By Topic

An Approach for Protecting Privacy on Social Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Yüksel, A.S. ; Comput. Sci. Dept., Indiana Univ., Bloomington, IN, USA ; Yuksel, M.E. ; Zaim, A.H.

Social networking has become a part of our life. We redundantly share our personal information with people in social networks and Internet. These networks allow users to share just about everything: data, photos, videos, favorite music, status updates, and more applications. Sharing large amounts of information causes privacy and security problems for users in these networks. To prevent privacy problems, we can provide built-in applications that help to protect our privacy by limiting the friends who get access to our personal information. Many users still do not make use of these applications. Users fail to use the application either because they are not aware that it exists or because of the tedious process that is involved when manually grouping friends into different categories to form a friends list. The privacy problem has prompted us to provide a solution that offers the social networks users an opportunity to protect their privacy. In this study, a privacy and security technique, its algorithm and design were mentioned. Our approach proposes an API, which provides grouping of friends through an automated system into different social groups by analyzing the user's social graph and depending on what common information they would like to share that should not be accessed by other friends. We assume that a user shares the same information in a group, as we call social circles. Finding these social circles will help users to group their friends easily and meaningfully.

Published in:

Systems and Networks Communications (ICSNC), 2010 Fifth International Conference on

Date of Conference:

22-27 Aug. 2010