RESOLVING PRIVACY CONFLICT FOR MAINTAINING PRIVACY POLICIES IN ONLINE SOCIAL NETWORKS
Journal Title: International Journal of Computer Engineering & Technology (IJCET) - Year 2019, Vol 10, Issue 3
Abstract
In recent years, the use of online social networks (OSNs) such as Facebook, Twitter etc has tremendous increased. Users see these OSNs as a useful tool to find friends and interact with them. Moreover, OSNs allow their users to share photos, videos, and express their thoughts, views and feelings. However, users are usually concerned about their privacy when using OSNs. These OSNs not only offer smart resources for virtual social interfaces and sharing of data but also improve a number of security and privacy issues. While OSNs allow a single user to manage access to her/his data, those currently do not provide any mechanism to apply privacy concerns over data associated with multiple users, remaining privacy harms largely unresolved and leading to the potential confession of information that at least one user planned to keep private. This is because the unrestricted image of a subject can be affected by photos or comments posted on a social network. In this way, recent studies shows that users are demanding better mechanisms to protect their privacy. For this concern, we provide a systematic mechanism to identify and resolve privacy conflicts in online social networks (OSNs). The first computational tool to resolve conflicts for multiparty privacy management in social media. This makes it enable to adapt different situations by modelling the concessions that users make to reach a solution to the conflicts. Our conflict resolution specifies a tradeoff between privacy protection and data sharing by computing privacy risk and sharing loss.
Authors and Affiliations
FULPAGARE PRIYA K. and NITIN N. PATIL
DATA CAPTURING AND RETRIEVAL FROM WIRELESS SENSOR NETWORKS USING SEMANTIC WEB
The Internet of Things is giving a bright future and with establishment and maturity of wireless sensor networks, it can be truly realised for the various purposes of human endeavour. The paper deals with challenge to...
FAULT DATA DETECTION IN SOFTWARE USING A NOVEL FGRNN ALGORITHM
The use and dependence on software in various fields has been the reason why researchers for past decades have spent their efforts on finding better methods to predict software quality and reliability. Soft computing m...
ALGORITHMIC APPROACH FOR DOMINATION NUMBER OF UNICYCLIC GRAPHS
Let 𝐺(𝑉, 𝐸) be a unicyclic graph. A unicyclic graph is a connected graph that contains exactly one cycle. A dominating set of a graph G = (V, E) is a subset D of V, such that every vertex which is not in D is adjacent...
SECURED DATA AGGREGATION USING FIBONACCI NUMBERS AND UNICODE SYMBOLS FOR WSN
Wireless Sensor Network is a combination of one and more nodes basically used for data collection and data aggregation. The collected data is aggregated through a data aggregator and it will be sent to bases station. W...
PERSONALISED RECOMMENDER ENGINE USING A PROBABLISTIC MODEL
The world of e-commerce and e-business has opened many horizons to explore customers on web. Consumers are expecting businesses to approach and please them with their expectations. This has given rise to recommender sy...