Improved Privacy Preserving Profile Matching in Online Social Networks
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 1
Abstract
Social networking became popular because of its digital communication technologies tools for extending the social circle of people. Privacy preservation became a significant issue in social networking. This work discussed user profile matching with privacy preservation and introduced a group of profile matching protocols. Online social network with a mixture of public and private user profiles to predict the private attributes of users. We map this problem to a relational classification problem and we propose practical models that use friendship and group membership information (which is often not hidden) to infer sensitive attributes. The key novel idea is that in addition to friendship links, groups can be carriers of significant information. To the best of our knowledge, this is the first work that uses operation-based and group-based classification to study privacy implications in social networks with mixed public and private user profiles.
Authors and Affiliations
Nageswara Rao Yarlagadda| M.Tech research scholar,Asst. Prof in Department Of Computer Science And Engineering, Srkit,Vijayawada, B. Naresh| M.Tech research scholar,Asst. Prof in Department Of Computer Science And Engineering, Srkit,Vijayawada
Low Frequency Modular Multilevel Converter Topology for Improved Dynamic Performance of Variable-Speed AC Drives
This venture shows a control conspire for the particular multilevel converter (MMC) to drive a variable-speed air conditioning machine, particularly concentrating on enhancing dynamic execution. Hypothetically, the v...
Direct Torque Control for Matrix Converter Driven PMSM
This paper carries work on application of direct torque control for Five-Phase permanent magnet synchronous motor drives. In recent years, only voltage source inverters (VSIs) have been used to supply five-phase driv...
Novel Visual Authentication Protocols to Defend Key Logging Issues
The best approach to accomplish secure correspondence is to have validation convention, which is a sort of cryptographic convention with the reason for confirming substances. The configuration of secure validation co...
Tweet Scrutiny For Fast Communication Reporting
The major target of the system is develop a new earthquake detection algorithm it is used for To speed-up the detection process and reduce false detections.But here having one problem is Absence of evidence is not ev...
Evaluate the Key Management of Identity-Based Digital Signature To Routing In Cluster-Based Wireless Sensor Networks
Cluster-based information transmission in WSNs has been analyzed by scientists keeping in mind the end goal to accomplish the system scalability and administration, which capitalize on hub life and diminish transfer...