Efficient Privacy Protection in Social Networks
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 107

M.Tech / M.E / PhD Thesis | Information Technology | India | Volume 3 Issue 10, October 2014

Efficient Privacy Protection in Social Networks

Bharath Kumar Gowru, Ramadevi Polagani

Privacy is the main impression term in present days for accessing services from biggest company profile units. In this user profile privacy is the main constitute even approach for accessing services with their relevant data aspects present in social network. In this way we process sufficient data organization with their relevant data representation of the user profiles in social networks for providing privacy to their user profiles. Traditionally more number of techniques were introduced for providing privacy to this event management operations, but they are not provide an efficient communication privacy on user profiles when increasing the number users in social network. So in this paper we introduce a solution for three different problems with their relative data management operations. They are Social Privacy, Institutional Privacy and Surveillance Privacy. In social privacy every user share his services with their own friends or private users only, In Institutional privacy incoming mails from social network maintainer with their relative data management and communication network efficiency. In Surveillance privacy providing security from threats present in the social network process. Our experimental results demonstrate efficient privacy considerations in privacy issue management operations on user profiles.

Keywords: Social networks, Privacy, Attacks, Protection, Users

Edition: Volume 3 Issue 10, October 2014

Pages: 1390 - 1394

Share this Article

How to Cite this Article?

Bharath Kumar Gowru, Ramadevi Polagani, "Efficient Privacy Protection in Social Networks", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT14349, Volume 3 Issue 10, October 2014, 1390 - 1394

Enter Your Email Address




Similar Articles with Keyword 'Social networks'

Downloads: 107

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 1390 - 1394

Efficient Privacy Protection in Social Networks

Bharath Kumar Gowru, Ramadevi Polagani

Share this Article

Downloads: 111

Research Paper, Information Technology, India, Volume 3 Issue 12, December 2014

Pages: 1877 - 1881

An Ensemble Classification Technique to Control Unwanted Messages in Online Social Networking

M. Lavanya, S. Subadra

Share this Article

Downloads: 112 | Weekly Hits: ⮙4

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 9 Issue 6, June 2020

Pages: 424 - 426

Possible Misleading Information Identification from News Using Text Analysis

Dobariya Vipula V.

Share this Article

Downloads: 115

Research Paper, Information Technology, India, Volume 2 Issue 7, July 2013

Pages: 362 - 365

Statistical Outlook for Community Mining in Social Networks

Aditi Agrawal, Pawan Prakash Singh

Share this Article

Downloads: 118

Research Paper, Information Technology, Malaysia, Volume 4 Issue 4, April 2015

Pages: 3227 - 3231

The Impact of Social Network Technology on Business

Sehnaz Ahmetoglu, Nuha Al-Yami, Jamaludine Ibrahim

Share this Article

Similar Articles with Keyword 'Privacy'

Downloads: 1

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 174 - 178

Android Notes using Finger Print Authentication

Vaibhav Garg, Siddharth Yadav, Rishabh Kamal

Share this Article

Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙4

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 307 - 310

CCTV Cameras Hacking and Prevention Techniques

Preeti Rana

Share this Article

Downloads: 43 | Weekly Hits: ⮙2

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 91 - 93

A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud

Dilipprasad.E, Ajay.R, K. Durairaj

Share this Article

Downloads: 101

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

Downloads: 105

Research Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1654 - 1660

Privacy Preserving Protocol for Two-Party Classifier Over Vertically Partitioned Dataset Using ANN

Smitha Iddalgave, Sumana M

Share this Article

Similar Articles with Keyword 'Attacks'

Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙4

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 307 - 310

CCTV Cameras Hacking and Prevention Techniques

Preeti Rana

Share this Article

Downloads: 5 | Monthly Hits: ⮙5

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 369 - 371

Performing Attacks on Radio Frequency and Embedded based Systems

Preeti Rana

Share this Article

Downloads: 103 | Weekly Hits: ⮙2 | Monthly Hits: ⮙8

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2100 - 2103

Automatic Patch Generation for Control Hijacking Attacks

Saud Adam Abdulkadir, Savaridassan P.

Share this Article

Downloads: 104

Survey Paper, Information Technology, India, Volume 3 Issue 4, April 2014

Pages: 747 - 750

A Survey on Shoulder Surfing Resistant Text Based Graphical Password Schemes

Mokal P. H., Devikar R. N.

Share this Article

Downloads: 105

Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2849 - 2851

A Survey on Secure Mechanism for Wireless Sensor Networks

Tabbasum Sajjan Magdum, Y.B.Gurav

Share this Article

Similar Articles with Keyword 'Protection'

Downloads: 103

Research Paper, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 2588 - 2589

Big Data Storage, Collection, & Protection with Islamic Perspective

Ibrahim Nasreldin Ibrahim Ahmed, Mohamad Fauzan Noordin

Share this Article

Downloads: 103 | Weekly Hits: ⮙2 | Monthly Hits: ⮙8

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2100 - 2103

Automatic Patch Generation for Control Hijacking Attacks

Saud Adam Abdulkadir, Savaridassan P.

Share this Article

Downloads: 103

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2137 - 2140

Protection Figures Hitting by Refining Depiction Fragment Torrent

P Siddharthan, C Mahesh

Share this Article

Downloads: 103 | Monthly Hits: ⮙1

Research Paper, Information Technology, Nigeria, Volume 5 Issue 5, May 2016

Pages: 2051 - 2058

ICTs and Child Labour in Nigeria: Patterns, Implications and Prevention Strategies

Jimoh Femi Olatunji, Amah Nnachi Lofty, Dr. Oyedemi Jacob

Share this Article

Downloads: 107

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 1390 - 1394

Efficient Privacy Protection in Social Networks

Bharath Kumar Gowru, Ramadevi Polagani

Share this Article

Similar Articles with Keyword 'Users'

Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙4

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 307 - 310

CCTV Cameras Hacking and Prevention Techniques

Preeti Rana

Share this Article

Downloads: 43 | Weekly Hits: ⮙2

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 91 - 93

A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud

Dilipprasad.E, Ajay.R, K. Durairaj

Share this Article

Downloads: 81 | Weekly Hits: ⮙1 | Monthly Hits: ⮙9

Research Paper, Information Technology, Kenya, Volume 9 Issue 10, October 2020

Pages: 502 - 505

Integrated Library Systems and Performance of the Post-Modern Library of Kenyatta University, Kenya

Yvonne Oyaro Opiyo, David Nzuki

Share this Article

Downloads: 86

Research Paper, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 1896 - 1909

Users Experience with E-Journal Features: A Research Survey of Aerospace Scientists and Engineers of Bangalore

R. Guruprasad, P. Marimuthu

Share this Article

Downloads: 101

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article



Top