SlideShare a Scribd company logo
1 of 16
Download to read offline
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
340
POSN: PRIVATE INFORMATION PROTECTION IN ONLINE SOCIAL
NETWORKS
Muhanad A. Al-Khalisy 1
, Dr.Haider K. Hoomod2
1
Institute for Post Graduate Studies, Iraqi Commission for Computer & Informatics,
Baghdad, Iraq
2
Computer Science Department, University of Mustansiriyah, Baghdad, Iraq
ABSTRACT
Social relationships and networking are key components of human life. Online social
networking sites (OSNs) offers a new, easy and inexpensive way to maintain already existing
relationships and present oneself to others by offer people new and varied ways to
communicate via the internet. The increasing number of actions in online services gives a rise
to privacy concerns and risks. There are some serious privacy problems that need to be
resolved in existing OSN. There has to be methods to protect user-provided data. A fully
flexible privacy and security management should exist to protect private data against
attackers and unauthorized users. In this work a Protected Online Social Network (POSN)
developed as web 2.0 technology, privacy and security management techniques used to
protect user data. The system protects user private data with three cryptographic mechanisms,
RC4 and AES cipher for data encryption and public key RSA cryptographic for key
encryption. The work shows how POSN provide the functionality of OSN with additional
privacy benefits and acceptable performance even with cryptographic techniques used.
Keywords: POSN, OSN, Social Networks, RC4, AES, RSA, Privacy, Web 2.0.
1. INTRODUCTION
The issues of social networks have played an important role in social life and people
connect online in many ways. Social networking sites, e-mail, instant messaging, video- and
photo-sharing sites, and comment posting are all tools that help people communicate and
socialize with each other. Each connection is a piece of the larger arena of online social
networking [1].
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING
& TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 4, Issue 2, March – April (2013), pp. 340-355
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2013): 6.1302 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
341
Online social networks (OSNs) have become a de facto portal for Internet access for
millions of users. These networks help users share information with their friends. In recent
years, a dramatic increase of online social networks have seen such as Facebook and
MySpace just to name a few; where one can set up a profile about oneself, invite friends to
join the site and link these people together with the purpose of sharing information and
resources [2].
It is believed that social networks have challenges for mankind as well as its
opportunities has a special dynamic attribute to human social development. To provide more
evidence for this point, online social networks have both positive and negative sides,
definitely, it is cheaper to use online social networking for both personal and business use
because most of the services are free, and at the same time, users can easily develop their
social life. However, for the negative side, sometimes users have to be extra-careful in using
online social networks. This is because; there are many reporting cases of hacking of one’s
identity. Besides, this negative consequence, social networking sites (SNS) are online
environments in which people create self-descriptive profiles and then make links with other
people they know on the site [1].
While most of the leading social platforms have primitives for providing privacy in
the platform and the applications they are insufficient. There are some serious privacy
problems that need to be resolved in existing OSN [3].
2. SOCIAL NETWORK PRIVACY AND SECURITY
Through OSNs the users share personal identifying information about themselves as
the basic purpose of online interaction and communication. But they are unaware of who will
get access to their private information and in which limit.
Information is vulnerable to be revealed to a group of people unpredictably as the
digital information can be easily copied and stored indefinitely. It will be a threat to the users
information is revealed through different ways, and gets in the hand of the untargeted people
[4].
2.1 Social Network Privacy
Privacy is the right or opportunity to decide who has access to user personal
information and how that information should be used. Information privacy is “an individual’s
claim to control the terms under which personal information identifiable to the individual is
acquired, disclosed or used.
The actual privacy risks are believed to occur when users disclose identifiable
information about themselves online to people who they do not know or normally (that is,
offline) would not trust [4].
2.2 Threats of Online Social Networking
The casual posting of personal information on a digital medium might create a
permanent record of the users’ indiscretions and failures of judgments that can be exploited
by the third-party commentary to produce a number of threats to the users. The potential
threats that the users might face can be broadly categorized in four groups: Privacy related
threats, OSN variants of traditional network and information security threats, Identity related
threats and Social threats [5].
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
342
In short two main classes of privacy threats distinguished: those that involve
disclosure to other users (registered or not) that this paper will focus on it, and those that
originate from the OSN service provider’s side.
3. TECHNOLOGIES OF THE PROPOSED POSN SYSTEM ARCHITECTURE
The development of the proposed Protected Online Social Network system composed
of two parts, online social network site development and privacy management development.
Online social network site developed as Web 2.0 technology application using PHP,
MySQL, Ajax and JQuery techniques. Privacy setting management developed based users
privacy levels and with using of symmetric, asymmetric encryption with key management
techniques.
3.1 Privacy Techniques
The proposed POSN system used many techniques to achieve more privacy for
system users.
3.1.1 Privacy User Levels
The proposed system has two major privacy management settings that allow users to
control and manage privacy, these are:
A. Profile Privacy Management Setting
Profile management has four levels for mange the user profile private information
these are:
• Public Level: this level makes the information for the user’s profile public to all
other user.
• OnlyMe Level: this level makes the information for the user’s profile hidden
(private) to all other user.
• Friends level: this level make the information for the user’s profile hidden (private)
to all other user except to the friends.
• Customs level: this level make the information for the user’s profile hidden (private)
to all other user except to some friends of the user.
B. Share Privacy Management Setting
Share management has three levels for mange the user share information these are:
• Public level: this level makes the share information (comments, posts, upload) for
the user public to all other user.
• Friends level: this level make the share information (comments, posts, upload) for
the user hidden (private) to all other user except to the friends.
• Customs level: this level make the share information for the user hidden (private) to
all other user except to some friends of the user.
To make sure that the user make manage to the privacy setting selection for all his
friends, the proposed system enforce the user to select the privacy setting every time when
he decide to add new friend to his list to ensure every friend have suitable privacy. Figure 2
shows POSN privacy levels.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
343
The proposed POSN system is automatically managing the data access (data view) depend
on rules based privacy settings. These rules are :
3.2 Cryptography Techniques
One of the major problems that the proposed POSN system focuses on it is the
members profile sensitive data, how this data become more secure in the database, additional
to the privacy setting management that control who have access to this data and who are not.
The proposed system use cryptographic techniques to encrypt these data in the database to
become more secure and use these technique again to encrypt the key (secret word) used to
encrypt these data to ensure that the process of keys distribution to the members become
safely. This section will explain cryptography techniques that proposed POSN system used.
Figure 2 Proposed POSN Privacy Levels
1- IF Friend Profile Privacy = “Public” SET View Profile = “True”;
2- IF Friend Share Privacy = “Public” SET View Share = “True”;
3- IF Friend Profile Privacy = “Only Me” SET View Profile = “False”;
4- IF Friend Profile Privacy = “Friend” AND Is_Friend = “True” SET
View Profile = “True”;
5- IF Friend Share Privacy = “Friend” AND Is_Friend = “True” SET
View Share = “True”;
6- IF Friend Profile Privacy = “Custom” GET Related Friend Privacy: (
