A Review on Secure Wall Post Sharing In Social Networking Environment

Abhay R. Gaidhani

Abstract


With growing popularity of social networking sites its usage is
tremendously enhanced. Due to such massive usage, it has
some privacy issues that it doesn’t have control on the
unwanted post that displayed on the users or their friends
wall. Certain users addicted to share their photos on OSN. But
sometimes there may be chances to leak their private photos
when they allowed displaying them without any secrecy.
Recently, social networking sites like facebook improved their
privacy levels that user can have their own control on their
profile. To provide privacy for users wall rule-based system is
implemented. It allows customize filtering for users profiles.
Text based filtering techniques can provide message filtering
based on the content. Some sort text classifier techniques
provide analysis of message content. Whereas, FR system
automatically ide8ntify users shared images and videos. By
analyzing picture present in shared image or video, decision
can be taken that whether to share or block the content with
respect to user policies. System may also provide facility to
auto blocking of user. If user always try to post video of
certain person without his/her permission more than three
times then user will get automatically blocked. It will evaluate
the system performance on large dataset and can calculate
accuracy of the system. To control privacy leakage in social
networking user may have some base to give permission
before tagging or posting his/her photos or co-photos. FRsystem
for privacy management identifies co-photos of owner.


Full Text:

PDF

References


Altman. Privacy regulation: Culturally universal or

culturally specific? Journal of Social Issues, 33(3):66–84,

Thomas, C. Grier, and D. M. Nicol. unfriendly: Multiparty

privacy risks in social networks. In M. J. Atallah

and N. J. Hopper, editors, Privacy Enhancing

Technologies, volume 6205 of Lecture Notes in

Computer Science, pages 236–252. Springer, 2010.

Z. Stone, T. Zickler, and T. Darrell. Toward large-scale

face recognition using social network context.

Proceedings of the IEEE, 98(8):1408–1415.

N. Mavridis, W. Kazmi, and P. Toulis. Friends with

faces: How social networks can enhance face recognition

and vice versa. In Computational Social Network

Analysis, Computer Communications and Networks,

pages 453–482. Springer London, 2010.

P. Viola and M. Jones. Robust real-time object detection.

In International Journal of Computer Vision, 2001.

K.-B. Duan and S. S. Keerthi. Which is the best

multiclass svm method? an empirical study. In

Proceedings of the 6th international conference on

Multiple Classifier Systems, MCS’05, pages 278–285,

Berlin, Heidelberg, 2005. Springer-Verlag.

B. Goethals, S. Laur, H. Lipmaa, and T. Mielikinen. On

private scalar product computation for privacypreserving

data mining. In Proceedings of the 7th Annual

International Conference in Information Security and

Cryptology, pages 104–120. Springer-Verlag, 2004.

A.C. Squicciarini, M. Shehab, and F. Paci. Collective

privacy management in social networks. In Proceedings

of the 18th International Conference on World Wide

Web, WWW ’09, pages 521–530, New York, NY, USA,

ACM.

Nithya Sara Joseph, “Collaborative data sharing in online

social network resolving privacy risk and sharing loss”.

N. J. Belkin and W. B. Croft, “Information filtering and

information retrieval: Two sides of the same coin?”

Communications of the ACM, vol. 35, no. 12, pp. 29–38,

P. J. Denning, “Electronic junk,” Communications of the

ACM, vol. 25, no. 3, pp. 163–165, 1982.

P. W. Foltz and S. T. Dumais, “Personalized information

delivery: An analysis of information filtering methods,”

Communications of the ACM, vol. 35, no. 12, pp. 51–60,

P. J. Hayes, P. M. Andersen, I. B. Nirenburg, and L. M.

Schmandt, “Tcs: a shell for content-based text

categorization,” in Proceedings of 6th IEEE Conference

on Artificial Intelligence Applications (CAIA- 90). IEEE

Computer Society Press, Los Alamitos, US, 1990, pp.

–326.

C. Apte, F. Damerau, S. M. Weiss, D. Sholom, and M.

Weiss, “Automated learning of decision rules for text

categorization,” Transactions on Information Systems,

vol. 12, no. 3, pp. 233–251, 1994.

S. Dumais, J. Platt, D. Heckerman, and M. Sahami,

“Inductive learning algorithms and representations for

text categorization,” in Proceedings of Seventh

International Conference on Information and Knowledge

Management (CIKM98), 1998, pp. 148–155.

D. D. Lewis, “An evaluation of phrasal and clustered

representations on a text categorization task,” in

Proceedings of 15th ACM International Conference on

Research and Development in Information Retrieval

(SIGIR-92), N. J. Belkin, P. Ingwersen, and A. M.

Pejtersen, Eds. ACM Press, New York, US, 1992, pp.

–50.

B. Sriram, D. Fuhry, E. Demir, H. Ferhatosmanoglu, and

M. Demirbas, “Short text classification in twitter to

improve information filtering,” in Proceeding of the 33rd

International ACM SIGIR Conference on Research and

Development in Information Retrieval, SIGIR 2010,

, pp. 841–842.

D. D. Lewis, Y. Yang, T. G. Rose, and F. Li, “Rcv1: A

new benchmark collection for text categorization

research,” Journal of Machine Learning Research, 2004.

F. Sebastiani, “Machine learning in automated text

categorization,” ACM Computing Surveys, vol. 34, no.

, pp. 1–47, 2002.


Refbacks

  • There are currently no refbacks.


Copyright © IJETT, International Journal on Emerging Trends in Technology