Defined Circle Friend Recommendation Policy for Growing Social Media
Keywords:
recommendation model, social media, machine learning tool, dataminingAbstract
Today social media has grown with a fast and has spread wide across the globe with a unique user profile as nodes under an Online Social Network (OSN). This paper focus on the current trends on Social Media and a brief survey on OSN with Friend Recommendation Scheme (FRS). The OSN users under various social domains such as Facebook, Twitter, and Google have been assigned a unique identification as to establish under the network and communicate under single and multi-hop communication. Today the individual shares they daily life affairs on social media and a concern is created on preserving the policies of privacy. In this survey paper a summary on various schemes and its applications are discussed for my concern of work.
References
Carminati, B., Ferrari, E., & Perego, A. (2009). Enforcing access control in web-based social networks. ACM Transactions on Information and System Security (TISSEC), 13(1), 1-38.
Squicciarini, A. C., Shehab, M., & Paci, F. (2009, April). Collective privacy management in social networks. In Proceedings of the 18th international conference on World wide web (pp. 521-530).
Squicciarini, A. C., Paci, F., & Sundareswaran, S. (2014). PriMa: a comprehensive approach to privacy protection in social network sites. annals of telecommunications-annales des télécommunications, 69(1), 21-36.
Mislove, A., Viswanath, B., Gummadi, K. P., & Druschel, P. (2010, February). You are who you know: inferring user profiles in online social networks. In Proceedings of the third ACM international conference on Web search and data mining (pp. 251-260).
Mislove, A., Marcon, M., Gummadi, K. P., Druschel, P., & Bhattacharjee, B. (2007, October). Measurement and analysis of online social networks. In Proceedings of the 7th ACM SIGCOMM conference on Internet measurement (pp. 29-42).
Zhang, C., Zhu, X., Song, Y., & Fang, Y. (2010, March). A formal study of trust-based routing in wireless ad hoc networks. In 2010 Proceedings IEEE INFOCOM (pp. 1-9). IEEE.
Zhou, B., & Pei, J. (2008, April). Preserving privacy in social networks against neighborhood attacks. In 2008 IEEE 24th International Conference on Data Engineering (pp. 506-515). IEEE.
Kim, T. H. J., Yamada, A., Gligor, V., Hong, J., & Perrig, A. (2013, April). Relationgram: Tie-strength visualization for user-controlled online identity authentication. In International Conference on Financial Cryptography and Data Security (pp. 69-77). Springer, Berlin, Heidelberg.
Backstrom, L., Sun, E., & Marlow, C. (2010, April). Find me if you can: improving geographical prediction with social and spatial proximity. In Proceedings of the 19th international conference on World wide web (pp. 61-70).
Dey, R., Tang, C., Ross, K., & Saxena, N. (2012, March). Estimating age privacy leakage in online social networks. In 2012 proceedings ieee infocom (pp. 2836-2840). IEEE.
Von Arb, M., Bader, M., Kuhn, M., & Wattenhofer, R. (2008, October). Veneta: Serverless friend-of-friend detection in mobile social networking. In 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (pp. 184-189). IEEE.
Al-Shammari, N. K., Syed, T. H., & Syed, M. B. (2021). An Edge–IoT framework and prototype based on blockchain for smart healthcare applications. Engineering, Technology & Applied Science Research, 11(4), 7326-7331.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Afifa Salsabil Fathima1, Divya Prakesh, Sristhi Kumari
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.