Restrain On Social Networks From Conjecture Attacks

Abstract

Online social networks are used by many people. These Social networks allow their members to connect bymeans of various web linkes in which the We study the problem of privacy-preservation in social networks. Now-a-days the use of social networks among the people has become more popular. With the impact of social networks on society, the people become more sensitive regarding privacy issues in the common networks. Anonymization of the social networks (MySpace, Facebook, Twitter and Orkut) is essential to preserve privacy of informations gathered by the social networks. Collection of techniques that use node attributes and the link structure to refine classifications.Uses local classifiers to establish a set of priors for each nodeUses traditional relational classifiers as the iterative step in classification.

Authors and Affiliations

P. Eswaraiah| Department of CSE,PBRVisvodaya Institute Of Technology &Science,Kavali, K. Gowtham Kumar| Student of M.Tech(CSE) and Department of CSE,PBR Visvodaya Institute Of Technology &Science,Kavali

Keywords

Related Articles

We have considered the issue of best k high utility itemsets mining, where k is the coveted number of high utility itemsets to be mined. Two effective calculations TKU (mining Top-K Utility itemsets) and TKO (mining...

Data Recovery and Integrity Checking By Proxy In Cloud

Cloud is a collection of data centres which provides effective services to cloud clients. Now a day’s users and organizations are forwarding the data to cloud. But problem is repairing cloud data along with integri...

Wireless Protocols for Anti Cloning and Security

RFID system (Radio-Frequency Identification) is a technology for automated identification of objects and people. Human beings are smart enough to identify an object under a variety of challenge circumstances. RFID sys...

Power Quality Improvement Features For A Distributed Generation System Using Grid Interface Inverter

This paper presents that, the renewable energy resources are being increasingly connected to distribution systems by utilizing power electronic converters. And it presents a novel control strategy for achieving maxim...

Urdhva Tiryagbhyam Sutra Multiplier Based 32-Bit MAC Design

The Vedic Multiplier and the Reversible Logic Gates has Designed and actualized in the increase and Accumulate Unit (MAC) and that is appeared in this paper. A Vedic multiplier is composed by utilizing Urdhava Triyag...

Download PDF file
  • EP ID EP16366
  • DOI -
  • Views 325
  • Downloads 11

How To Cite

P. Eswaraiah, K. Gowtham Kumar (2014). Restrain On Social Networks From Conjecture Attacks. International Journal of Science Engineering and Advance Technology, 2(11), 661-662. https://europub.co.uk/articles/-A-16366