IF Related Friend Profile Privacy = “Only Me” SET View Profile = ”False”;
IF Related Friend Profile Privacy = “Visible” SET View Profile = “True”;
IF Related Friend Share Privacy = “Only Me” SET View Profile = ”False”;
IF Related Friend Share Privacy = “Visible” SET View Profile = “True”;
).
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
344
3.2.1 Combination Encryption
Every encryption algorithm have strong and weakness points, some of them related to
the performance metrics were encryption throughput, CPU work load, energy cost and key
size variation, for example the RC4 is fast and energy efficient for encrypting large packets.
However, AES was more efficient than RC4 for a smaller packet size [6]. A new hybrid
cipher can develop by combining the characteristics of two ciphers namely AES and RC4 [7].
The characteristics of both ciphers are studied and a new cipher combining the characteristics
of both ciphers is generated which is more secure than the original ciphers [7]. For this
reasons, the proposed POSN system will use the above hybrid cipher (RC4AES) to encrypt
the sensitive data with random key generated by the proposed system. Figure 4 shows
proposed POSN hybrid cipher block diagram.
3.2.2 OpenSSL EVP Public Key Interface
EVP is an OpenSSL API (A Programming Interface) that provides a high-level
interface to cryptographic functions. EVP is a high-level interface to message digests,
symmetric ciphers, and public key algorithms [8].
The EVP interface also provides an interface for enveloping data using RSA keys.
Data enveloping is the process of encrypting a chunk of data with RSA, typically for securely
sending it to a recipient [9].
One of the features offered by the EVP interface for data encryption is the ability to
encrypt the same data using several public keys. Figure 5 shows EVP interface data sealing /
unsealing (opening) block diagram.
Figure 4 Proposed Hybrid Cipher Block Diagram
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
345
4. DESIGN AND IMPLEMENTATION OF THE POSN SYSTEM
The proposed POSN design consists of hardware and software components that both
form the whole web site design. Hardware design encompasses the hardware components
used in proposed web site, while software design explains the application design for the web
site. Figure 6 shows the block diagram that explains the main architecture of the proposed
POSN.
Figure 5 EVP Interface Data Sealing / Unsealing (Opening) Block Diagram
Figure 6 Proposed POSN Main Architecture
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
346
4.1 The Proposed POSN System Overview
The constitution of the proposed POSN system’s design to be contains the integration
of the technologies described in section two; Figure 8 depicts the components of this design
where the system in addition to main modules it contains two Substantial modules (privacy
management module and cryptographic module) .
4.2 Application Design
The application design perform the whole structure of the proposed Protected Online
Social Network (POSN) site, including all site web pages design, web forms used for
gathering information and selection menus used by users.
The proposed POSN application design divided into two parts: Front-End Area (User
Area design and Encryptions system (cryptography) design.
4.2.1 Front-End Area Design
Front-End area design consists of the following parts
A-User authentication and user registration
B-Adding new post.
C-Adding comments to post.
D-Share media.
E-Change Privacy setting.
F-Add and Delete Friends.
G-Send /receive Private Messages.
H-Edit Profile.
I-Edit Account Setting.
J-Search for a member (Friend).
Figure 8 The Components of The Proposed POSN System.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
347
The proposed POSN site is accessed at the page index.php (the home page) where any
user can access this page. Any user tries to access another page directly from URL he will be
restricted to access the home page. In this page, visitor can view post titles, and do search for
members. Only public post or comments appear on the home page in addition to the name of
the post’s author and the date of creation. Figure 9 shows the proposed POSN home page.
4.3 Encryptions Process Design
The proposed POSN system encrypted the private data (sensitive data) using
symmetric RC4 encryption with a randomly generated secret key (session key), which is then
encrypted using RSA Asymmetric key encryption with multiple 1024 bit public keys. The
encrypted data is known as sealed data, and the encrypted secret key is known as an envelope
key that will be distribute to the proposed POSN members or friends for use in decryption
process. The proposed system re-encrypt the sealed data using AES encryption with new 128
bit randomly key generated called AES key to generate the encrypted data that called
(Encrypted Private Data). To decrypt the data, the recipient must have the related envelope
key, the AES key and the related private key. The function conveniently allows for multiple
recipients by accepting an array of public keys. Figure 11 shows the proposed POSN private
data encryption block diagram while figure 12 shows the proposed POSN private data
decryption block diagram.
Figure 9 the Proposed POSN Home Page (Index.php)
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
348
The proposed system will generate two pair keys (private key and public key) for
every user, these keys will use for RSA 1024 bit asymmetrically encryption to encrypt the
random key (which is relatively small) that will be use to encrypt private data as mention
before.
For add more security to the sensitive data, when any member try to add new friend to
his friend list the proposed system will decrypt and encrypt data again and generate new
envelop keys for all member’s friends and redistribute these envelop keys again.
When some member try to access profile information for his friend and this member
have access right privacy (as mention in section 3 privacy user levels), the proposed system
will check for related envelop key for this member in friend envelop key table. If it matches,
the envelop key will be used with the member’s private key to decrypt the data. But if the
proposed system did not find any envelop key related matches, the system will display
encrypted data message to the member.
Figure 11 Proposed POSN Private Data Encryption Block Diagram
Figure 12 Proposed POSN Private Data Decryption Block Diagram
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
349
5. EVALUATION OF THE PROPOSED SYSTEM
This section proceeds with results evaluation of the proposed POSN implementation.
Then, it presents the performance evaluation.
5.1 Privacy Evaluation
After the implementation of the proposed POSN system, privacy evaluation tests
measure. The proposed POSN installed (published) in the real environment ISP (Internet
service provider). Many user accounts were created (registered), each user has different
privacy setting, some of them are friends, group of friends and the other was not (public
user).
Many activities from the users happened during evaluation time. Friend request, add
as friend, remove friend, change privacy, text post, media post and post comments are
common activates between those users. Those users try to feed back their opinions about the
privacy control for the proposed POSN by post their comments on it.
Many users show their acceptance about how the proposed privacy setting control
their profile sensitive data access especially when they used the proposed POSN customs
privacy setting facilities. They mention how the proposed system enforce them to select a
perpetrate selection for their privacy setting in the first try to login to the proposed system
after registrations, by this the proposed system erase the problem of user unawareness of
what his default privacy setting was.
Some user also mention how the proposed system direct them to set the privacy
setting for every user they try to add as friend, by this the proposed system prevent the user
from the problem of queuing many friends in his list without setting or knowing his privacy
setting for them. Figure 13 shows the result page of how the user “evaluation user 1” sees his
profile information.
Figure 13 How Evaluation User 1 See His Profile Page
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
350
Figure 14 shows the result page of how non friends or public users see the same
profile from inside or outside the proposed POSN with restricted information. In this case the
user selected “only me” profile privacy setting.
Figure 15 show how “evaluation user 1” profile page look like to public or non
register user when they ask for it, in this case the user previously selected “public view”
setting for his profile privacy. Also the figure show how some profile sensitive information
still invisible or encrypted in spite of the user selected public view setting for his profile. By
this the proposed system protects private sensitive user data from any intruders or malicious
user in case of the member unawareness or mistakenly set “public view” settings to his
profile.
Figure 14 How Public Users See Evaluation User 1 Profile Page
