Privacy in Online Social Networks: A Survey

Subhashri C, KLN College of Engineering; Nisha M ,; Sindhiya R ,; Karpagam V ,

Online social networks, data privacy, social networking, privacy protection algorithms

Knowledge and Data Engineering is the entire process of applying computer-based methodology, including new techniques for knowledge discovery, from data. It refers to the discovery of new information in terms of patterns or rules from vast amounts of data and also maintains privacy of data. Online social network have qualified immense growth in recent years and used by millions of people also.OSN is a platform which creates social relationship among users to share their interests, activities and real life connections but also raising a many privacy and security issues. While OSNs allow users to restrict access to shared data, they currently do not provide any mechanism to enforce privacy concerns over data associated with multiple users. This paper survives many techniques used in OSN privacy issues. Also discuss the pros and cons of these approaches.
    [1] ”Fairness-Aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks” Haojin Zhu ;Suguo Du ; Muyuan Li ; Zhaoyu Gao. Publication Year: 2013, Page(s): 192 – 200. [2] ”Multiparty Access Control for Online Social Networks: Model and Mechanisms” Hu, Hongxin ; Ahn, Gail-Joon ; Jorgensen, Jan. Publication Year: 2013 , Page(s): 1614 – 1627. [3] “A Trust-based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks” Guo, L.;Zhang, C.; Fang, Y; Publication Year: 2014. [4] Amarja dgaonkar, Hasib M. Shaikh,”Privacy in Online Social Networks” IJARCSSE, Volume 5, Issue 3,2015 pp 28-32. [5] E. de Cristofaro et al., “Hummingbird: Privacy at the Time of Twitter,” IEEE Symp. Security and Privacy, IEEE CS, 2012, pp. 285–299. [6] J. Anderson and F. Stajano, “Must Social Networking Conflict with Privacy” IEEE Security & Privacy, vol.11, no. 3, 2013, pp. 51–60. [7] A. Cutillo, R. Molva, and T. Strufe, “Safebook: A PrivacyPreserving Online Social Network Leveraging on RealLife Trust,”Communications Magazine, vol. 47, no. 12, 2009, pp. 94–101. [8] F. Beato, M. Kohlweiss, and K. Wouters, “Scramble! Your Social Network Data” Privacy Enhancing Technologies, LNCS 6794, Springer, 2011, pp. 211–225. [9] J. Anderson et al., “Privacy-Enabling Social Networking over Untrusted Networks,” ACM Workshop Online Social Networks (WOSN 09), ACM, 2009, pp. 1–6. [10] B.Carminati and E.Ferrari,”Collaborative AccessControl in Online Social Network,”Proc.7th Internatioal conference collaborative computing:Networking,application and Work Sharing(collaborate-com),pp.231-240,2011.
Paper ID: GRDCF002047
Published in: Conference : International Conference on Innovations in Engineering and Technology (ICIET - 2016)
Page(s): 380 - 383