Call for Paper - October 2019 Edition
IJCA solicits original research papers for the October 2019 Edition. Last date of manuscript submission is September 20, 2019. Read More

User Intended Privacy Preserving Models in Online Social Networks

International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 113 - Number 15
Year of Publication: 2015
Amal Twinkle Mathew
S. Saravana Kumar
Karthikeyan. M

Amal Twinkle Mathew, S.saravana Kumar and Karthikeyan. M. Article: User Intended Privacy Preserving Models in Online Social Networks. International Journal of Computer Applications 113(15):28-32, March 2015. Full text available. BibTeX

	author = {Amal Twinkle Mathew and S.saravana Kumar and Karthikeyan. M},
	title = {Article: User Intended Privacy Preserving Models in Online Social Networks},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {113},
	number = {15},
	pages = {28-32},
	month = {March},
	note = {Full text available}


The proposed system introduces new social network privacy management models and it measures their human effects. Here it introduces a mechanism using clustering techniques which helps users to group their friends using policy management. Then it introduces new privacy management model which will give policies to other friends to find similar friends in the network. And thereby explored various ways that help users to find example friends. In addition, it will help to find privacy management models which can be further enhanced and also it helps to detect privacy sentiment of user. Assistant friend grouping will be done for effective friendship establishment. In a network user privacy will be maintained by setting privacy techniques. Privacy management models can be routinely customized to the privacy sentiment and done according to the needs of the user.


  • Acquisti. A and Gross. R(2006), "Imagined Communities: Awareness, Information Sharing and Privacy on the Facebook," Proc. Sixth Int'l Conf. Privacy Enhancing Technologies (PET '06.
  • Acquisti. A and Grossklags. J(2005), "Privacy and Rationality in Individual Decision Making," IEEE Security & Privacy, vol. 3, no. 1, pp. 26-33.
  • Besmer. A, Watson. J(2010), and H. R. Lipford, "The Impact of Social Navigation on Privacy Policy Configuration," Proc. Symp. Usable Privacy and Security,
  • Bonneau. J and Preibusch. S(2009), "The Privacy Jungle: On the Market for Data Protection in Social Networks," Proc. Workshop the Economics of Information Security (WEIS '09).
  • Carminative. B, Ferrari. E(2009), Heatherly. R, Kantarcioglu. M, and Thuraisingham. B, "A Semantic Web Based Framework for Social Network Access Control," Proc. Symp. Access Control Models and TechnologieS.
  • Carminati. B, Ferrari. E, Heatherly. R, Kantarcioglu. M, and Thuraisingham. B. M(2011), "Semantic Web-Based Social Network Access Control," Computers & Security, vol. 30, pp. 108-115.
  • Cheng. Y, Park. P, and Sandhu. R. S(2012), "A User-to-User Relationship- Based Access Control Model for Online Social Networks," Proc. 26th Ann. IFIP WG 11. 3 Conf. Data and Applications Security and Privacy.
  • Clauset. A,Newman. M and Moore. C(2004), "Finding Community Structure in Very Large Networks," Physical Rev. E, vol. 70, p. 066111.
  • Cutrell. E, Czerwinski. M, and Horvitz. E(2001), "Notification, Disruption, and Memory: Effects of Messaging Interruptions on Memory and Performance," Proc. Conf. Human Computer Interaction.
  • Dhamija and Perrig. A(2000), "Deja Vu: A User Study Using Images for Authentication," Proc. USENIX Security Symp.
  • Dunphy. P, Heiner. A. P, and Asokan. N(2010), "A Closer Look at Recognition-Based Graphical Passwords on Mobile Devices," Proc. Symp. Usable Privacy and Security.
  • Dwyer. C, Hiltz. S. R, and Passerini. K(2007), "Trust and Privacy Concern within Social Networking Sites: A Comparison of Facebook and MySpace," Proc. Am. Conf. Information Systems (AMCIS '07).
  • Fang. L and LeFevre. K(2010), "Privacy Wizards for Social Networking Sites," Proc. Conf. World Wide Web.
  • Ferraiolo. D and Kuhn. R(1992), "Role-Based Access Control," Proc. Nat'l Computer Security Conf.
  • Fong. P. W(2011), "Relationship-Based Access Control: Protection Model and Policy Language," Proc. Conf. Data and Application Security and Privacy.