SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 4 Issue 4, June 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD31687 | Volume – 4 | Issue – 4 | May-June 2020 Page 1720
Retrieving Hidden Friends a Collusion Privacy
Attack against Online Friend Search Engine
R. Brintha, H. Parveen Bagum (MCA)
Prist University, Thanjavur, Tamil Nadu, India
ABSTRACT
Online Social Networks (OSNs) are providing a diversity of application for
human users to network through families, friends and even strangers. One of
such application, friend search engine, allows the universal public to inquiry
individual client friend lists and has been gaining popularity recently. Proper
design, this application may incorrectly disclose client private relationship
information. Existing work has a privacy perpetuation clarification that can
effectively boost OSNs’ sociability while protecting users’ friendship privacy
against attacks launched by individual malicious requestors. In this project
proposed an advanced collusion attack, where a victim user’s friendship
privacy can be compromise from side to side a series of cautiously designed
queries coordinately launched by multiple malicious requestors.Theresultof
the proposed collusion attack is validate through synthetic and real-world
social network data sets. The project on the advanced collusion attacks will
help us design a more vigorous and securer friend search engine on OSNs in
the near future.
KEYWORDS: Social Network Services (SNS), Privacy Preservation, FriendSearch,
Social Network, OSN
How to cite this paper: R. Brintha | H.
Parveen Bagum "Retrieving Hidden
Friends a Collusion Privacy Attack against
Online Friend SearchEngine"Publishedin
International Journal
of Trend in Scientific
Research and
Development(ijtsrd),
ISSN: 2456-6470,
Volume-4 | Issue-4,
June 2020, pp.1720-
1724, URL:
www.ijtsrd.com/papers/ijtsrd31687.pdf
Copyright © 2020 by author(s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
1. INTRODUCTION
Social Network Services (SNS) are currently drastically
revolutionizing the way people interact, thus becoming
defect a predominant service on the web The impact of this
paradigm change on socioeconomic and technical aspectsof
collaboration and interaction is comparable to that caused
by the deployment of World Wide Web in the 1990’s..
Catering for a broad range of users of all ages, and a vast
difference in social, educational, and national background,
SNS allow even users with limited technical skills to publish
Personally Identifiable Information (PII) and to
communicate with an extreme ease, sharing interests and
activities.
An Online Social Network (OSN)offering,usuallycentralized,
online accessible SNS contain digital representations of a
subset of the relations that their users, both registered
persons and institutions, entertain in the physical world.
Spanning all participants through their relationships, they
model the social network as a graph. Every OSN user can
typically create his or her own OSN profile and use the
available OSN applications to easily share information with
other, possibly selected, users for either professional, or
personal purposes. OSN with a more professional and
business-oriented background are typicallyusedasa facility
geared towards career management or business contacts;
such networks typically provide SNS with a more serious
image. In contrast, OSN with a more private and leisure-
oriented background are typically used for sharing and
exchanging more personal information, like, e.g., contact
data, photographs, and videos; OSN provided by such
networks have usually a more youthful inter-face. The core
OSN application is the creation and maintenance of contact
lists.
2. LITERATURE SURVEY
In this paper [1] C. Chen et.al has proposed Statistical
structures built constant identification of drifted Twitter
spam-Twitter spam has become a major topic now a days.
Late workscentred on relating AI methods for Twitter spam
location, which utilize the measurable features oftweets. we
see that the factual belongings of spam tweets vary by
certain period, and in thisway,thepresentationofprevailing
AI built classifiers reduces. This difficulty is alluded to as
Twitter Spam Drift. In order to switch this dispute first does
a deep study on the quantifiable skin tone for more than one
million spam and non-spam tweets.
In this paper [2] projected plan is changing spam tweets
since unlabelled tweets and consolidates them into
classifier's preparation procedure. Many tests are made to
measure the projected plan. The results show the present
Lfun plan can altogether improve the spam discovery
exactness in genuine world scenarios
In this paper [3] has proposed Automatically recognizing
phony news in prevalent Twitter stringsInformationquality
in online life is an undeniably significant issue, however
web-scale information impedes specialists' capacity to
evaluate and address a significant part of the incorrect
substance, or "phony news," current stages in this paper
IJTSRD31687
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD31687 | Volume – 4 | Issue – 4 | May-June 2020 Page 1721
builds up a technique for computerizing counterfeit news
location on Twitter by figuring out how to foresee precision
evaluations in two validity cantered Twitter datasets:
CREDBANK, which supports the exactness for instance in
Twitter a publicly supported dataset of exactnessappraisals
for occasions in Twitter, and PHEME, which contains a set of
