information Technology, Kenya, Volume 8 Issue 8, August 2019

Pages: 1825 - 1829

The Social Software Learnability Prediction (SSLP) Tool

Masese. B. Nelson

Share this Article

Similar Articles with Keyword 'Privacy'

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 91 - 93

A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud

Dilipprasad.E, Ajay.R, K. Durairaj

Share this Article

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

Survey Paper, Information Technology, India, Volume 5 Issue 4, April 2016

Pages: 1868 - 1870

A Survey on Privacy Assurance in Personalized Web Search

Abhilasha V. Biradar, K. B. Sadafale

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2441 - 2444

Privacy-Preservation of Centralized and Distributed Social Network by Using L-Diversity Algorithm

Shankaranand, P. Rajasekar

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 1390 - 1394

Efficient Privacy Protection in Social Networks

Bharath Kumar Gowru, Ramadevi Polagani

Share this Article

Similar Articles with Keyword 'Attacks'

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1274 - 1277

Automation of Mutated Cross Site Scripting

Anchal Tiwari, J. Jeysree

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 4, April 2014

Pages: 747 - 750

A Survey on Shoulder Surfing Resistant Text Based Graphical Password Schemes

Mokal P. H., Devikar R. N.

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2100 - 2103

Automatic Patch Generation for Control Hijacking Attacks

Saud Adam Abdulkadir, Savaridassan P.

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 1390 - 1394

Efficient Privacy Protection in Social Networks

Bharath Kumar Gowru, Ramadevi Polagani

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2849 - 2851

A Survey on Secure Mechanism for Wireless Sensor Networks

Tabbasum Sajjan Magdum, Y.B.Gurav

Share this Article

Similar Articles with Keyword 'Protection'

Research Paper, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 2588 - 2589

Big Data Storage, Collection, & Protection with Islamic Perspective

Ibrahim Nasreldin Ibrahim Ahmed, Mohamad Fauzan Noordin

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2137 - 2140

Protection Figures Hitting by Refining Depiction Fragment Torrent

P Siddharthan, C Mahesh

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2100 - 2103

Automatic Patch Generation for Control Hijacking Attacks

Saud Adam Abdulkadir, Savaridassan P.

Share this Article

Research Paper, Information Technology, Nigeria, Volume 5 Issue 5, May 2016

Pages: 2051 - 2058

ICTs and Child Labour in Nigeria: Patterns, Implications and Prevention Strategies

Jimoh Femi Olatunji, Amah Nnachi Lofty, Dr. Oyedemi Jacob

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 1390 - 1394

Efficient Privacy Protection in Social Networks

Bharath Kumar Gowru, Ramadevi Polagani

Share this Article

Similar Articles with Keyword 'Users'

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 91 - 93

A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud

Dilipprasad.E, Ajay.R, K. Durairaj

Share this Article

Research Paper, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 1896 - 1909

Users Experience with E-Journal Features: A Research Survey of Aerospace Scientists and Engineers of Bangalore

R. Guruprasad, P. Marimuthu

Share this Article

Research Paper, Information Technology, Kenya, Volume 9 Issue 10, October 2020

Pages: 502 - 505

Integrated Library Systems and Performance of the Post-Modern Library of Kenyatta University, Kenya

Yvonne Oyaro Opiyo, David Nzuki

Share this Article

Survey Paper, Information Technology, India, Volume 9 Issue 12, December 2020

Pages: 228 - 232

Study of UPI/BHIM Payment System in India

Dinesh M. Kolte, Dr. Veena R. Humbe

Share this Article

Research Paper, Information Technology, India, Volume 6 Issue 1, January 2017

Pages: 1773 - 1777

Optimized Load Balancing in Cloud Computing using Hybrid Approach of Round Robin and Min-Min Scheduling

Muskan Garg, Rajneesh Narula

Share this Article
Top