Maintain Data Integrity And Protection Of Private Label Information In Social Network Data
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 12
Abstract
Perceptive information about users of the social networks should be protected. The confront is to plan methods to publish social network data in a form that affords usefulness without compromising privacy. Previous research has proposed a variety of privacy models with the corresponding protection mechanisms that put off both unintentional private information escape and attacks by malicious adversaries. These early privacy models are mainly disturbed with identity and link revelation. The social networks are modelled as graphs in which users are nodes and social connections are edges. The intimidation definitions and defence mechanisms leverage structural properties of the graph. This paper is stimulated by the recognition of the need for a better grain and more personalized privacy. Users commend social networks such as Face book and LinkedIn with a wealth of personal information such as their age, address, current location or political orientation. We refer to these details and messages as features in the user's profile. We propose a privacy protection scheme that not only put off the revelation of identity of users but also the disclosure of selected features in users' profiles.
Authors and Affiliations
Mallam Ujwala| Balaji Institute of Technology & Science Narsampet warangal, ujwala566@gmail.com, P. Ravi| Balaji Institute of Technology & Science Narsampet warangal
Predictive Query Indexing for Ambiguous Moving Objects in Uncertain Data Mining
Indexing and query processing is a developing examination field in spatio-temporal data. The majority of the continuous applications, for example, area based administrations, armada administration, movement expectati...
Enhanced Document Search and Sharing Tool in Organized P2p Frameworks
In internet p2p file sharing system generating more traffic. in this system file querying is important functionality which indicates the performance of p2p system .To improve file query performance cluster the common...
A Distributed Opportunistic Routing Policy With Congestion Diversity
Every packet transmission can be caught by an irregular subset of recipient nodes among which the following hand-off is chosen deftly. The primary test in the outline of least deferral steering strategies is adjustin...
Alternate Arm Based Modular Multilevel Converter With DC Fault Blocking Capability
This work gives a review of DC side tollerance of failure issues of VSC based HVDC framework and the requirement for blame tolerant converters. The working standard and DC blame ride through capacity of as of late pr...
Dynamic Power channel for force using so as to mold Space Vector Modulation controller
In this undertaking, introduces a control system for cross breed dynamic force channel utilizing Space Vector Pulse Width Modulation (SVPWM). In the proposed control system, the Active Power Filter (APF) reference vo...