rumours and non-rumours, We use this to Twitter set
content taken from Buzz Feed's fake news dataset and
models arranged against freely reinforced experts beat
models reliant on journalists' assessment and models
arranged on a pooled dataset of both openlyupheldworkers
and authors.
In this paper[4] has proposed A model-based methodology
for recognizing spammers in interpersonal organizations In
this the errand of distinguishing spammers in informal
communities from a blend displaying viewpoint, in view of
which we devise a principled unaided way to deal with
identify spammers. In method initially speak to every client
of the informal community with an element vector that
mirrors its conduct and connections with different member.
The projected methodology can naturally segregate among
spammers and genuine clients, while existing solo
approaches require human intercession so as to set casual
edge parameters to distinguish spammers. In addition, our
methodology is general as in it very well may be applied to
various online social destinations. To show the suitability of
the proposed technique, we led probes genuine information
extricated from Instagram and Twitter.
In this paper [5] Spam identification of Twitter traffic: A
system dependent on irregular backwoodsandnon-uniform
element inspecting Law Enforcement Agencies spread an
essential job in the examination of open information and
need powerful strategies to channel problematic data.
Clients' characterization and spammers' ID is a helpful
method for mitigate Twitter traffic by unhelpful substance.
Analysis are done on a famous datasets of Twitter clients.
The known Twitter dataset is comprised of user marked as
genuine clients or spammers, portrayed by 54 features.
Exploratory results exhibit the viability of improved
highlight testing technique.
3. METHODOLOGY
3.1. EXISTING SYSTEM
Social network platform are based on centralized
architecture that intrinsically threat user time alone due to
potential monitoring and interception of private user
information, the goal is to design social network platforms
based on a distributed architecture in order to assure user
privacy. New method are investigate in order to solve some
classical security and trust management problem similar to
distributed systems by taking advantage of the information
stored in the social network platforms. Suchproblemsrange
from trust establishment in self-organizing systems to key
management without infrastructure to co-Operation
enforcement in peer-to-peer systems
DISADVANTAGES
Will not manage the whole Social Network system
Need more efficient for the security purpose
3.2. PROPOSED ALGORITHMS
Fast community building, rapid exchange of information at
the professional and private level, social network platforms
raise several issues concerning the privacy and security of
their users. The goal of this thesis is to identify privacy and
security problems raised by the social networksandtocome
up with the design of radically new architectures for the
social network platform.
ADVANTAGES
Our proposed system is based on the online reservation
for the user, who are in need of a social network.
Our proposed system helps to overcome the difficulties
in getting an user profile.
3.3. METHODOLOGY
Fuzzy Clustering Algorithm
Fuzzy clustering (also referred to as soft clusteringorsoft
k-means) is a form of clustering in which each data point
can belong to more than one cluster. Clustering or cluster
analysis involves assigning data points to clusters such that
items in the same cluster are as similar as possible, while
items belonging to different clusters are as dissimilar as
possible. Clusters are identified via similarity measures.
These similarity measures include distance, connectivity,
and intensity. Different similarity measures may be chosen
based on the data or the application
The FCM algorithm attempts to partitiona finitecollection of
n elements into a collection of c fuzzy
clusters with respect to some given criterion.
Given a finite set of data, the algorithm returns a list of c
cluster centres and a partition matrix
where
each element, wij , tells the degree to which element, Xi ,
belongs to cluster Cj.
The FCM aims to minimize an objective function:
Where:
4. EXPERIMENT AND RESULTS
The proposed method has been implemented using .NET
Technology. Attack against online friend n this module the
admin can view the friends message. The Mutual friends
download your image suddenly provides the alert message
in your phone. The alert message is date, time, person name
also mentioned. In this module the user can post the attack
on any friend in the online for the potential security threads.
This will bring the privacy protection on user side. Such
rules are not defined by the SNM, therefore they are not
meant as general high level directives to be applied to the
whole community. Rather, we decide to let the users
themselves, i.e., the wall’s owners to specify BL rules
regulating who has to be banned from their walls and for
how long. Therefore, client strength be banned from a wall,
by, at the same time, being able to post in other walls.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD31687 | Volume – 4 | Issue – 4 | May-June 2020 Page 1722
4.1. USE CASE DIAGRAM
Figure 4.1 Use Case Diagram
4.2. RESULT
4.2.1. User Registration
Fig: 4.2.2 User Login
Fig: 4.2.3 Profile View
Fig: 4.2.4 Friend Request
Fig: 4.2.5 Friend Request Accepted
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD31687 | Volume – 4 | Issue – 4 | May-June 2020 Page 1723
