A Review on Secure Wall Post Sharing In Social Networking Environment
Abstract
With growing popularity of social networking sites its usage is
tremendously enhanced. Due to such massive usage, it has
some privacy issues that it doesn’t have control on the
unwanted post that displayed on the users or their friends
wall. Certain users addicted to share their photos on OSN. But
sometimes there may be chances to leak their private photos
when they allowed displaying them without any secrecy.
Recently, social networking sites like facebook improved their
privacy levels that user can have their own control on their
profile. To provide privacy for users wall rule-based system is
implemented. It allows customize filtering for users profiles.
Text based filtering techniques can provide message filtering
based on the content. Some sort text classifier techniques
provide analysis of message content. Whereas, FR system
automatically ide8ntify users shared images and videos. By
analyzing picture present in shared image or video, decision
can be taken that whether to share or block the content with
respect to user policies. System may also provide facility to
auto blocking of user. If user always try to post video of
certain person without his/her permission more than three
times then user will get automatically blocked. It will evaluate
the system performance on large dataset and can calculate
accuracy of the system. To control privacy leakage in social
networking user may have some base to give permission
before tagging or posting his/her photos or co-photos. FRsystem
for privacy management identifies co-photos of owner.
Full Text:
PDFReferences
Altman. Privacy regulation: Culturally universal or
culturally specific? Journal of Social Issues, 33(3):66–84,
Thomas, C. Grier, and D. M. Nicol. unfriendly: Multiparty
privacy risks in social networks. In M. J. Atallah
and N. J. Hopper, editors, Privacy Enhancing
Technologies, volume 6205 of Lecture Notes in
Computer Science, pages 236–252. Springer, 2010.
Z. Stone, T. Zickler, and T. Darrell. Toward large-scale
face recognition using social network context.
Proceedings of the IEEE, 98(8):1408–1415.
N. Mavridis, W. Kazmi, and P. Toulis. Friends with
faces: How social networks can enhance face recognition
and vice versa. In Computational Social Network
Analysis, Computer Communications and Networks,
pages 453–482. Springer London, 2010.
P. Viola and M. Jones. Robust real-time object detection.
In International Journal of Computer Vision, 2001.
K.-B. Duan and S. S. Keerthi. Which is the best
multiclass svm method? an empirical study. In
Proceedings of the 6th international conference on
Multiple Classifier Systems, MCS’05, pages 278–285,
Berlin, Heidelberg, 2005. Springer-Verlag.
B. Goethals, S. Laur, H. Lipmaa, and T. Mielikinen. On
private scalar product computation for privacypreserving
data mining. In Proceedings of the 7th Annual
International Conference in Information Security and
Cryptology, pages 104–120. Springer-Verlag, 2004.
A.C. Squicciarini, M. Shehab, and F. Paci. Collective
privacy management in social networks. In Proceedings
of the 18th International Conference on World Wide
Web, WWW ’09, pages 521–530, New York, NY, USA,
ACM.
Nithya Sara Joseph, “Collaborative data sharing in online
social network resolving privacy risk and sharing loss”.
N. J. Belkin and W. B. Croft, “Information filtering and
information retrieval: Two sides of the same coin?”
Communications of the ACM, vol. 35, no. 12, pp. 29–38,
P. J. Denning, “Electronic junk,” Communications of the
ACM, vol. 25, no. 3, pp. 163–165, 1982.
P. W. Foltz and S. T. Dumais, “Personalized information
delivery: An analysis of information filtering methods,”
Communications of the ACM, vol. 35, no. 12, pp. 51–60,
P. J. Hayes, P. M. Andersen, I. B. Nirenburg, and L. M.
Schmandt, “Tcs: a shell for content-based text
categorization,” in Proceedings of 6th IEEE Conference
on Artificial Intelligence Applications (CAIA- 90). IEEE
Computer Society Press, Los Alamitos, US, 1990, pp.
–326.
C. Apte, F. Damerau, S. M. Weiss, D. Sholom, and M.
Weiss, “Automated learning of decision rules for text
categorization,” Transactions on Information Systems,
vol. 12, no. 3, pp. 233–251, 1994.
S. Dumais, J. Platt, D. Heckerman, and M. Sahami,
“Inductive learning algorithms and representations for
text categorization,” in Proceedings of Seventh
International Conference on Information and Knowledge
Management (CIKM98), 1998, pp. 148–155.
D. D. Lewis, “An evaluation of phrasal and clustered
representations on a text categorization task,” in
Proceedings of 15th ACM International Conference on
Research and Development in Information Retrieval
(SIGIR-92), N. J. Belkin, P. Ingwersen, and A. M.
Pejtersen, Eds. ACM Press, New York, US, 1992, pp.
–50.
B. Sriram, D. Fuhry, E. Demir, H. Ferhatosmanoglu, and
M. Demirbas, “Short text classification in twitter to
improve information filtering,” in Proceeding of the 33rd
International ACM SIGIR Conference on Research and
Development in Information Retrieval, SIGIR 2010,
, pp. 841–842.
D. D. Lewis, Y. Yang, T. G. Rose, and F. Li, “Rcv1: A
new benchmark collection for text categorization
research,” Journal of Machine Learning Research, 2004.
F. Sebastiani, “Machine learning in automated text
categorization,” ACM Computing Surveys, vol. 34, no.
, pp. 1–47, 2002.
Refbacks
- There are currently no refbacks.
Copyright © IJETT, International Journal on Emerging Trends in Technology