An Efficient & Secure Content Contribution and Retrieval content in Online Social Networks using Level-level Security Optimization & Content Visualization Algorithm

Online Social Networks (OSNs) is currently popular interactive media to establish the communication, share and disseminate a considerable amount of human life data. Daily and continuous communications imply the exchange of several types of content, including free text, image, audio, and video data. Security is one of the friction points that emerge when communications get mediated in Online Social Networks (OSNs). However, there are no content-based preferences supported, and therefore it is not possible to prevent undesired messages. Providing the service is not only a matter of using previously defined web content mining and security techniques. To overcome the issues, Level-level Security Optimization & Content Visualization Algorithm is proposed to avoid the privacy issues during content sharing and data visualization. It adopts level by level privacy based on user requirement in the social network. It evaluates the privacy compatibility in the online social network environment to avoid security complexities. The mechanism divided into three parts namely like online social network platform creation, social network privacy, social network within organizational privacy and network controlling and authentication. Based on the experimental evaluation, a proposed method improves the privacy retrieval accuracy (PRA) 9.13% and reduces content retrieval time (CRT) 7 milliseconds and information loss (IL) 5.33%.

[1]  Jose M. Such,et al.  BFF: A tool for eliciting tie strength and user communities in social networking services , 2013, Information Systems Frontiers.

[2]  Xiaohui Liang,et al.  Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense , 2016, IEEE Transactions on Dependable and Secure Computing.

[3]  Yongqiang Sun,et al.  Location information disclosure in location-based social network services: Privacy calculus, benefit structure, and gender differences , 2015, Comput. Hum. Behav..

[4]  Krishna P. Gummadi,et al.  On the Reliability of Profile Matching Across Large Online Social Networks , 2015, KDD.

[5]  Prateek Mittal,et al.  LinkMirage: Enabling Privacy-preserving Analytics on Social Relationships , 2016, NDSS.

[6]  Guanhua Yan,et al.  Privacy-Preserving Profile Matching for Proximity-Based Mobile Social Networking , 2013, IEEE Journal on Selected Areas in Communications.

[7]  Krishnamoorthi Makkithaya,et al.  Learning from a Class Imbalanced Public Health Dataset: a Cost-based Comparison of Classifier Performance , 2017 .

[9]  Xiaohui Liang,et al.  Exploiting multimedia services in mobile social networks from security and privacy perspectives , 2014, IEEE Communications Magazine.

[10]  Subburaj Ramasamy,et al.  Context Based Classification of Reviews Using Association Rule Mining, Fuzzy Logics and Ontology , 2017 .

[11]  Li Shang,et al.  Efficient privacy-preserving content recommendation for online social communities , 2017, Neurocomputing.

[12]  H. Raghav Rao,et al.  Privacy preserving actions of older adults on social media: Exploring the behavior of opting out of information sharing , 2013, Decis. Support Syst..

[13]  Refik Molva,et al.  Safebook: A privacy-preserving online social network leveraging on real-life trust , 2009, IEEE Communications Magazine.

[14]  Yunhao Liu,et al.  Message in a Sealed Bottle: Privacy Preserving Friending in Social Networks , 2012, 2013 IEEE 33rd International Conference on Distributed Computing Systems.

[15]  A. Prabakaran,et al.  Privacy Preservation in Social Network Analysis using Edge Weight Perturbation , 2016 .

[16]  Philip S. Yu,et al.  COSNET: Connecting Heterogeneous Social Networks with Local and Global Consistency , 2015, KDD.

[17]  Rashidah Funke Olanrewaju,et al.  Intelligent Cooperative Adaptive Weight Ranking Policy via dynamic aging based on NB and J48 classifiers , 2017 .

[18]  Katsuhiro Honda,et al.  A Collaborative Framework for Privacy Preserving Fuzzy Co-Clustering of Vertically Distributed Cooccurrence Matrices , 2015, Adv. Fuzzy Syst..

[19]  Kendall Goodrich,et al.  How ‘social’ are social media? A cross-cultural comparison of online and offline purchase decision influences , 2014 .

[20]  Mark Dredze,et al.  What Are Health-Related Users Tweeting? A Qualitative Content Analysis of Health-Related Users and Their Messages on Twitter , 2014, Journal of medical Internet research.

[21]  Nam P. Nguyen,et al.  Dynamic Social Community Detection and Its Applications , 2014, PloS one.

[22]  Ben Y. Zhao,et al.  Whispers in the dark: analysis of an anonymous social network , 2014, Internet Measurement Conference.

[23]  Zekeriya Erkin,et al.  Privacy-preserving distributed clustering , 2013, EURASIP J. Inf. Secur..

[24]  Pushmeet Kohli,et al.  Manifestations of user personality in website choice and behaviour on online social networks , 2013, Machine Learning.

[25]  Sachin D. Babar,et al.  An Efficient Profile Matching Protocol Using Privacy Preserving in Mobile Social Network , 2016 .