Fig: 4.2.6 Search Friend
Fig: 4.2.7 Friend List
Fig: 4.2.8 Send Message
Fig: 4.2.9 View Message
Fig: 4.2.10 Photo Post
Fig: 4.2.11 Post View
Fig: 4.2.12 Admin Login
Fig: 4.2.13 User details
Fig: 4.2.14 Attacker Report
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD31687 | Volume – 4 | Issue – 4 | May-June 2020 Page 1724
5. CONCLUSION
This project suggests a newapproachtotacklethesesecurity
and privacy problems with a special emphasisontheprivacy
of users with respect to the application provider in addition
to defense against intruders or malicious users. In order to
ensure users' privacy in the face of potential privacy
violations by the provider, the suggested approach adopts a
decentralized architecture relying on cooperation among a
number of independent parties that are also the users of the
online social network application.Thesecondstrongpointof
the suggested approach is to capitalize on the trust
relationships that are part of social networks in real life in
order to cop e with the problem of building trusted and
privacy-preserving mechanisms as part of the online
application.
FUTURE ENHANCEMENT
Google’s all algorithms are focused on improving the user
experience. If users, have ever cared to closely look at the
Google’s algorithms, you already know that they will rank a
website that takes care of the user’s needs first. As it was
believed that Search Engine involves too much of
technicalities. But if you understand Search Engine or have
worked as an Search Engine professional,youwouldknowit
is an art to its core. The Search Engine professionals today
understand that mere technical knowledge is not enough in
this user-friendly virtual world. A creativity is required for
an Search Engine professional to catch the interest of a user.
REFERENCES
[1] B. Erçahin, Ö. Akta³, D. Kilinç, and C. Akyol, ``Twitter
fake account detection,'' in Proc. Int. Conf. Comput. Sci.
Eng. (UBMK), Oct. 2017, pp. 388_392.
[2] F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida,
``Detecting spammers on Twitter,'' in Proc.
Collaboration, Electron. Messaging, Anti- Abuse Spam
Conf. (CEAS), vol. 6, Jul. 2010, p. 12
[3] S. Gharge, and M. Chavan, ``An integrated approach for
malicious tweets detection using NLP,'' in Proc. Int.
Conf. Inventive Commun. Comput. Technol. (ICICCT),
Mar. 2017, pp. 435_438.
[4] T. Wu, S. Wen, Y. Xiang, and W. Zhou, ``Twitter spam
detection: Survey of new approaches and comparative
study,'' Comput. Secur., vol. 76, pp. 265_284, Jul. 2018.
[5] S. J. Soman, ``A survey on behaviors exhibited by
spammers in popular social media networks,'' in Proc.
Int. Conf. Circuit, Power Comput. Tech- nol. (ICCPCT),
Mar. 2016, pp. 1_6.
[6] A. Gupta, H. Lamba, and P. Kumaraguru, ``1.00 per RT
#BostonMarathon # prayforboston: Analyzing fake
content on Twitter,'' in Proc. eCrime Researchers
Summit (eCRS), 2013, pp. 1_12.
[7] F. Concone, A. De Paola, G. Lo Re, and M. Morana,
``Twitter analysis for real-time malware discovery,'' in
Proc. AEIT Int. Annu. Conf., Sep. 2017, pp. 1_6.
[8] N. Eshraqi, M. Jalali, and M. H. Moattar, ``Detecting
spam tweets in Twitter using a data stream clustering
algorithm,'' in Proc. Int. Congr. Technol., Commun.
Knowl. (ICTCK), Nov. 2015, pp. 347_351.
[9] C. Chen, Y. Wang, J. Zhang, Y. Xiang, W. Zhou, and G.
Min, ``Statistical features-based real-time detection of
drifted Twitter spam,'' IEEE Trans. Inf. Forensics
Security, vol. 12, no. 4, pp. 914_925, Apr. 2017.
[10] C. Buntain and J. Golbeck, ``Automatically identifying
fake news in popular Twitter threads,'' in Proc. IEEE
Int. Conf. Smart Cloud (SmartCloud), Nov. 2017, pp.
208_215.
[11] C. Chen, J. Zhang, Y. Xie, Y. Xiang,W. Zhou, M. M. Hassan,
A. AlElaiwi, and M. Alrubaian, ``A performance
evaluation of machine learning-based streaming spam
tweets detection,'' IEEETrans.Comput.Social Syst.,vol.
2, no. 3, pp. 65_76, Sep. 2015.
[12] G. Stafford and L. L. Yu, ``An evaluation of the effect of
spam on Twitter trending topics,'' in Proc. Int. Conf.
Social Comput., Sep. 2013, pp. 373_378.
[13] M. Mateen, M. A. Iqbal, M. Aleem, and M. A. Islam, ``A
hybrid approach for spam detection for Twitter,'' in
Proc. 14th Int. Bhurban Conf. Appl. Sci. Technol.
(IBCAST), Jan. 2017, pp. 466_471.
[14] A. Gupta and R. Kaushal, ``Improving spamdetectionin
online social networks,'' in Proc. Int. Conf. Cogn.
Comput. Inf. Process. (CCIP), Mar. 2015, pp. 1_6.
[15] F. Fathaliani and M. Bouguessa, ``A model-based
approach for identifying spammers in social
networks,'' in Proc. IEEE Int. Conf. Data Sci. Adv. Anal.
(DSAA), Oct. 2015, pp. 1_9.
[16] V. Chauhan, A. Pilaniya, V. Middha, A. Gupta, U. Bana, B.
R. Prasad, and S. Agarwal, ``Anomalous behavior
detection in social networking,'' in Proc. 8th Int. Conf.
Comput., Commun. Netw. Technol. (ICCCNT),Jul.2017,
pp. 1_5.
[17] S. Jeong, G. Noh, H. Oh, and C.-K. Kim, ``Follow spam
detection based on cascaded social information,'' Inf.
Sci., vol. 369, pp. 481_499, Nov. 2016.
[18] M. Washha, A. Qaroush, and F. Sedes, ``Leveragingtime
for spammers detection on Twitter,'' in Proc. 8th Int.
Conf. Manage. Digit. EcoSyst., Nov. 2016, pp. 109_116.
[19] B. Wang, A. Zubiaga, M. Liakata, and R. Procter,
``Making the most of tweet-inherent features for social
spam detection on Twitter,'' 2015
[20] M. Hussain, M. Ahmed, H. A. Khattak, M. Imran,A.Khan,
S. Din, A. Ahmad, G. Jeon, and A. G. Reddy, ``Towards
ontology-based multilingual URL _ltering: A big data
problem,'' J. Supercomput., vol. 74, no. 10, pp.
5003_5021, Oct. 2018.