Figure 15 How Public Users See Evaluation User 1 Profile Page
In Case of “Public View” Privacy Setting Set
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
351
In case of friend’s relation with general “friends” privacy setting set, (evaluation user
2 a friend with evaluation user 1). Figure 16 show how “evaluation user 2” sees the
“evaluation user 1’s” profile information, the Proposed POSN display all information to all
“evaluation user 1’s” friend.
In case of friend relation with “custom” privacy setting set. Figure 17 show how
“evaluation user 2” sees the “evaluation user 1’s” profile information, the proposed POSN
prevent “evaluation user 2” from see “evaluation user 1’s” profile information but it let him
to see share information only (user post) in spite of the two user was a friend. By this the
proposed POSN solve the problem of how the user can classify or categorize his friends. This
done by let the user to set special privacy for every friend in his list separately, so everyone in
his list have its own privacy setting set.
Figure 16 How Evaluation User 2 See Evaluation User 1’s Profile
Page In Case of General “Friend View” Privacy Setting Set
Figure 17 How Evaluation User 2 See Evaluation User 1’s Profile
Page In Case of “Custom View” Privacy Setting Set
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
352
Table 4 show the privacy setting result of proposed POSN related to user state.
User 1 to User
2 Relation
User 2
Profile
Privacy
User 2
Share
Privacy
Visible
Profile
Data
Visible
Share
Data
Sensitive
Data
Visible
Non friend Public Public Yes Yes No
Non friend Only me Public No Yes No
Non friend Friend Public No Yes No
Non friend Public Friend Yes No No
Non friend Only me Friend No No No
Non friend Friend Friend No No No
Friend Public Public Yes Yes Yes
Friend Only me Public No Yes No
Friend Friend Public Yes Yes Yes
Friend Public Friend Yes Yes Yes
Friend Only me Friend No Yes No
Friend Friend Friend Yes Yes Yes
Custom friend Only me Only me No No No
Custom friend Only me Visible No Yes No
Custom friend Visible Only me Yes No Yes
Custom friend Visible Visible Yes Yes Yes
5.2 Performance Evaluation
The processing and storage requirements of Proposed POSN with measure the time to
render POSN encrypted web pages was quantified.
The evaluated of POSN implementation done on a desktop computer using a core i3
2.10 GHz processor and 4 GB of RAM. The desktop, storage service, and application server
are connected through a router which introduces an artificial delay that represents a case
where the storage service is far away from the user.
In order to analyze the performance of the implementation, it should focus on the
cryptographic algorithms that represent the most expensive operations and the response of the
tiny link server, which include the network latency and server process.
A profile for “Ali” was built, who was given 25 friends. Additionally, there were 70
strangers user. The database maintained tables for user data, friend lists, friends privacy and
encryption keys, all of which were filled with pieces of fake data. User sensitive data are
encrypted using RC4AES with key encryption using RSA through the PHP Openssl
cryptographic library functions extension. On the test machine, it takes 0.7 milliseconds on
average to encrypt a 16 Bytes user sensitive data block, which supports over 1400 sensitive
data block encryptions per second. Table 5 show the overhead of the encrypted data
regarding the original data.
The performance is determined on the basis of the time taken to encrypt and decrypt
the data. Table 6 show Performance of ciphers base time vs. data size.
Table 4 Privacy Setting Result of Proposed POSN Related to User Relation state
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
353
Original Message (bytes)
Encrypted Time (ms)
16 0.7
32 0.11
64 0.13
128 0.16
255 0.17
There is a substantial increase in the size of the stored data, and this will affect both
the storage capacity of the storage services and the network resources required to transfer
data. The storage services are inherently distributed, so they should be able to scale to support
the needs of the system.
Also the original data are texts dealing with social networks typical profile
information like “email, website, gender, employ etc...” Because it is text-based data, the
overhead imposed can be easily mitigated if the storage server utilizes some text compression
technique before the storage is made.
Original Message (bytes) Encrypted Message (bytes)
16 44
32 64
64 108
128 192
255 364
The page load time of proposed POSN was measure. Where load time for profile page with
decryption for 16 byte data item (sensitive data) was average about 0.050 second. Table 7
shows profile page load time vs. data size.
Page load times increase linearly with the size of data item or the number of elements in the
profile need to encrypt. The median page load time is 0.060 seconds and the maximum is
0.100 seconds. Most pages consist of a few, small entries, so most are loaded quickly. So that
the time indicating that retrieving keys and decryption process is not too expensive.
Table 5 Overhead of the Encrypted Data Regarding the Original Data
Table 6 Performance of Ciphers Base Time vs. Data Size
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
354
The evaluations show that it can achieve privacy in online social networks with acceptable
performance even with cryptographic techniques used.
6. CONCLUSIONS
A proposed protected online social network (POSN) site that was developed as web
2.0 technologies application with privacy management and cryptography techniques showed
that it can successfully protect private information in online social network from user-related
privacy threats.
The proposed POSN will solve the problem of how the user can classify or categorize
his friends by using custom setting.
The proposed system used the RSA in order to achieve the same ends by encrypting a
symmetric key which is used to perform actual data encryption and decryption.
The proposed POSN re-encrypts the private data every time that the user try to add
new friend to his list, this will add more security power to the system by regenerating new
key for the user.
The median page load times for profile page in the proposed POSN is 0.5 seconds and
the median size of the encrypted profile sensitive data is 108 byte. This time indicates that
retrieving keys and decryption process is not too expensive. It shows that one can achieve
privacy in OSNs with an acceptable performance even when cryptographic technique used
and therefore the proposed approach shows that it is possible to be implemented in a real
environment.
7. REFERENCES
[1] Husein Osman Abdullahi,Abdirizaq said Jamaludin bin Ibrahim, “An Investigation
into privacy and Security in Online Social Networking Sites among IIUM Students”,
Kuala Lumpur, Malaysia 2012.
[2] Bo Fu “Trust Management in Online Social Networks” University of Dublin, Trinity
College September 2007.
[3] M.A. Devmane, N.K. Rana “Privacy issues in Online Social Network“, University of
Mumbai India No.13, March 2012.
[4] Suban Raj, Bhandari,”Managing Users in Social Networking Sites”, LAHTI
UNIVERSITY OF APPLIED SCIENCES Business Studies International Business
Information Technology Thesis 2011.
Sensitive Data (bytes) Page Load Time (s)
16 0.050
32 0.060
64 0.080
128 0.090
255 0.100
Table 7 Profile Page Load Time vs. Sensitive Data Size
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
355
[5] C. Infant Louis Richards,” Advanced techniques to overcome the privacy issues and
SNS threats”, Student, Dept. of CSE, Jeppiaar Engineering College, Chennai, India,
ISSN-2250-1797, October 2011.
[6] Nidhi Singhal , J.P.S.Raina,” Comparative Analysis of AES and RC4 Algorithms for
Better Utilization”, Department of Electronics & Communication, July to Aug Issue
2011.
[7] Prabhudesai Keval Ketan , Vijayarajan .V,” An Amalgam Approach using AES and
RC4 Algorithms for Encryption and Decryption”, VIT University, Vellore, Volume
54– No.12, September 2012.
[8] Steve Marquess and Stephen Henson,” User Guide - OpenSSL FIPS Object Module
v2.0Fios”, Defense Advanced Research Projects Agency (DARPA), September 2012.
[9] John Viega, Matt Messier & Pravir Chandra, “Network Security with
OpenSSL,”,Publisher : O'Reilly, ISBN : 0-596-00270-X , June 2002.
[10] Varun Shukla and Abhishek Choubey, “A Comparative Analysis of the Possible
Attacks on RSA Cryptosystem”, International Journal of Electronics and
Communication Engineering & Technology (IJECET), Volume 3, Issue 1, 2012,
pp. 92 - 97, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472.
[11] Rahul Jassal, “Wrapped RSA Cryptography Check on Window Executable using
Reconfigurable Hardware”, International journal of Computer Engineering &
Technology (IJCET), Volume 3, Issue 3, 2012, pp. 291 - 299, ISSN Print: 0976 –
6367, ISSN Online: 0976 – 6375.
[12] Biswajit Tripathy and Jibitesh Mishra, “Protective Measures in E-Commerce to Deal
with Security Threats Arising Out of Social Issues – A Framework”, International
journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 3, 2012,
pp. 46 - 53, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.

