Optimized Multi-Level Security for Content Contribution and Retrieval in Online Social Networks using a Content Visualization Mechanism

Authors

  • S. Nasira Tabassum Department of Computer Science & Engineering, Acharya Nagarjuna University, Guntur, Andhra Pradesh, India
  • Gangadhara Rao Kancherla Department of Computer Science & Engineering, Acharya Nagarjuna University, Guntur, Andhra Pradesh, India
Volume: 14 | Issue: 6 | Pages: 18395-18400 | December 2024 | https://doi.org/10.48084/etasr.8968

Abstract

Online social networks have become an integral part of modern communication, providing platforms for users to share personal information, media, and opinions. However, these platforms face significant challenges in preserving user privacy while ensuring efficient data retrieval and maintaining data integrity. Existing privacy preservation methods, such as PPK-MEANS, CFCAF, and CLDPP, are limited in their ability to handle the growing complexity and scale of user data, often leading to inefficiencies such as high Content Retrieval Time (CRT), increased Information Loss (IL), and compromised data accuracy. These inefficiencies are crucial to address, as they can degrade the user experience by causing delays, compromising data integrity, and limiting system scalability. High CRT frustrates users, while increased IL reduces data accuracy, undermining trust and system reliability. The primary issue addressed in this study is the need for an advanced privacy-preserving mechanism that can provide multilevel security while maintaining optimal system performance. To overcome these limitations, the Layered Secure Online Collaborative Verification (LSOCV) algorithm is proposed, designed to offer a scalable solution with tiered privacy controls based on user requirements. LSOCV enhances Privacy Retrieval Accuracy (PRA), significantly reduces CRT, and minimizes IL. The experimental results show that LSOCV achieved a PRA of 91.97%, reduced CRT to 7ms, and decreased IL by up to 8% for 500KB files, outperforming existing approaches. This method provides robust privacy protection and efficient data handling on social networks, with the potential for future application in big data environments, such as Hadoop, to ensure scalable, secure, and efficient privacy-preserving solutions.

Keywords:

social networks, complexity, information retrieval, privacy

Downloads

Download data is not yet available.

References

H. K. Bhuyan and N. K. Kamila, "Privacy preserving sub-feature selection in distributed data mining," Applied Soft Computing, vol. 36, pp. 552–569, Nov. 2015.

A. F. Khalil and S. Rostam, "Machine Learning-based Predictive Maintenance for Fault Detection in Rotating Machinery: A Case Study," Engineering, Technology & Applied Science Research, vol. 14, no. 2, pp. 13181–13189, Apr. 2024.

A. S. Q. Syed, C. Atheeq, L. Ali, and M. T. Quasim, "Α Chaotic Map-based Approach to Reduce Black Hole Attacks and Authentication Computational Time in MANETs," Engineering, Technology & Applied Science Research, vol. 14, no. 3, pp. 13909–13915, Jun. 2024.

G. Alotibi, "A Cybersecurity Awareness Model for the Protection of Saudi Students from Social Media Attacks," Engineering, Technology & Applied Science Research, vol. 14, no. 2, pp. 13787–13795, Apr. 2024.

L. Bahri, B. Carminati, and E. Ferrari, "Decentralized privacy preserving services for Online Social Networks," Online Social Networks and Media, vol. 6, pp. 18–25, Jun. 2018.

K. Berlin, D. Slater, and J. Saxe, "Malicious Behavior Detection using Windows Audit Logs," in Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, Denver, CO, USA, Oct. 2015, pp. 35–44.

S. Khalid, S. Wu, A. Alam, and I. Ullah, "Real-time feedback query expansion technique for supporting scholarly search using citation network analysis," Journal of Information Science, vol. 47, no. 1, pp. 3–15, Feb. 2021.

S. Khalid, S. Khusro, I. Ullah, and G. Dawson-Amoah, "On The Current State of Scholarly Retrieval Systems," Engineering, Technology & Applied Science Research, vol. 9, no. 1, pp. 3863–3870, Feb. 2019.

J. H. Abawajy, M. I. H. Ninggal, and T. Herawan, “Privacy Preserving Social Network Data Publication,” IEEE Communications Surveys & Tutorials, vol. 18, no. 3, pp. 1974–1997, 2016.

A. Erola, J. Castellà-Roca, A. Viejo, and J. M. Mateo-Sanz, "Exploiting social networks to provide privacy in personalized web search," Journal of Systems and Software, vol. 84, no. 10, pp. 1734–1745, Oct. 2011.

T. Zhu, J. Li, X. Hu, P. Xiong, and W. Zhou, "The Dynamic Privacy-Preserving Mechanisms for Online Dynamic Social Networks," IEEE Transactions on Knowledge and Data Engineering, vol. 34, no. 6, pp. 2962–2974, Jun. 2022.

S. Weifeng, S. Mingyang, L. Xidong, and L. Mingchu, "An Improved Personalized Filtering Recommendation Algorithm," Applied Mathematics & Information Sciences, vol. 5, no. 5–2, pp. 69–78, 2011.

M. A. Ferrag, L. Maglaras, and A. Ahmim, "Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey," IEEE Communications Surveys & Tutorials, vol. 19, no. 4, pp. 3015–3045, 2017.

Z. Erkin, T. Veugen, T. Toft, and R. L. Lagendijk, "Privacy-preserving distributed clustering," EURASIP Journal on Information Security, vol. 2013, no. 1, Nov. 2013, Art. no. 4.

K. Honda, T. Oda, D. Tanaka, and A. Notsu, "A Collaborative Framework for Privacy Preserving Fuzzy Co-Clustering of Vertically Distributed Cooccurrence Matrices," Advances in Fuzzy Systems, vol. 2015, no. 1, 2015, Art. no. 729072.

Downloads

How to Cite

[1]
Tabassum, S.N. and Kancherla, G.R. 2024. Optimized Multi-Level Security for Content Contribution and Retrieval in Online Social Networks using a Content Visualization Mechanism. Engineering, Technology & Applied Science Research. 14, 6 (Dec. 2024), 18395–18400. DOI:https://doi.org/10.48084/etasr.8968.

Metrics

Abstract Views: 85
PDF Downloads: 133

Metrics Information