Weitere ähnliche Inhalte

Was ist angesagt?

Social media platform and Our right to privacy
Social media platform and Our right to privacySocial media platform and Our right to privacy
Social media platform and Our right to privacyvivatechijri
 
IRJET- Tweet Segmentation and its Application to Named Entity Recognition
IRJET- Tweet Segmentation and its Application to Named Entity RecognitionIRJET- Tweet Segmentation and its Application to Named Entity Recognition
IRJET- Tweet Segmentation and its Application to Named Entity RecognitionIRJET Journal
 
Survey of data mining techniques for social
Survey of data mining techniques for socialSurvey of data mining techniques for social
Survey of data mining techniques for socialFiras Husseini
 
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...IJASRD Journal
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyCSCJournals
 
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkAuthorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkeSAT Publishing House
 
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social NetworksMy Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social NetworksIRJET Journal
 
Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...
Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...
Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...AM Publications
 
Chung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News MediaChung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News MediaREVULN
 
[Enterprise Social Platform] Socialware 'Tigris' introduction_EN
[Enterprise Social Platform] Socialware 'Tigris' introduction_EN[Enterprise Social Platform] Socialware 'Tigris' introduction_EN
[Enterprise Social Platform] Socialware 'Tigris' introduction_ENHwangHyejin
 
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network AnalysisMarc Smith
 
30 Tools and Tips to Speed Up Your Digital Workflow
30 Tools and Tips to Speed Up Your Digital Workflow 30 Tools and Tips to Speed Up Your Digital Workflow
30 Tools and Tips to Speed Up Your Digital Workflow Mike Kujawski
 
Social media mining PPT
Social media mining PPTSocial media mining PPT
Social media mining PPTChhavi Mathur
 
IRJET- Fake Message Deduction using Machine Learining
IRJET- Fake Message Deduction using Machine LeariningIRJET- Fake Message Deduction using Machine Learining
IRJET- Fake Message Deduction using Machine LeariningIRJET Journal
 
How does fakenews spread understanding pathways of disinformation spread thro...
How does fakenews spread understanding pathways of disinformation spread thro...How does fakenews spread understanding pathways of disinformation spread thro...
How does fakenews spread understanding pathways of disinformation spread thro...Araz Taeihagh
 
2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...
2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...
2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...Marc Smith
 
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET Journal
 

Was ist angesagt? (19)

Social media platform and Our right to privacy
Social media platform and Our right to privacySocial media platform and Our right to privacy
Social media platform and Our right to privacy
 
IRJET- Tweet Segmentation and its Application to Named Entity Recognition
IRJET- Tweet Segmentation and its Application to Named Entity RecognitionIRJET- Tweet Segmentation and its Application to Named Entity Recognition
IRJET- Tweet Segmentation and its Application to Named Entity Recognition
 
Survey of data mining techniques for social
Survey of data mining techniques for socialSurvey of data mining techniques for social
Survey of data mining techniques for social
 
Kt3518501858
Kt3518501858Kt3518501858
Kt3518501858
 
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
 
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkAuthorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social network
 
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social NetworksMy Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
 
Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...
Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...
Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...
 
