Privacy and Social Security Mechanism in the Era of Social Multi Cloud Environment

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2015 by IJCTT Journal
Volume-27 Number-3
Year of Publication : 2015
Authors : Mr. Rajeshwar rao kodipaka, Mr. Sanjeeva Polepaka
  10.14445/22312803/IJCTT-V27P126

MLA

Mr. Rajeshwar rao kodipaka, Mr. Sanjeeva Polepaka "Privacy and Social Security Mechanism in the Era of Social Multi Cloud Environment". International Journal of Computer Trends and Technology (IJCTT) V27(3):148-151, September 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Time and the Constraint are both typically interrelated and lead us to the next level high technological revolution journey where we analyses the Human Automation instead of System Automation. Technological in the View Point cognitive science Information technology will have to make high level of demanding journey; in that aspect we consider the best of the technical revolution in the Social media where we share the thoughts , informational to many more . If we Consider the Face book like such popular network sharing side leads us to the best of research , where technological Face book is high level to manage such huge volume of Data effective and efficiently, But Lacking with the point f loop whole is the Information of Public and Private and Preventive social Inference of the Aspect. Hence; we look forward to put the paper as the most and best to best Information flow in the aspect of content and curative illustrative technological solution. However, the precision of these solutions varies greatly, as the isolation can be made from a complete separation of physical network, recent breakthroughs in Software-Defined Networking have let us to believe that the most suitable technology for our project today is the use of the technology as it provides an isolation per of as well as a automatic centralized control of the network.

References
[1] Facebook Beacon, 2007.
[2] T. Zeller, “AOL Executive Quits After Posting of Search Data,” The New York Times, no. 22, http://www.nytimes.com/2006/08/22/technology/22ihtaol. 2558731.html?pagewanted=all&_r=0, Aug.2006.
[3] K.M. Heussner, “„Gaydar‟ n Facebook: Can Your Friends Reveal Sexual Orientation?” ABC News, http://abcnews.go. com/Technology/gaydar-facebook-friends/story?id=8633224#. UZ939UqheOs, Sept. 2009.
[4] C. Johnson, “Project Gaydar,” The Boston Globe, Sept. 2009.
[5] L. Backstrom, C. Dwork, and J. Kleinberg, “Wherefore Art Thou r3579x?: Anonymized Social Networks, Hidden Patterns, andStructural Steganography,” Proc. 16th Int‟l Conf. World Wide Web (WWW ‟07), pp. 181-190, 2007.
[6] M. Hay, G. Miklau, D. Jensen, P. Weis, and S. Srivastava, “Anonymizing Social Networks,” Technical Report 07-19, Univ. of Massachusetts Amherst, 2007.
[7] K. Liu and E. Terzi, “Towards Identity Anonymization on Graphs,” Proc. ACM SIGMOD Int‟l Conf. Management of Data (SIGMOD ‟08), pp. 93-106, 2008.
[8] J. He, W. Chu, and V. Liu, “Inferring Privacy Information from Social Networks,” Proc. Intelligence and Security Informatics, 2006.
[9] E. Zheleva and L. Getoor, “Preserving the Privacy of Sensitive Relationships in Graph Data,” Proc. First ACM SIGKDD Int‟l Conf. Privacy, Security, and Trust in KDD, pp. 153-171, 2008.
[10] R. Gross, A. Acquisti, and J.H. Heinz, “Information Revelation and Privacy in Online Social Networks,” Proc. ACM Workshop Privacy in the Electronic Soc. (WPES ‟05), pp. 71-80, http://dx.doi.org/10.1145/1102199.1102214, 2005.
[11] H. Jones and J.H. Soltren, “Facebook: Threats to Privacy,” technical report, Massachusetts Inst. of Technology, 2005.
[12] P. Sen and L. Getoor, “Link-Based Classification,” Technical Report CS-TR-4858, Univ. of Maryland, Feb. 2007.
[13] B. Tasker, P. Abbeel, and K. Daphne, “Discriminative Probabilistic Models for Relational Data,” Proc. 18th Ann. Conf. Uncertainty in Artificial Intelligence (UAI ‟02), pp. 485-492, 2002.
[14] A. Menon and C. Elkan, “Predicting Labels for Dyadic Data,” Data Mining and Knowledge Discovery, vol. 21, pp. 327-343, 2010.
[15] E. Zheleva and L. Getoor, “To Join or Not to Join: The Illusion of Privacy in Social Networks with Mixed Public and Private user Profiles,” Technical Report CS-TR-4926, Univ. of Maryland, College Park, July 2008.
[16] N. Talukder, M. Ouzzani, A.K. Elmagarmid, H. Elmeleegy, and M. Yakout, “Privometer: Privacy Protection in Social Networks,” Proc. IEEE 26th Int‟l Conf. Data Eng. Workshops (ICDE ‟10), pp. 266- 269, 2010.

Keywords
Social network analysis, data mining, social network privacy, security, privacy, multi-cloud, application partitioning.