Credence Based Sollitude Companion for Online Social Network
Keywords:
Attested Mechanism, Privacy, OSN, Trust levelAbstract
Online social networks encourage associations between individuals based on attributes (i.e., friends, professional colleagues), etc. They make it simpler for people to discover and communicate with individuals who are in their networks using the Web as the interface. For example Facebook is solid in Relationships, furthermore bolsters Presence, Identity, Conversations, and Reputation in Groups, further more underpins Sharing and Conversations. Facebook consolidates the personal and the professional. Privacy Controls–In most networks, the ability to access more detailed information about a person is based on their attributes as one of your connections; “friends†see a great deal more data than the individuals who are not your “friends.†You can control who is actually in your personal network by effectively managing who you invite into your network and whose invitations you accept. Sadly, privacy concerns raised in the recommendation process impede the Expansion of OSN users’ friend circle. To overcome this issue we have approach the practice known as Credence Based solitude Companion for OSN to expand the friend circle or getting the help from the Friends of Friend without disturbing the privacy by using the Attested mechanism.
References
- Linke Guo, Member, IEEE, Chi Zhang, Member, IEEE, and Yuguang Fang, Fellow, IEEE, “A Trust-Based Privacy-Preserving Friend Recommendation Scheme for Online Social NetworksIEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 12, NO. 4, JULY/AUGUST 2015
- A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee, “Measurement and analysis of online social networks,”in Proc. 7th ACM SIGCOMM Conf. Internet Meas., 2007, pp. 29–42.
- C. Zhang, X. Zhu, Y. Song, and Y. Fang, “A formal study of trustbased routing in wireless ad hoc networks,” in Proc. IEEE 29th Int.Conf. Comput. Commun., Mar. 2010, pp. 1–9.
- T. H.-J. Kim, A. Yamada, V. Gligor, J. Hong, and A. Perrig,“RelationGram: Tie-strength visualization for user-controlled online identity authentication,” in Proc. 17th Int. Conf. Financial Cryptography Data Security, 2013, pp. 69–77.
- R. Dey, C. Tang, K. Ross, and N. Saxena, “Estimating age privacy leakage in online social networks,” in Proc. IEEE Conf. Comput. Commun., 2012, pp. 2836–2840.
- M. von Arb, M. Bader, M. Kuhn, and R. Wattenhofer, “Veneta: Serverless friend-of-friend detection in mobile social networking,” in Proc. IEEE Int. Conf. Wireless Mobile Comput. Netw. Commun., Oct. 2008, pp. 184–189.
- L. Guo, C. Zhang, J. Sun, and Y. Fang, “PAAS: Privacy-preserving attribute-based authentication system for ehealth networks,” in Proc. IEEE 32nd Int. Conf. Distrib. Comput. Syst., Macau, China, 2012, pp. 224–233.
- NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media NetworksShan Jiang and Hsinchun Chen, Fellow, IEEE , VOL. 28, NO. 3, MARCH 2016
- P. W. L. Fong, M. Anwar, and Z. Zhao, “A privacy preservation model for facebook-style social network systems,” in Proc. 14th Eur. Conf. Res. Comput. Security, 2009, pp. 303–320.
- C. Zhang, J. Sun, X. Zhu, and Y. Fang, “Privacy and security for online social networks: Challenges and opportunities,” IEEE Netw., vol. 24, no. 4, pp. 13–18, Jul./Aug. 2010.
- C. Dwyer, S. R. Hiltz, and K. Passerini, “Trust and privacy concern within social networking sites: A comparison of facebook and myspace,” in Proc. 13th Amer. Conf. Inf. Syst., 2007, p. 339.
- K. Govindan and P. Mohapatra, “Trust computations and trust dynamics in mobile ad hoc networks: A survey,” IEEE Commun. Survey Tutorials, vol. 14, no. 2, pp. 279–298, Dec. 2012.
- W. Dong, V. Dave, L. Qiu, and Y. Zhang, “Secure friend discovery in mobile social networks,” in Proc. IEEE 30th Conf. Comput. Commun.,Apr. 2011, pp. 1647–1655.
- L. Guo, X. Liu, Y. Fang, and X. Li, “User-centric private matching for ehealth networks—A social perspective,” in Proc. IEEE Global Commun. Conf., 2012, pp. 732–737.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.