More Related Content

What's hot

An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...IOSR Journals
 
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...IJMIT JOURNAL
 
Social network privacy guide
Social network privacy guideSocial network privacy guide
Social network privacy guideYury Chemerkin
 
Blackberry playbook – new challenges
Blackberry playbook – new challengesBlackberry playbook – new challenges
Blackberry playbook – new challengesYury Chemerkin
 
OSINT EXPLOITATION OF UNIVERSITY TWEETS
OSINT EXPLOITATION OF UNIVERSITY TWEETSOSINT EXPLOITATION OF UNIVERSITY TWEETS
OSINT EXPLOITATION OF UNIVERSITY TWEETSMaurice Dawson
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risksParakum Pathirana
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyTom Eston
 
IRJET- ESBA based Privacy Protection in OSCS
IRJET- ESBA based Privacy Protection in OSCSIRJET- ESBA based Privacy Protection in OSCS
IRJET- ESBA based Privacy Protection in OSCSIRJET Journal
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networksTannistho Ghosh
 
Improving Cyber Security with VMware NSX
Improving Cyber Security with VMware NSXImproving Cyber Security with VMware NSX
Improving Cyber Security with VMware NSXDavid Hopland
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network SecurityBrian Honan
 
How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?Blue Coat
 
At Your Expense
At Your ExpenseAt Your Expense
At Your ExpenseDan Oblak
 

What's hot (18)

An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
 
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
 
D01112030
D01112030D01112030
D01112030
 
Threats of Computer System and its Prevention
Threats of Computer System and its PreventionThreats of Computer System and its Prevention
Threats of Computer System and its Prevention
 
Social network privacy guide
Social network privacy guideSocial network privacy guide
Social network privacy guide
 
Blackberry playbook – new challenges
Blackberry playbook – new challengesBlackberry playbook – new challenges
Blackberry playbook – new challenges
 
OSINT EXPLOITATION OF UNIVERSITY TWEETS
OSINT EXPLOITATION OF UNIVERSITY TWEETSOSINT EXPLOITATION OF UNIVERSITY TWEETS
OSINT EXPLOITATION OF UNIVERSITY TWEETS
 
Mobile Cyber Security
Mobile Cyber SecurityMobile Cyber Security
Mobile Cyber Security
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safely
 
IRJET- ESBA based Privacy Protection in OSCS
IRJET- ESBA based Privacy Protection in OSCSIRJET- ESBA based Privacy Protection in OSCS
IRJET- ESBA based Privacy Protection in OSCS
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networks
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Improving Cyber Security with VMware NSX
Improving Cyber Security with VMware NSXImproving Cyber Security with VMware NSX
Improving Cyber Security with VMware NSX
 
A041201010
A041201010A041201010
A041201010
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?
 
At Your Expense
At Your ExpenseAt Your Expense
At Your Expense
 

Viewers also liked

Measurement of tact necessary to prevent industrial disputes leading to loss ...
Measurement of tact necessary to prevent industrial disputes leading to loss ...Measurement of tact necessary to prevent industrial disputes leading to loss ...
Measurement of tact necessary to prevent industrial disputes leading to loss ...IAEME Publication
 
Strong coupling model for high tc copper-oxide superconductors
Strong coupling model for high tc copper-oxide superconductorsStrong coupling model for high tc copper-oxide superconductors
Strong coupling model for high tc copper-oxide superconductorsIAEME Publication
 
Design and analysis of plate heat exchanger with co2 and r134a as working f
Design and analysis of plate heat exchanger with co2 and r134a as working fDesign and analysis of plate heat exchanger with co2 and r134a as working f
Design and analysis of plate heat exchanger with co2 and r134a as working fIAEME Publication
 
Effect of e quality control on tolerance limits in wmm & dbm in highway const...
Effect of e quality control on tolerance limits in wmm & dbm in highway const...Effect of e quality control on tolerance limits in wmm & dbm in highway const...
Effect of e quality control on tolerance limits in wmm & dbm in highway const...IAEME Publication
 
Studies on chemical and geotechnical properties of marine sand
Studies on chemical and geotechnical properties of marine sandStudies on chemical and geotechnical properties of marine sand
Studies on chemical and geotechnical properties of marine sandIAEME Publication
 
Self efficacy, interests, and outcome expectations a holistic attitude assess...
Self efficacy, interests, and outcome expectations a holistic attitude assess...Self efficacy, interests, and outcome expectations a holistic attitude assess...
Self efficacy, interests, and outcome expectations a holistic attitude assess...IAEME Publication
 
Determination of physico chemical properties of castor biodiesel a potential
Determination of physico chemical properties of castor biodiesel  a potentialDetermination of physico chemical properties of castor biodiesel  a potential
Determination of physico chemical properties of castor biodiesel a potentialIAEME Publication
 
Three phase grid connected inverter using current
Three phase grid connected inverter using currentThree phase grid connected inverter using current
Three phase grid connected inverter using currentIAEME Publication
 
Curricula challenges of technical and management education
Curricula challenges of technical and management educationCurricula challenges of technical and management education
Curricula challenges of technical and management educationIAEME Publication
 
Steganography based on random pixel selection for efficient data hiding 2
Steganography based on random pixel selection for efficient data hiding 2Steganography based on random pixel selection for efficient data hiding 2
Steganography based on random pixel selection for efficient data hiding 2IAEME Publication
 
A novel ppdm protocol for distributed peer to peer information sources
A novel ppdm protocol for distributed peer to peer information sourcesA novel ppdm protocol for distributed peer to peer information sources
A novel ppdm protocol for distributed peer to peer information sourcesIAEME Publication
 
Analysis and design of three legged 400 kv double circuit steel transmission
Analysis and design of three legged 400 kv double circuit steel transmissionAnalysis and design of three legged 400 kv double circuit steel transmission
Analysis and design of three legged 400 kv double circuit steel transmissionIAEME Publication
 
