Defined Circle Friend Recommendation Policy for Growing Social Media

Authors

  • Afifa Salsabil Fathima Cambridge Institute of Technology, Bengaluru, India
  • Divya Prakesh BMS College of Engineering, Bengaluru, India
  • Sristhi Kumari Vellore Institute of Technology, Vellore

Keywords:

recommendation model, social media, machine learning tool, datamining

Abstract

Today social media has grown with a fast and has spread wide across the globe with a unique user profile as nodes under an Online Social Network (OSN). This paper focus on the current trends on Social Media and a brief survey on OSN with Friend Recommendation Scheme (FRS). The OSN users under various social domains such as Facebook, Twitter, and Google have been assigned a unique identification as to establish under the network and communicate under single and multi-hop communication. Today the individual shares they daily life affairs on social media and a concern is created on preserving the policies of privacy. In this survey paper a summary on various schemes and its applications are discussed for my concern of work.

References

Carminati, B., Ferrari, E., & Perego, A. (2009). Enforcing access control in web-based social networks. ACM Transactions on Information and System Security (TISSEC), 13(1), 1-38.

Squicciarini, A. C., Shehab, M., & Paci, F. (2009, April). Collective privacy management in social networks. In Proceedings of the 18th international conference on World wide web (pp. 521-530).

Squicciarini, A. C., Paci, F., & Sundareswaran, S. (2014). PriMa: a comprehensive approach to privacy protection in social network sites. annals of telecommunications-annales des télécommunications, 69(1), 21-36.

Mislove, A., Viswanath, B., Gummadi, K. P., & Druschel, P. (2010, February). You are who you know: inferring user profiles in online social networks. In Proceedings of the third ACM international conference on Web search and data mining (pp. 251-260).

Mislove, A., Marcon, M., Gummadi, K. P., Druschel, P., & Bhattacharjee, B. (2007, October). Measurement and analysis of online social networks. In Proceedings of the 7th ACM SIGCOMM conference on Internet measurement (pp. 29-42).

Zhang, C., Zhu, X., Song, Y., & Fang, Y. (2010, March). A formal study of trust-based routing in wireless ad hoc networks. In 2010 Proceedings IEEE INFOCOM (pp. 1-9). IEEE.

Zhou, B., & Pei, J. (2008, April). Preserving privacy in social networks against neighborhood attacks. In 2008 IEEE 24th International Conference on Data Engineering (pp. 506-515). IEEE.

Kim, T. H. J., Yamada, A., Gligor, V., Hong, J., & Perrig, A. (2013, April). Relationgram: Tie-strength visualization for user-controlled online identity authentication. In International Conference on Financial Cryptography and Data Security (pp. 69-77). Springer, Berlin, Heidelberg.

Backstrom, L., Sun, E., & Marlow, C. (2010, April). Find me if you can: improving geographical prediction with social and spatial proximity. In Proceedings of the 19th international conference on World wide web (pp. 61-70).

Dey, R., Tang, C., Ross, K., & Saxena, N. (2012, March). Estimating age privacy leakage in online social networks. In 2012 proceedings ieee infocom (pp. 2836-2840). IEEE.

Von Arb, M., Bader, M., Kuhn, M., & Wattenhofer, R. (2008, October). Veneta: Serverless friend-of-friend detection in mobile social networking. In 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (pp. 184-189). IEEE.

Al-Shammari, N. K., Syed, T. H., & Syed, M. B. (2021). An Edge–IoT framework and prototype based on blockchain for smart healthcare applications. Engineering, Technology & Applied Science Research, 11(4), 7326-7331.

Downloads

Published

2022-08-07

How to Cite

Afifa Salsabil Fathima, Divya Prakesh, & Sristhi Kumari. (2022). Defined Circle Friend Recommendation Policy for Growing Social Media. International Journal of Human Computations & Intelligence, 1(1), 9–12. Retrieved from https://milestoneresearch.in/JOURNALS/index.php/IJHCI/article/view/16