Chung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News MediaChung-Jui LAI - Polarization of Political Opinion by News Media
Chung-Jui LAI - Polarization of Political Opinion by News Media
 
[Enterprise Social Platform] Socialware 'Tigris' introduction_EN
[Enterprise Social Platform] Socialware 'Tigris' introduction_EN[Enterprise Social Platform] Socialware 'Tigris' introduction_EN
[Enterprise Social Platform] Socialware 'Tigris' introduction_EN
 
Social Media Mining and Analytics
Social Media Mining and AnalyticsSocial Media Mining and Analytics
Social Media Mining and Analytics
 
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis
 
30 Tools and Tips to Speed Up Your Digital Workflow
30 Tools and Tips to Speed Up Your Digital Workflow 30 Tools and Tips to Speed Up Your Digital Workflow
30 Tools and Tips to Speed Up Your Digital Workflow
 
Social media mining PPT
Social media mining PPTSocial media mining PPT
Social media mining PPT
 
IRJET- Fake Message Deduction using Machine Learining
IRJET- Fake Message Deduction using Machine LeariningIRJET- Fake Message Deduction using Machine Learining
IRJET- Fake Message Deduction using Machine Learining
 
How does fakenews spread understanding pathways of disinformation spread thro...
How does fakenews spread understanding pathways of disinformation spread thro...How does fakenews spread understanding pathways of disinformation spread thro...
How does fakenews spread understanding pathways of disinformation spread thro...
 
2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...
2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...
2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...
 
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
 

Ähnlich wie Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Search Engine

Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningIRJET Journal
 
Analysis, modelling and protection of online private data.
Analysis, modelling and protection of online private data.Analysis, modelling and protection of online private data.
Analysis, modelling and protection of online private data.Silvia Puglisi
 
Spammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social NetworksSpammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social NetworksIRJET Journal
 
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...IOSR Journals
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSZac Darcy
 
Mental Disorder Prevention on Social Network with Supervised Learning Based A...
Mental Disorder Prevention on Social Network with Supervised Learning Based A...Mental Disorder Prevention on Social Network with Supervised Learning Based A...
Mental Disorder Prevention on Social Network with Supervised Learning Based A...ijtsrd
 
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYINGA MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYINGijaia
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullyinggerogepatton
 
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)paperpublications3
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullyinggerogepatton
 
Sampling of User Behavior Using Online Social Network
Sampling of User Behavior Using Online Social NetworkSampling of User Behavior Using Online Social Network
Sampling of User Behavior Using Online Social NetworkEditor IJCATR
 
Social Media Datasets for Analysis and Modeling Drug Usage
Social Media Datasets for Analysis and Modeling Drug UsageSocial Media Datasets for Analysis and Modeling Drug Usage
Social Media Datasets for Analysis and Modeling Drug Usageijtsrd
 
IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re...
IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re...IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re...
IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re...IRJET Journal
 
A Survey of Methods for Spotting Spammers on Twitter
A Survey of Methods for Spotting Spammers on TwitterA Survey of Methods for Spotting Spammers on Twitter
A Survey of Methods for Spotting Spammers on Twitterijtsrd
 
Detecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social NetworksDetecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social NetworksIRJET Journal
 

Ähnlich wie Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Search Engine (20)

Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
 
Analysis, modelling and protection of online private data.
Analysis, modelling and protection of online private data.Analysis, modelling and protection of online private data.
Analysis, modelling and protection of online private data.
 
Spammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social NetworksSpammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social Networks
 
L017146571
L017146571L017146571
L017146571
 
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
 
Mental Disorder Prevention on Social Network with Supervised Learning Based A...
Mental Disorder Prevention on Social Network with Supervised Learning Based A...Mental Disorder Prevention on Social Network with Supervised Learning Based A...
Mental Disorder Prevention on Social Network with Supervised Learning Based A...
 
Threats_Report_2013
Threats_Report_2013Threats_Report_2013
Threats_Report_2013
 
6356152.pdf
6356152.pdf6356152.pdf
6356152.pdf
 
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYINGA MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullying
 
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
 
tcss.2021.3049232.pdf
tcss.2021.3049232.pdftcss.2021.3049232.pdf
tcss.2021.3049232.pdf
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullying
 
Sampling of User Behavior Using Online Social Network
Sampling of User Behavior Using Online Social NetworkSampling of User Behavior Using Online Social Network
Sampling of User Behavior Using Online Social Network
 
Social Media Datasets for Analysis and Modeling Drug Usage
Social Media Datasets for Analysis and Modeling Drug UsageSocial Media Datasets for Analysis and Modeling Drug Usage
Social Media Datasets for Analysis and Modeling Drug Usage
 
IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re...
IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re...IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re...
IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re...
 
A Survey of Methods for Spotting Spammers on Twitter
A Survey of Methods for Spotting Spammers on TwitterA Survey of Methods for Spotting Spammers on Twitter
A Survey of Methods for Spotting Spammers on Twitter
 
Proposal.docx
Proposal.docxProposal.docx
Proposal.docx
 
Detecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social NetworksDetecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social Networks
 

Mehr von ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

Mehr von ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Kürzlich hochgeladen

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 

Kürzlich hochgeladen (20)

