A Manageable Framework for Preserving Exclusive Data in Social Networks

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2014 by IJETT Journal
Volume-17 Number-6
Year of Publication : 2014
Authors : A.v.swathi, C.P.V.N.J Mohan Rao

Citation 

A.v.swathi, C.P.V.N.J Mohan Rao"A Manageable Framework for Preserving Exclusive Data in Social Networks", International Journal of Engineering Trends and Technology (IJETT), V17(6),262-265 Nov 2014. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract

In social networks there are so many threats such as impersonation, data leakage. Most of the social networks are more worried about private data leakage. Some of them as intruders by deploying the security attacks like denial of service or hack the information. So we introduced a framework which contains agents on every Peer and they monitor every Peer to maintain confidentiality, anonymous etc. The main goals of these methods are to maintain privacy of private data. So we additionally introduced a classifier to predict that connected Peer is secure or then proceed to share data.

References

[1] Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions. By Jun Zhang, Member, IEEE, Chao Chen, Yang Xiang,
[2], “Internet traffic classification using bayesian analysis techniques,” by A. W. Moore and D. Zuev
[3] SPINS: Security Protocols for Sensor Networks ADRIAN PERRIG, ROBERT SZEWCZYK, J.D. TYGAR, VICTOR WEN and DAVID E. CULLER
[4] M. Hay, G. Miklau, D. Jensen, P. Weis, and S. Srivastava.Anonymizing social networks. Technical Report 07-19, University of Massachusetts Amherst, 2007.
[5] J. He, W. Chu, and V. Liu.Inferring privacy information from social networks.In Mehrotra, editor, Proceedings of Intelligence and Security Informatics, volume LNCS 3975, 2006.
[6] T. Joachims. Training linear SVMs in linear time. In ACM SIGKDD In- ternational Conference On Knowledge Discovery and Data Mining (KDD), pages 217 – 226, 2006.
[7] A. Perrig, R. Szewczyk, J. Tygar, V. Wen, and D. Culler, “SPINS: Security Protocols for Sensor Networks,” Wireless Networks, vol. 8, no. 5, pp. 521-534, 2002.
[8] D. Hong, J. Sung, S. Hong, J. Lim, S. Lee, B. Koo, C. Lee, D. Chang, J. Lee, K. Jeong, H. Kim, J. Kim, and S. Chee, “HIGHT: A New Block Cipher Suitable for Low-Resource Device,” Proc. Eighth Int’l Workshop Cryptographic Hardware and Embedded Systems (CHES ’06), pp. 46-59, 2006.
[9]Pogue, David (January 2011). "Don`t Worry about Who`s watching". Scientific American 304 (1): 32. doi:10.1038/scientificamerican0111-32. [10]"The Value of Privacy by Bruce Schneier". Schneier.com. Retrieved 2011-11-25.