Achieving sustainable competitive advantage through resource configur
Achieving sustainable competitive advantage through resource configurAchieving sustainable competitive advantage through resource configur
Achieving sustainable competitive advantage through resource configurIAEME Publication
 
Beaver point lodge 2009 v4
Beaver point lodge 2009 v4Beaver point lodge 2009 v4
Beaver point lodge 2009 v4nikkimac2124
 
Postres de navidad
Postres de navidadPostres de navidad
Postres de navidadiesclarin
 
Reporte final de investigación
Reporte final de investigaciónReporte final de investigación
Reporte final de investigaciónLarizza Isais
 
Etnologia i cultura de l’especisme.
Etnologia i cultura de l’especisme.Etnologia i cultura de l’especisme.
Etnologia i cultura de l’especisme.Jesús Frare Garcia
 

Viewers also liked (20)

Effective leadership
Effective leadershipEffective leadership
Effective leadership
 
Measurement of tact necessary to prevent industrial disputes leading to loss ...
Measurement of tact necessary to prevent industrial disputes leading to loss ...Measurement of tact necessary to prevent industrial disputes leading to loss ...
Measurement of tact necessary to prevent industrial disputes leading to loss ...
 
Strong coupling model for high tc copper-oxide superconductors
Strong coupling model for high tc copper-oxide superconductorsStrong coupling model for high tc copper-oxide superconductors
Strong coupling model for high tc copper-oxide superconductors
 
Design and analysis of plate heat exchanger with co2 and r134a as working f
Design and analysis of plate heat exchanger with co2 and r134a as working fDesign and analysis of plate heat exchanger with co2 and r134a as working f
Design and analysis of plate heat exchanger with co2 and r134a as working f
 
Effect of e quality control on tolerance limits in wmm & dbm in highway const...
Effect of e quality control on tolerance limits in wmm & dbm in highway const...Effect of e quality control on tolerance limits in wmm & dbm in highway const...
Effect of e quality control on tolerance limits in wmm & dbm in highway const...
 
Studies on chemical and geotechnical properties of marine sand
Studies on chemical and geotechnical properties of marine sandStudies on chemical and geotechnical properties of marine sand
Studies on chemical and geotechnical properties of marine sand
 
Self efficacy, interests, and outcome expectations a holistic attitude assess...
Self efficacy, interests, and outcome expectations a holistic attitude assess...Self efficacy, interests, and outcome expectations a holistic attitude assess...
Self efficacy, interests, and outcome expectations a holistic attitude assess...
 
Determination of physico chemical properties of castor biodiesel a potential
Determination of physico chemical properties of castor biodiesel  a potentialDetermination of physico chemical properties of castor biodiesel  a potential
Determination of physico chemical properties of castor biodiesel a potential
 
Three phase grid connected inverter using current
Three phase grid connected inverter using currentThree phase grid connected inverter using current
Three phase grid connected inverter using current
 
Curricula challenges of technical and management education
Curricula challenges of technical and management educationCurricula challenges of technical and management education
Curricula challenges of technical and management education
 
Steganography based on random pixel selection for efficient data hiding 2
Steganography based on random pixel selection for efficient data hiding 2Steganography based on random pixel selection for efficient data hiding 2
Steganography based on random pixel selection for efficient data hiding 2
 
A novel ppdm protocol for distributed peer to peer information sources
A novel ppdm protocol for distributed peer to peer information sourcesA novel ppdm protocol for distributed peer to peer information sources
A novel ppdm protocol for distributed peer to peer information sources
 
Analysis and design of three legged 400 kv double circuit steel transmission
Analysis and design of three legged 400 kv double circuit steel transmissionAnalysis and design of three legged 400 kv double circuit steel transmission
Analysis and design of three legged 400 kv double circuit steel transmission
 
Achieving sustainable competitive advantage through resource configur
Achieving sustainable competitive advantage through resource configurAchieving sustainable competitive advantage through resource configur
Achieving sustainable competitive advantage through resource configur
 
Decl u d_humanosversointernet
Decl u d_humanosversointernetDecl u d_humanosversointernet
Decl u d_humanosversointernet
 
Beaver point lodge 2009 v4
Beaver point lodge 2009 v4Beaver point lodge 2009 v4
Beaver point lodge 2009 v4
 
Postres de navidad
Postres de navidadPostres de navidad
Postres de navidad
 
Memoria 2013 san paio
Memoria 2013 san paioMemoria 2013 san paio
Memoria 2013 san paio
 
Reporte final de investigación
Reporte final de investigaciónReporte final de investigación
Reporte final de investigación
 
Etnologia i cultura de l’especisme.
Etnologia i cultura de l’especisme.Etnologia i cultura de l’especisme.
Etnologia i cultura de l’especisme.
 

Similar to Posn private information protection in online social networks 2

Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...IRJET Journal
 
Measuring privacy in online social
Measuring privacy in online socialMeasuring privacy in online social
Measuring privacy in online socialijsptm
 
OSN: Privacy Preserving Policies
OSN: Privacy Preserving PoliciesOSN: Privacy Preserving Policies
OSN: Privacy Preserving PoliciesIOSR Journals
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSZac Darcy
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethetecnologico de tuxtepec
 
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...IJITE
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...ijtsrd
 
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...ijsptm
 
Protecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking ApplicationsProtecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking ApplicationsIRJET Journal
 
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...Eswar Publications
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningIRJET Journal
 
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...IRJET Journal
 
Exploring machine learning techniques for fake profile detection in online so...
Exploring machine learning techniques for fake profile detection in online so...Exploring machine learning techniques for fake profile detection in online so...
Exploring machine learning techniques for fake profile detection in online so...IJECEIAES
 
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesIRJET Journal
 
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSA SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSIJCI JOURNAL
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer SystemIRJET Journal
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...CSEIJJournal
 
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...CSEIJJournal
 

Similar to Posn private information protection in online social networks 2 (20)

Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
 
Measuring privacy in online social
Measuring privacy in online socialMeasuring privacy in online social
Measuring privacy in online social
 
OSN: Privacy Preserving Policies
OSN: Privacy Preserving PoliciesOSN: Privacy Preserving Policies
OSN: Privacy Preserving Policies
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethe
 
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
 
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
 
Protecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking ApplicationsProtecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking Applications
 
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
 
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
 
Exploring machine learning techniques for fake profile detection in online so...
Exploring machine learning techniques for fake profile detection in online so...Exploring machine learning techniques for fake profile detection in online so...
Exploring machine learning techniques for fake profile detection in online so...
 