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 

Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Search Engine

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 4 Issue 4, June 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD31687 | Volume – 4 | Issue – 4 | May-June 2020 Page 1720 Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Search Engine R. Brintha, H. Parveen Bagum (MCA) Prist University, Thanjavur, Tamil Nadu, India ABSTRACT Online Social Networks (OSNs) are providing a diversity of application for human users to network through families, friends and even strangers. One of such application, friend search engine, allows the universal public to inquiry individual client friend lists and has been gaining popularity recently. Proper design, this application may incorrectly disclose client private relationship information. Existing work has a privacy perpetuation clarification that can effectively boost OSNs’ sociability while protecting users’ friendship privacy against attacks launched by individual malicious requestors. In this project proposed an advanced collusion attack, where a victim user’s friendship privacy can be compromise from side to side a series of cautiously designed queries coordinately launched by multiple malicious requestors.Theresultof the proposed collusion attack is validate through synthetic and real-world social network data sets. The project on the advanced collusion attacks will help us design a more vigorous and securer friend search engine on OSNs in the near future. KEYWORDS: Social Network Services (SNS), Privacy Preservation, FriendSearch, Social Network, OSN How to cite this paper: R. Brintha | H. Parveen Bagum "Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend SearchEngine"Publishedin International Journal of Trend in Scientific Research and Development(ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4, June 2020, pp.1720- 1724, URL: www.ijtsrd.com/papers/ijtsrd31687.pdf Copyright © 2020 by author(s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by /4.0) 1. INTRODUCTION Social Network Services (SNS) are currently drastically revolutionizing the way people interact, thus becoming defect a predominant service on the web The impact of this paradigm change on socioeconomic and technical aspectsof collaboration and interaction is comparable to that caused by the deployment of World Wide Web in the 1990’s.. Catering for a broad range of users of all ages, and a vast difference in social, educational, and national background, SNS allow even users with limited technical skills to publish Personally Identifiable Information (PII) and to communicate with an extreme ease, sharing interests and activities. An Online Social Network (OSN)offering,usuallycentralized, online accessible SNS contain digital representations of a subset of the relations that their users, both registered persons and institutions, entertain in the physical world. Spanning all participants through their relationships, they model the social network as a graph. Every OSN user can typically create his or her own OSN profile and use the available OSN applications to easily share information with other, possibly selected, users for either professional, or personal purposes. OSN with a more professional and business-oriented background are typicallyusedasa facility geared towards career management or business contacts; such networks typically provide SNS with a more serious image. In contrast, OSN with a more private and leisure- oriented background are typically used for sharing and exchanging more personal information, like, e.g., contact data, photographs, and videos; OSN provided by such networks have usually a more youthful inter-face. The core OSN application is the creation and maintenance of contact lists. 2. LITERATURE SURVEY In this paper [1] C. Chen et.al has proposed Statistical structures built constant identification of drifted Twitter spam-Twitter spam has become a major topic now a days. Late workscentred on relating AI methods for Twitter spam location, which utilize the measurable features oftweets. we see that the factual belongings of spam tweets vary by certain period, and in thisway,thepresentationofprevailing AI built classifiers reduces. This difficulty is alluded to as Twitter Spam Drift. In order to switch this dispute first does a deep study on the quantifiable skin tone for more than one million spam and non-spam tweets. In this paper [2] projected plan is changing spam tweets since unlabelled tweets and consolidates them into classifier's preparation procedure. Many tests are made to measure the projected plan. The results show the present Lfun plan can altogether improve the spam discovery exactness in genuine world scenarios In this paper [3] has proposed Automatically recognizing phony news in prevalent Twitter stringsInformationquality in online life is an undeniably significant issue, however web-scale information impedes specialists' capacity to evaluate and address a significant part of the incorrect substance, or "phony news," current stages in this paper IJTSRD31687
