• Corpus ID: 53375586

Survey on Privacy Preserving in Social Networks

  title={Survey on Privacy Preserving in Social Networks},
  author={S. Mayil and Dr. M. Vanitha},
The development of online social networks and the release of data network resulting in the risk of leakage of personal confidential information. This requires privacy protection before the data network is published by the service provider. Data privacy online social networks are important in recent years. Therefore, this research is still in its infancy. This article describes the generalization techniques of anonymous social networking data with sufficient privacy for harsh environments while… 


Privacy Preserving in Social Networks Against Sensitive Edge Disclosure
Two privacypreserving strategies are developed which can not only keep a close shortest path length and exactly the same shortest path for certain selected paths, but also maximize the weight privacy preservation, demonstrated by the mathematical analysis and experiments.
Safebook: A privacy-preserving online social network leveraging on real-life trust
The suggested approach adopts a decentralized architecture relying on cooperation among a number of independent parties that are also the users of the online social network application to ensure users' privacy in the face of potential privacy violations by the provider.
On the Impact of Social Network Profiling on Anonymity
This paper proposes a Bayesian method to combine multiple available sources of information and obtain an overall measure of anonymity, and studies the effects of network size to find that anonymity degrades when the network grows.
A New Approach to Manage Security against Neighborhood Attacks in Social Networks
  • B. Tripathy, G. K. Panda
  • Computer Science
    2010 International Conference on Advances in Social Networks Analysis and Mining
  • 2010
This paper proposes a modification to Bin Zhou and Pei's algorithm for the network anonymization which can handle the situations in which an adversary has knowledge about vertices in the second or higher hops of a vertex, in addition to its immediate neighbors.
Privacy suites: shared privacy for social networks
A new paradigm is proposed which allows users to easily choose "suites" of privacy settings which have been specified by friends or trusted experts, only modifying them if they wish, which could dramatically increase the privacy protection that most users experience with minimal time investment.
Social Circles: Tackling Privacy in Social Networks
This paper proposes to build—and evaluate the usability of—an automated grouping technique that analyzes the user’s social graph for social circles, i.e., clusters of densely and closely connected friends.
NOYB: privacy in online social networks
It is demonstrated that NOYB is practical and incrementally deployable, requires no changes to or cooperation from an existing online service, and indeed can be non-trivial for the online service to detect.
Photo-based authentication using social networks
Lineup is a system that uses the social network graph in Facebook and auxiliary information to build a photo-based Web site authentication framework that leverages the concept of CAPTCHAs, programs that are designed to distinguish bots from human users.
SybilGuard: Defending Against Sybil Attacks via Social Networks
This paper presents SybilGuard, a novel protocol for limiting the corruptive influences of sybil attacks, based on the ldquosocial networkrdquo among user identities, where an edge between two identities indicates a human-established trust relationship.