Credence Based Sollitude Companion for Online Social Network

Authors

  • Sundar R  Department of Computer Science and Engineering, Saveetha Engineering College, Chennai, Tamilnadu, India
  • Dr. N. Jayalakshmi  Department of Computer Science and Engineering, Saveetha Engineering College, Chennai, Tamilnadu, India

Keywords:

Attested Mechanism, Privacy, OSN, Trust level

Abstract

Online social networks encourage associations between individuals based on attributes (i.e., friends, professional colleagues), etc. They make it simpler for people to discover and communicate with individuals who are in their networks using the Web as the interface. For example Facebook is solid in Relationships, furthermore bolsters Presence, Identity, Conversations, and Reputation in Groups, further more underpins Sharing and Conversations. Facebook consolidates the personal and the professional. Privacy Controls–In most networks, the ability to access more detailed information about a person is based on their attributes as one of your connections; “friends” see a great deal more data than the individuals who are not your “friends.” You can control who is actually in your personal network by effectively managing who you invite into your network and whose invitations you accept. Sadly, privacy concerns raised in the recommendation process impede the Expansion of OSN users’ friend circle. To overcome this issue we have approach the practice known as Credence Based solitude Companion for OSN to expand the friend circle or getting the help from the Friends of Friend without disturbing the privacy by using the Attested mechanism.

References

  1. Linke Guo, Member, IEEE, Chi Zhang, Member, IEEE, and Yuguang Fang, Fellow, IEEE, “A Trust-Based Privacy-Preserving Friend Recommendation Scheme for Online Social NetworksIEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 12, NO. 4, JULY/AUGUST 2015
  2. A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee, “Measurement and analysis of online social networks,”in Proc. 7th ACM SIGCOMM Conf. Internet Meas., 2007, pp. 29–42.
  3. C. Zhang, X. Zhu, Y. Song, and Y. Fang, “A formal study of trustbased routing in wireless ad hoc networks,” in Proc. IEEE 29th Int.Conf. Comput. Commun., Mar. 2010, pp. 1–9.
  4. T. H.-J. Kim, A. Yamada, V. Gligor, J. Hong, and A. Perrig,“RelationGram: Tie-strength visualization for user-controlled online identity authentication,” in Proc. 17th Int. Conf. Financial Cryptography Data Security, 2013, pp. 69–77.
  5. R. Dey, C. Tang, K. Ross, and N. Saxena, “Estimating age privacy leakage in online social networks,” in Proc. IEEE Conf. Comput. Commun., 2012, pp. 2836–2840.
  6. M. von Arb, M. Bader, M. Kuhn, and R. Wattenhofer, “Veneta: Serverless friend-of-friend detection in mobile social networking,” in Proc. IEEE Int. Conf. Wireless Mobile Comput. Netw. Commun., Oct. 2008, pp. 184–189.
  7. L. Guo, C. Zhang, J. Sun, and Y. Fang, “PAAS: Privacy-preserving attribute-based authentication system for ehealth networks,” in Proc. IEEE 32nd Int. Conf. Distrib. Comput. Syst., Macau, China, 2012, pp. 224–233.
  8. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media NetworksShan Jiang and Hsinchun Chen, Fellow, IEEE , VOL. 28, NO. 3, MARCH 2016
  9. P. W. L. Fong, M. Anwar, and Z. Zhao, “A privacy preservation model for facebook-style social network systems,” in Proc. 14th Eur. Conf. Res. Comput. Security, 2009, pp. 303–320.
  10. C. Zhang, J. Sun, X. Zhu, and Y. Fang, “Privacy and security for online social networks: Challenges and opportunities,” IEEE Netw., vol. 24, no. 4, pp. 13–18, Jul./Aug. 2010.
  11. C. Dwyer, S. R. Hiltz, and K. Passerini, “Trust and privacy concern within social networking sites: A comparison of facebook and myspace,” in Proc. 13th Amer. Conf. Inf. Syst., 2007, p. 339.
  12. K. Govindan and P. Mohapatra, “Trust computations and trust dynamics in mobile ad hoc networks: A survey,” IEEE Commun. Survey Tutorials, vol. 14, no. 2, pp. 279–298, Dec. 2012.
  13. W. Dong, V. Dave, L. Qiu, and Y. Zhang, “Secure friend discovery in mobile social networks,” in Proc. IEEE 30th Conf. Comput. Commun.,Apr. 2011, pp. 1647–1655.
  14. L. Guo, X. Liu, Y. Fang, and X. Li, “User-centric private matching for ehealth networks—A social perspective,” in Proc. IEEE Global Commun. Conf., 2012, pp. 732–737.

Downloads

Published

2017-06-02

Issue

Section

Research Articles

How to Cite

[1]
Sundar R, Dr. N. Jayalakshmi, " Credence Based Sollitude Companion for Online Social Network, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 3, Issue 3, pp.239-243, May-June-2017.