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD31687 | Volume – 4 | Issue – 4 | May-June 2020 Page 1721 builds up a technique for computerizing counterfeit news location on Twitter by figuring out how to foresee precision evaluations in two validity cantered Twitter datasets: CREDBANK, which supports the exactness for instance in Twitter a publicly supported dataset of exactnessappraisals for occasions in Twitter, and PHEME, which contains a set of rumours and non-rumours, We use this to Twitter set content taken from Buzz Feed's fake news dataset and models arranged against freely reinforced experts beat models reliant on journalists' assessment and models arranged on a pooled dataset of both openlyupheldworkers and authors. In this paper[4] has proposed A model-based methodology for recognizing spammers in interpersonal organizations In this the errand of distinguishing spammers in informal communities from a blend displaying viewpoint, in view of which we devise a principled unaided way to deal with identify spammers. In method initially speak to every client of the informal community with an element vector that mirrors its conduct and connections with different member. The projected methodology can naturally segregate among spammers and genuine clients, while existing solo approaches require human intercession so as to set casual edge parameters to distinguish spammers. In addition, our methodology is general as in it very well may be applied to various online social destinations. To show the suitability of the proposed technique, we led probes genuine information extricated from Instagram and Twitter. In this paper [5] Spam identification of Twitter traffic: A system dependent on irregular backwoodsandnon-uniform element inspecting Law Enforcement Agencies spread an essential job in the examination of open information and need powerful strategies to channel problematic data. Clients' characterization and spammers' ID is a helpful method for mitigate Twitter traffic by unhelpful substance. Analysis are done on a famous datasets of Twitter clients. The known Twitter dataset is comprised of user marked as genuine clients or spammers, portrayed by 54 features. Exploratory results exhibit the viability of improved highlight testing technique. 3. METHODOLOGY 3.1. EXISTING SYSTEM Social network platform are based on centralized architecture that intrinsically threat user time alone due to potential monitoring and interception of private user information, the goal is to design social network platforms based on a distributed architecture in order to assure user privacy. New method are investigate in order to solve some classical security and trust management problem similar to distributed systems by taking advantage of the information stored in the social network platforms. Suchproblemsrange from trust establishment in self-organizing systems to key management without infrastructure to co-Operation enforcement in peer-to-peer systems DISADVANTAGES Will not manage the whole Social Network system Need more efficient for the security purpose 3.2. PROPOSED ALGORITHMS Fast community building, rapid exchange of information at the professional and private level, social network platforms raise several issues concerning the privacy and security of their users. The goal of this thesis is to identify privacy and security problems raised by the social networksandtocome up with the design of radically new architectures for the social network platform. ADVANTAGES Our proposed system is based on the online reservation for the user, who are in need of a social network. Our proposed system helps to overcome the difficulties in getting an user profile. 3.3. METHODOLOGY Fuzzy Clustering Algorithm Fuzzy clustering (also referred to as soft clusteringorsoft k-means) is a form of clustering in which each data point can belong to more than one cluster. Clustering or cluster analysis involves assigning data points to clusters such that items in the same cluster are as similar as possible, while items belonging to different clusters are as dissimilar as possible. Clusters are identified via similarity measures. These similarity measures include distance, connectivity, and intensity. Different similarity measures may be chosen based on the data or the application The FCM algorithm attempts to partitiona finitecollection of n elements into a collection of c fuzzy clusters with respect to some given criterion. Given a finite set of data, the algorithm returns a list of c cluster centres and a partition matrix where each element, wij , tells the degree to which element, Xi , belongs to cluster Cj. The FCM aims to minimize an objective function: Where: 4. EXPERIMENT AND RESULTS The proposed method has been implemented using .NET Technology. Attack against online friend n this module the admin can view the friends message. The Mutual friends download your image suddenly provides the alert message in your phone. The alert message is date, time, person name also mentioned. In this module the user can post the attack on any friend in the online for the potential security threads. This will bring the privacy protection on user side. Such rules are not defined by the SNM, therefore they are not meant as general high level directives to be applied to the whole community. Rather, we decide to let the users themselves, i.e., the wall’s owners to specify BL rules regulating who has to be banned from their walls and for how long. Therefore, client strength be banned from a wall, by, at the same time, being able to post in other walls.
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD31687 | Volume – 4 | Issue – 4 | May-June 2020 Page 1722 4.1. USE CASE DIAGRAM Figure 4.1 Use Case Diagram 4.2. RESULT 4.2.1. User Registration Fig: 4.2.2 User Login Fig: 4.2.3 Profile View Fig: 4.2.4 Friend Request Fig: 4.2.5 Friend Request Accepted