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
 
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSA SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer System
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
 
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
 
204
204204
204
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 

Recently uploaded (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 

Posn private information protection in online social networks 2

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 340 POSN: PRIVATE INFORMATION PROTECTION IN ONLINE SOCIAL NETWORKS Muhanad A. Al-Khalisy 1 , Dr.Haider K. Hoomod2 1 Institute for Post Graduate Studies, Iraqi Commission for Computer & Informatics, Baghdad, Iraq 2 Computer Science Department, University of Mustansiriyah, Baghdad, Iraq ABSTRACT Social relationships and networking are key components of human life. Online social networking sites (OSNs) offers a new, easy and inexpensive way to maintain already existing relationships and present oneself to others by offer people new and varied ways to communicate via the internet. The increasing number of actions in online services gives a rise to privacy concerns and risks. There are some serious privacy problems that need to be resolved in existing OSN. There has to be methods to protect user-provided data. A fully flexible privacy and security management should exist to protect private data against attackers and unauthorized users. In this work a Protected Online Social Network (POSN) developed as web 2.0 technology, privacy and security management techniques used to protect user data. The system protects user private data with three cryptographic mechanisms, RC4 and AES cipher for data encryption and public key RSA cryptographic for key encryption. The work shows how POSN provide the functionality of OSN with additional privacy benefits and acceptable performance even with cryptographic techniques used. Keywords: POSN, OSN, Social Networks, RC4, AES, RSA, Privacy, Web 2.0. 1. INTRODUCTION The issues of social networks have played an important role in social life and people connect online in many ways. Social networking sites, e-mail, instant messaging, video- and photo-sharing sites, and comment posting are all tools that help people communicate and socialize with each other. Each connection is a piece of the larger arena of online social networking [1]. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), pp. 340-355 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2013): 6.1302 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 341 Online social networks (OSNs) have become a de facto portal for Internet access for millions of users. These networks help users share information with their friends. In recent years, a dramatic increase of online social networks have seen such as Facebook and MySpace just to name a few; where one can set up a profile about oneself, invite friends to join the site and link these people together with the purpose of sharing information and resources [2]. It is believed that social networks have challenges for mankind as well as its opportunities has a special dynamic attribute to human social development. To provide more evidence for this point, online social networks have both positive and negative sides, definitely, it is cheaper to use online social networking for both personal and business use because most of the services are free, and at the same time, users can easily develop their social life. However, for the negative side, sometimes users have to be extra-careful in using online social networks. This is because; there are many reporting cases of hacking of one’s identity. Besides, this negative consequence, social networking sites (SNS) are online environments in which people create self-descriptive profiles and then make links with other people they know on the site [1]. While most of the leading social platforms have primitives for providing privacy in the platform and the applications they are insufficient. There are some serious privacy problems that need to be resolved in existing OSN [3]. 2. SOCIAL NETWORK PRIVACY AND SECURITY Through OSNs the users share personal identifying information about themselves as the basic purpose of online interaction and communication. But they are unaware of who will get access to their private information and in which limit. Information is vulnerable to be revealed to a group of people unpredictably as the digital information can be easily copied and stored indefinitely. It will be a threat to the users information is revealed through different ways, and gets in the hand of the untargeted people [4]. 2.1 Social Network Privacy Privacy is the right or opportunity to decide who has access to user personal information and how that information should be used. Information privacy is “an individual’s claim to control the terms under which personal information identifiable to the individual is acquired, disclosed or used. The actual privacy risks are believed to occur when users disclose identifiable information about themselves online to people who they do not know or normally (that is, offline) would not trust [4]. 2.2 Threats of Online Social Networking The casual posting of personal information on a digital medium might create a permanent record of the users’ indiscretions and failures of judgments that can be exploited by the third-party commentary to produce a number of threats to the users. The potential threats that the users might face can be broadly categorized in four groups: Privacy related threats, OSN variants of traditional network and information security threats, Identity related threats and Social threats [5].
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 342 In short two main classes of privacy threats distinguished: those that involve disclosure to other users (registered or not) that this paper will focus on it, and those that originate from the OSN service provider’s side. 3. TECHNOLOGIES OF THE PROPOSED POSN SYSTEM ARCHITECTURE The development of the proposed Protected Online Social Network system composed of two parts, online social network site development and privacy management development. Online social network site developed as Web 2.0 technology application using PHP, MySQL, Ajax and JQuery techniques. Privacy setting management developed based users privacy levels and with using of symmetric, asymmetric encryption with key management techniques. 3.1 Privacy Techniques The proposed POSN system used many techniques to achieve more privacy for system users. 3.1.1 Privacy User Levels The proposed system has two major privacy management settings that allow users to control and manage privacy, these are: A. Profile Privacy Management Setting Profile management has four levels for mange the user profile private information these are: • Public Level: this level makes the information for the user’s profile public to all other user. • OnlyMe Level: this level makes the information for the user’s profile hidden (private) to all other user. • Friends level: this level make the information for the user’s profile hidden (private) to all other user except to the friends. • Customs level: this level make the information for the user’s profile hidden (private) to all other user except to some friends of the user. B. Share Privacy Management Setting Share management has three levels for mange the user share information these are: • Public level: this level makes the share information (comments, posts, upload) for the user public to all other user. • Friends level: this level make the share information (comments, posts, upload) for the user hidden (private) to all other user except to the friends. • Customs level: this level make the share information for the user hidden (private) to all other user except to some friends of the user. To make sure that the user make manage to the privacy setting selection for all his friends, the proposed system enforce the user to select the privacy setting every time when he decide to add new friend to his list to ensure every friend have suitable privacy. Figure 2 shows POSN privacy levels.
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 343 The proposed POSN system is automatically managing the data access (data view) depend on rules based privacy settings. These rules are : 3.2 Cryptography Techniques One of the major problems that the proposed POSN system focuses on it is the members profile sensitive data, how this data become more secure in the database, additional to the privacy setting management that control who have access to this data and who are not. The proposed system use cryptographic techniques to encrypt these data in the database to become more secure and use these technique again to encrypt the key (secret word) used to encrypt these data to ensure that the process of keys distribution to the members become safely. This section will explain cryptography techniques that proposed POSN system used. Figure 2 Proposed POSN Privacy Levels 1- IF Friend Profile Privacy = “Public” SET View Profile = “True”; 2- IF Friend Share Privacy = “Public” SET View Share = “True”; 3- IF Friend Profile Privacy = “Only Me” SET View Profile = “False”; 4- IF Friend Profile Privacy = “Friend” AND Is_Friend = “True” SET View Profile = “True”; 5- IF Friend Share Privacy = “Friend” AND Is_Friend = “True” SET View Share = “True”; 6- IF Friend Profile Privacy = “Custom” GET Related Friend Privacy: ( IF Related Friend Profile Privacy = “Only Me” SET View Profile = ”False”; IF Related Friend Profile Privacy = “Visible” SET View Profile = “True”; IF Related Friend Share Privacy = “Only Me” SET View Profile = ”False”; IF Related Friend Share Privacy = “Visible” SET View Profile = “True”; ).