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD31687 | Volume – 4 | Issue – 4 | May-June 2020 Page 1723 Fig: 4.2.6 Search Friend Fig: 4.2.7 Friend List Fig: 4.2.8 Send Message Fig: 4.2.9 View Message Fig: 4.2.10 Photo Post Fig: 4.2.11 Post View Fig: 4.2.12 Admin Login Fig: 4.2.13 User details Fig: 4.2.14 Attacker Report
  • 5. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD31687 | Volume – 4 | Issue – 4 | May-June 2020 Page 1724 5. CONCLUSION This project suggests a newapproachtotacklethesesecurity and privacy problems with a special emphasisontheprivacy of users with respect to the application provider in addition to defense against intruders or malicious users. In order to ensure users' privacy in the face of potential privacy violations by the provider, the suggested approach adopts a decentralized architecture relying on cooperation among a number of independent parties that are also the users of the online social network application.Thesecondstrongpointof the suggested approach is to capitalize on the trust relationships that are part of social networks in real life in order to cop e with the problem of building trusted and privacy-preserving mechanisms as part of the online application. FUTURE ENHANCEMENT Google’s all algorithms are focused on improving the user experience. If users, have ever cared to closely look at the Google’s algorithms, you already know that they will rank a website that takes care of the user’s needs first. As it was believed that Search Engine involves too much of technicalities. But if you understand Search Engine or have worked as an Search Engine professional,youwouldknowit is an art to its core. The Search Engine professionals today understand that mere technical knowledge is not enough in this user-friendly virtual world. A creativity is required for an Search Engine professional to catch the interest of a user. REFERENCES [1] B. Erçahin, Ö. Akta³, D. Kilinç, and C. Akyol, ``Twitter fake account detection,'' in Proc. Int. Conf. Comput. Sci. Eng. (UBMK), Oct. 2017, pp. 388_392. [2] F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida, ``Detecting spammers on Twitter,'' in Proc. Collaboration, Electron. Messaging, Anti- Abuse Spam Conf. (CEAS), vol. 6, Jul. 2010, p. 12 [3] S. Gharge, and M. Chavan, ``An integrated approach for malicious tweets detection using NLP,'' in Proc. Int. Conf. Inventive Commun. Comput. Technol. (ICICCT), Mar. 2017, pp. 435_438. [4] T. Wu, S. Wen, Y. Xiang, and W. Zhou, ``Twitter spam detection: Survey of new approaches and comparative study,'' Comput. Secur., vol. 76, pp. 265_284, Jul. 2018. [5] S. J. Soman, ``A survey on behaviors exhibited by spammers in popular social media networks,'' in Proc. Int. Conf. Circuit, Power Comput. Tech- nol. (ICCPCT), Mar. 2016, pp. 1_6. [6] A. Gupta, H. Lamba, and P. Kumaraguru, ``1.00 per RT #BostonMarathon # prayforboston: Analyzing fake content on Twitter,'' in Proc. eCrime Researchers Summit (eCRS), 2013, pp. 1_12. [7] F. Concone, A. De Paola, G. Lo Re, and M. Morana, ``Twitter analysis for real-time malware discovery,'' in Proc. AEIT Int. Annu. Conf., Sep. 2017, pp. 1_6. [8] N. Eshraqi, M. Jalali, and M. H. Moattar, ``Detecting spam tweets in Twitter using a data stream clustering algorithm,'' in Proc. Int. Congr. Technol., Commun. Knowl. (ICTCK), Nov. 2015, pp. 347_351. [9] C. Chen, Y. Wang, J. Zhang, Y. Xiang, W. Zhou, and G. Min, ``Statistical features-based real-time detection of drifted Twitter spam,'' IEEE Trans. Inf. Forensics Security, vol. 12, no. 4, pp. 914_925, Apr. 2017. [10] C. Buntain and J. Golbeck, ``Automatically identifying fake news in popular Twitter threads,'' in Proc. IEEE Int. Conf. Smart Cloud (SmartCloud), Nov. 2017, pp. 208_215. [11] C. Chen, J. Zhang, Y. Xie, Y. Xiang,W. Zhou, M. M. Hassan, A. AlElaiwi, and M. Alrubaian, ``A performance evaluation of machine learning-based streaming spam tweets detection,'' IEEETrans.Comput.Social Syst.,vol. 2, no. 3, pp. 65_76, Sep. 2015. [12] G. Stafford and L. L. Yu, ``An evaluation of the effect of spam on Twitter trending topics,'' in Proc. Int. Conf. Social Comput., Sep. 2013, pp. 373_378. [13] M. Mateen, M. A. Iqbal, M. Aleem, and M. A. Islam, ``A hybrid approach for spam detection for Twitter,'' in Proc. 14th Int. Bhurban Conf. Appl. Sci. Technol. (IBCAST), Jan. 2017, pp. 466_471. [14] A. Gupta and R. Kaushal, ``Improving spamdetectionin online social networks,'' in Proc. Int. Conf. Cogn. Comput. Inf. Process. (CCIP), Mar. 2015, pp. 1_6. [15] F. Fathaliani and M. Bouguessa, ``A model-based approach for identifying spammers in social networks,'' in Proc. IEEE Int. Conf. Data Sci. Adv. Anal. (DSAA), Oct. 2015, pp. 1_9. [16] V. Chauhan, A. Pilaniya, V. Middha, A. Gupta, U. Bana, B. R. Prasad, and S. Agarwal, ``Anomalous behavior detection in social networking,'' in Proc. 8th Int. Conf. Comput., Commun. Netw. Technol. (ICCCNT),Jul.2017, pp. 1_5. [17] S. Jeong, G. Noh, H. Oh, and C.-K. Kim, ``Follow spam detection based on cascaded social information,'' Inf. Sci., vol. 369, pp. 481_499, Nov. 2016. [18] M. Washha, A. Qaroush, and F. Sedes, ``Leveragingtime for spammers detection on Twitter,'' in Proc. 8th Int. Conf. Manage. Digit. EcoSyst., Nov. 2016, pp. 109_116. [19] B. Wang, A. Zubiaga, M. Liakata, and R. Procter, ``Making the most of tweet-inherent features for social spam detection on Twitter,'' 2015 [20] M. Hussain, M. Ahmed, H. A. Khattak, M. Imran,A.Khan, S. Din, A. Ahmad, G. Jeon, and A. G. Reddy, ``Towards ontology-based multilingual URL _ltering: A big data problem,'' J. Supercomput., vol. 74, no. 10, pp. 5003_5021, Oct. 2018.