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 344 3.2.1 Combination Encryption Every encryption algorithm have strong and weakness points, some of them related to the performance metrics were encryption throughput, CPU work load, energy cost and key size variation, for example the RC4 is fast and energy efficient for encrypting large packets. However, AES was more efficient than RC4 for a smaller packet size [6]. A new hybrid cipher can develop by combining the characteristics of two ciphers namely AES and RC4 [7]. The characteristics of both ciphers are studied and a new cipher combining the characteristics of both ciphers is generated which is more secure than the original ciphers [7]. For this reasons, the proposed POSN system will use the above hybrid cipher (RC4AES) to encrypt the sensitive data with random key generated by the proposed system. Figure 4 shows proposed POSN hybrid cipher block diagram. 3.2.2 OpenSSL EVP Public Key Interface EVP is an OpenSSL API (A Programming Interface) that provides a high-level interface to cryptographic functions. EVP is a high-level interface to message digests, symmetric ciphers, and public key algorithms [8]. The EVP interface also provides an interface for enveloping data using RSA keys. Data enveloping is the process of encrypting a chunk of data with RSA, typically for securely sending it to a recipient [9]. One of the features offered by the EVP interface for data encryption is the ability to encrypt the same data using several public keys. Figure 5 shows EVP interface data sealing / unsealing (opening) block diagram. Figure 4 Proposed Hybrid Cipher Block Diagram
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 345 4. DESIGN AND IMPLEMENTATION OF THE POSN SYSTEM The proposed POSN design consists of hardware and software components that both form the whole web site design. Hardware design encompasses the hardware components used in proposed web site, while software design explains the application design for the web site. Figure 6 shows the block diagram that explains the main architecture of the proposed POSN. Figure 5 EVP Interface Data Sealing / Unsealing (Opening) Block Diagram Figure 6 Proposed POSN Main Architecture
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 346 4.1 The Proposed POSN System Overview The constitution of the proposed POSN system’s design to be contains the integration of the technologies described in section two; Figure 8 depicts the components of this design where the system in addition to main modules it contains two Substantial modules (privacy management module and cryptographic module) . 4.2 Application Design The application design perform the whole structure of the proposed Protected Online Social Network (POSN) site, including all site web pages design, web forms used for gathering information and selection menus used by users. The proposed POSN application design divided into two parts: Front-End Area (User Area design and Encryptions system (cryptography) design. 4.2.1 Front-End Area Design Front-End area design consists of the following parts A-User authentication and user registration B-Adding new post. C-Adding comments to post. D-Share media. E-Change Privacy setting. F-Add and Delete Friends. G-Send /receive Private Messages. H-Edit Profile. I-Edit Account Setting. J-Search for a member (Friend). Figure 8 The Components of The Proposed POSN System.
  • 8. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 347 The proposed POSN site is accessed at the page index.php (the home page) where any user can access this page. Any user tries to access another page directly from URL he will be restricted to access the home page. In this page, visitor can view post titles, and do search for members. Only public post or comments appear on the home page in addition to the name of the post’s author and the date of creation. Figure 9 shows the proposed POSN home page. 4.3 Encryptions Process Design The proposed POSN system encrypted the private data (sensitive data) using symmetric RC4 encryption with a randomly generated secret key (session key), which is then encrypted using RSA Asymmetric key encryption with multiple 1024 bit public keys. The encrypted data is known as sealed data, and the encrypted secret key is known as an envelope key that will be distribute to the proposed POSN members or friends for use in decryption process. The proposed system re-encrypt the sealed data using AES encryption with new 128 bit randomly key generated called AES key to generate the encrypted data that called (Encrypted Private Data). To decrypt the data, the recipient must have the related envelope key, the AES key and the related private key. The function conveniently allows for multiple recipients by accepting an array of public keys. Figure 11 shows the proposed POSN private data encryption block diagram while figure 12 shows the proposed POSN private data decryption block diagram. Figure 9 the Proposed POSN Home Page (Index.php)
  • 9. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 348 The proposed system will generate two pair keys (private key and public key) for every user, these keys will use for RSA 1024 bit asymmetrically encryption to encrypt the random key (which is relatively small) that will be use to encrypt private data as mention before. For add more security to the sensitive data, when any member try to add new friend to his friend list the proposed system will decrypt and encrypt data again and generate new envelop keys for all member’s friends and redistribute these envelop keys again. When some member try to access profile information for his friend and this member have access right privacy (as mention in section 3 privacy user levels), the proposed system will check for related envelop key for this member in friend envelop key table. If it matches, the envelop key will be used with the member’s private key to decrypt the data. But if the proposed system did not find any envelop key related matches, the system will display encrypted data message to the member. Figure 11 Proposed POSN Private Data Encryption Block Diagram Figure 12 Proposed POSN Private Data Decryption Block Diagram
  • 10. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 349 5. EVALUATION OF THE PROPOSED SYSTEM This section proceeds with results evaluation of the proposed POSN implementation. Then, it presents the performance evaluation. 5.1 Privacy Evaluation After the implementation of the proposed POSN system, privacy evaluation tests measure. The proposed POSN installed (published) in the real environment ISP (Internet service provider). Many user accounts were created (registered), each user has different privacy setting, some of them are friends, group of friends and the other was not (public user). Many activities from the users happened during evaluation time. Friend request, add as friend, remove friend, change privacy, text post, media post and post comments are common activates between those users. Those users try to feed back their opinions about the privacy control for the proposed POSN by post their comments on it. Many users show their acceptance about how the proposed privacy setting control their profile sensitive data access especially when they used the proposed POSN customs privacy setting facilities. They mention how the proposed system enforce them to select a perpetrate selection for their privacy setting in the first try to login to the proposed system after registrations, by this the proposed system erase the problem of user unawareness of what his default privacy setting was. Some user also mention how the proposed system direct them to set the privacy setting for every user they try to add as friend, by this the proposed system prevent the user from the problem of queuing many friends in his list without setting or knowing his privacy setting for them. Figure 13 shows the result page of how the user “evaluation user 1” sees his profile information. Figure 13 How Evaluation User 1 See His Profile Page
  • 11. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 350 Figure 14 shows the result page of how non friends or public users see the same profile from inside or outside the proposed POSN with restricted information. In this case the user selected “only me” profile privacy setting. Figure 15 show how “evaluation user 1” profile page look like to public or non register user when they ask for it, in this case the user previously selected “public view” setting for his profile privacy. Also the figure show how some profile sensitive information still invisible or encrypted in spite of the user selected public view setting for his profile. By this the proposed system protects private sensitive user data from any intruders or malicious user in case of the member unawareness or mistakenly set “public view” settings to his profile. Figure 14 How Public Users See Evaluation User 1 Profile Page Figure 15 How Public Users See Evaluation User 1 Profile Page In Case of “Public View” Privacy Setting Set
  • 12. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 351 In case of friend’s relation with general “friends” privacy setting set, (evaluation user 2 a friend with evaluation user 1). Figure 16 show how “evaluation user 2” sees the “evaluation user 1’s” profile information, the Proposed POSN display all information to all “evaluation user 1’s” friend. In case of friend relation with “custom” privacy setting set. Figure 17 show how “evaluation user 2” sees the “evaluation user 1’s” profile information, the proposed POSN prevent “evaluation user 2” from see “evaluation user 1’s” profile information but it let him to see share information only (user post) in spite of the two user was a friend. By this the proposed POSN solve the problem of how the user can classify or categorize his friends. This done by let the user to set special privacy for every friend in his list separately, so everyone in his list have its own privacy setting set. Figure 16 How Evaluation User 2 See Evaluation User 1’s Profile Page In Case of General “Friend View” Privacy Setting Set Figure 17 How Evaluation User 2 See Evaluation User 1’s Profile Page In Case of “Custom View” Privacy Setting Set
  • 13. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 352 Table 4 show the privacy setting result of proposed POSN related to user state. User 1 to User 2 Relation User 2 Profile Privacy User 2 Share Privacy Visible Profile Data Visible Share Data Sensitive Data Visible Non friend Public Public Yes Yes No Non friend Only me Public No Yes No Non friend Friend Public No Yes No Non friend Public Friend Yes No No Non friend Only me Friend No No No Non friend Friend Friend No No No Friend Public Public Yes Yes Yes Friend Only me Public No Yes No Friend Friend Public Yes Yes Yes Friend Public Friend Yes Yes Yes Friend Only me Friend No Yes No Friend Friend Friend Yes Yes Yes Custom friend Only me Only me No No No Custom friend Only me Visible No Yes No Custom friend Visible Only me Yes No Yes Custom friend Visible Visible Yes Yes Yes 5.2 Performance Evaluation The processing and storage requirements of Proposed POSN with measure the time to render POSN encrypted web pages was quantified. The evaluated of POSN implementation done on a desktop computer using a core i3 2.10 GHz processor and 4 GB of RAM. The desktop, storage service, and application server are connected through a router which introduces an artificial delay that represents a case where the storage service is far away from the user. In order to analyze the performance of the implementation, it should focus on the cryptographic algorithms that represent the most expensive operations and the response of the tiny link server, which include the network latency and server process. A profile for “Ali” was built, who was given 25 friends. Additionally, there were 70 strangers user. The database maintained tables for user data, friend lists, friends privacy and encryption keys, all of which were filled with pieces of fake data. User sensitive data are encrypted using RC4AES with key encryption using RSA through the PHP Openssl cryptographic library functions extension. On the test machine, it takes 0.7 milliseconds on average to encrypt a 16 Bytes user sensitive data block, which supports over 1400 sensitive data block encryptions per second. Table 5 show the overhead of the encrypted data regarding the original data. The performance is determined on the basis of the time taken to encrypt and decrypt the data. Table 6 show Performance of ciphers base time vs. data size. Table 4 Privacy Setting Result of Proposed POSN Related to User Relation state
  • 14. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 353 Original Message (bytes) Encrypted Time (ms) 16 0.7 32 0.11 64 0.13 128 0.16 255 0.17 There is a substantial increase in the size of the stored data, and this will affect both the storage capacity of the storage services and the network resources required to transfer data. The storage services are inherently distributed, so they should be able to scale to support the needs of the system. Also the original data are texts dealing with social networks typical profile information like “email, website, gender, employ etc...” Because it is text-based data, the overhead imposed can be easily mitigated if the storage server utilizes some text compression technique before the storage is made. Original Message (bytes) Encrypted Message (bytes) 16 44 32 64 64 108 128 192 255 364 The page load time of proposed POSN was measure. Where load time for profile page with decryption for 16 byte data item (sensitive data) was average about 0.050 second. Table 7 shows profile page load time vs. data size. Page load times increase linearly with the size of data item or the number of elements in the profile need to encrypt. The median page load time is 0.060 seconds and the maximum is 0.100 seconds. Most pages consist of a few, small entries, so most are loaded quickly. So that the time indicating that retrieving keys and decryption process is not too expensive. Table 5 Overhead of the Encrypted Data Regarding the Original Data Table 6 Performance of Ciphers Base Time vs. Data Size
  • 15. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 354 The evaluations show that it can achieve privacy in online social networks with acceptable performance even with cryptographic techniques used. 6. CONCLUSIONS A proposed protected online social network (POSN) site that was developed as web 2.0 technologies application with privacy management and cryptography techniques showed that it can successfully protect private information in online social network from user-related privacy threats. The proposed POSN will solve the problem of how the user can classify or categorize his friends by using custom setting. The proposed system used the RSA in order to achieve the same ends by encrypting a symmetric key which is used to perform actual data encryption and decryption. The proposed POSN re-encrypts the private data every time that the user try to add new friend to his list, this will add more security power to the system by regenerating new key for the user. The median page load times for profile page in the proposed POSN is 0.5 seconds and the median size of the encrypted profile sensitive data is 108 byte. This time indicates that retrieving keys and decryption process is not too expensive. It shows that one can achieve privacy in OSNs with an acceptable performance even when cryptographic technique used and therefore the proposed approach shows that it is possible to be implemented in a real environment. 7. REFERENCES [1] Husein Osman Abdullahi,Abdirizaq said Jamaludin bin Ibrahim, “An Investigation into privacy and Security in Online Social Networking Sites among IIUM Students”, Kuala Lumpur, Malaysia 2012. [2] Bo Fu “Trust Management in Online Social Networks” University of Dublin, Trinity College September 2007. [3] M.A. Devmane, N.K. Rana “Privacy issues in Online Social Network“, University of Mumbai India No.13, March 2012. [4] Suban Raj, Bhandari,”Managing Users in Social Networking Sites”, LAHTI UNIVERSITY OF APPLIED SCIENCES Business Studies International Business Information Technology Thesis 2011. Sensitive Data (bytes) Page Load Time (s) 16 0.050 32 0.060 64 0.080 128 0.090 255 0.100 Table 7 Profile Page Load Time vs. Sensitive Data Size
  • 16. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 355 [5] C. Infant Louis Richards,” Advanced techniques to overcome the privacy issues and SNS threats”, Student, Dept. of CSE, Jeppiaar Engineering College, Chennai, India, ISSN-2250-1797, October 2011. [6] Nidhi Singhal , J.P.S.Raina,” Comparative Analysis of AES and RC4 Algorithms for Better Utilization”, Department of Electronics & Communication, July to Aug Issue 2011. [7] Prabhudesai Keval Ketan , Vijayarajan .V,” An Amalgam Approach using AES and RC4 Algorithms for Encryption and Decryption”, VIT University, Vellore, Volume 54– No.12, September 2012. [8] Steve Marquess and Stephen Henson,” User Guide - OpenSSL FIPS Object Module v2.0Fios”, Defense Advanced Research Projects Agency (DARPA), September 2012. [9] John Viega, Matt Messier & Pravir Chandra, “Network Security with OpenSSL,”,Publisher : O'Reilly, ISBN : 0-596-00270-X , June 2002. [10] Varun Shukla and Abhishek Choubey, “A Comparative Analysis of the Possible Attacks on RSA Cryptosystem”, International Journal of Electronics and Communication Engineering & Technology (IJECET), Volume 3, Issue 1, 2012, pp. 92 - 97, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472. [11] Rahul Jassal, “Wrapped RSA Cryptography Check on Window Executable using Reconfigurable Hardware”, International journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 3, 2012, pp. 291 - 299, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [12] Biswajit Tripathy and Jibitesh Mishra, “Protective Measures in E-Commerce to Deal with Security Threats Arising Out of Social Issues – A Framework”, International journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 3, 2012, pp. 46 - 53, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.