• Sonuç bulunamadı

View of Idiomatic Expressions (IE) based Security and Éclat Learning using Privacy on Content Sharing Social Networks

N/A
N/A
Protected

Academic year: 2021

Share "View of Idiomatic Expressions (IE) based Security and Éclat Learning using Privacy on Content Sharing Social Networks"

Copied!
8
0
0

Yükleniyor.... (view fulltext now)

Tam metin

(1)

Turkish Journal of Computer and Mathematics Education Vol.12 No.10 (2021),

2632-2639

Research Article

2632

Idiomatic Expressions (IE) based Security and Éclat Learning using Privacy on Content

Sharing Social Networks

1

Kaladevi.A.C,

2

Selvi.K,

3

Ramya.P

1Professor/CSE, Sona College of Technology, Salem-5 2Professor, Pavai College of Technology,Namakkal 3AP/CSE, Sona College of Technology, Salem-5

1kaladeviac@sonatech.ac.in, 2selvimidu@gmail.com, 3ramyaperumal@sonatech.ac.in

Article History: Received: 10 January 2021; Revised: 12 February 2021; Accepted: 27 March 2021; Published online: 28 April 2021

Abstract: The information society has created various possibilities for remote access to the communication between distributed information resources and users. These aspects of all of the global users have used to create their data and profile. This needed data-protection is provided reliably. In most social networking sites, individuals can create an online profile that other people can see through online interaction, communication, and the basic functions share of interest. Unfortunately, social networks' current trend is to protect their online content from a system or policy administrator. The security and privacy requirements of social networking are not yet fully understood or well defined. This is an important issue that every user should ask themselves. The answer is about the principles of privacy and confidentiality. The main purpose is to discuss social media's challenges for data security as an element of privacy analysis using the Éclat learning method. This method analyses user behaviours. For this reason, the use of identifiable expressions indicates that a brief study of social media is taking place. The Idiomatic Expressions (IE) methods are proposed in the formal interpretation of the global communication security key. The key principles of personal information security are provided based on the organizational structure, life cycle and data protection policy of the Security Information Framework, especially those related to information and communication security policy.

Keywords: Idiomatic Expressions (IE) algorithm, behaviour analysis, Éclat learning method, Data Error detection rate. 1. Introduction

The proliferation of the Internet has contributed to the prosperity of online social networking sites, open to both media and education. Over the years, some social networking sites have helped Internet and online users by changing how they interact with friends, colleagues, and even newcomers. Also, some social networks further divide their collections by their friends based on their organization, geographic location, or how much they know about each other.

The proliferation of the Internet contributes to online social networking sites. The media and education. Over the years, some social networking sites have changed how they interact with their friends, colleagues, and co-workers to help Internet and online users.

Social network security and privacy requirements are not yet fully understood or well defined. Many users adapt to social networks to significantly specify the shared data security policies and customize the security and privacy requirements. Therefore, a depth of security experience has not to be brought in many security domains and areas of technology, but knowledge on social networks is to be expanded. Modernization of the Information Society (IS) and Information Communication Technology (ICT) provides increased globalization of information resources needed. Privacy rights are collected in the process of using social media and are associated with personal information.

Also, the ability to collect and capture personal information without the user's notice can be a threatening proposition. A personal data cloud is distributed legally or illegally to a third party. More and more companies and institutions are using social media to promote their services and products, and their employees can post their data. Another research says that there is a tendency for users to spoil their profile online. Therefore, the employer needs to protect their employees' data using a social network or site. The employer needs to create a strong policy to draw a line between personal and professional life. On the other hand, the employer can select promising employees

(2)

Turkish Journal of Computer and Mathematics Education Vol.12 No.10 (2021),

2632-2639

Research Article

2633

using social networks and social media profiles.

Figure.1 General Architecture of Social Networks

Figure.1 shows that the Social relations and websites that define social networks and social media. Facebook, Twitter, and Xing should also be included in this group, as they extend modern ICT permits to confirm connected areas to create social networks. In Social media, passive users were also involved. Consumers are directly correlated with other participants in the industry.

2. Related works

With related security and privacy issues in mind, users of Online Social Networks (OSNs) in general develop contacts with their direct friends. Wireless Mesh Networks (WMNs) of energy efficiency proposed a cross-layer design that content sharing in OSNs as an example of the interaction between OSNs and technology networks [1]. Sensitivity and security have integrated to recommend proper privacy settings particles to share the social image to train users to believe order tree classified image content. Our experimental studies demonstrate the effectiveness and efficiency of the proposed algorithm [2]. The information content can be the user properties, and content-centric computing systems are used widely in many fields [3].

Despite the promise that it will be a large-scale program, a high-content distribution system has been adopted to delay security and privacy issues. [4]. There are issues with today's mobile social networking multimedia content (MC) and face-to-face development, computing edge security, and big data processing online. [5].

The Virtual Private Community (VPC) Framework is a hierarchical domain structure that allows you to share content securely without others invading their privacy. The Certification Chain Base Association (CCA) method was proposed using processes called VPC to create secure sites such as Smart Homes [6]. As social networks spread, users' photos can be shared with anyone, video and anywhere, including other media content. It is easier now than ever before [7].

Social networking and behaviors protect users' relationships and are an important element in managing social networking. In this article, the study of social networking through the mobile communication network is closely related to people's real-life [8].

Mobiles are manufactured to develop a proper understanding of social networking sites using the social relationships of human social networking liaison of Device to Device (D2D) communication [9]. Extensive connections between individuals' social relationships and characteristics are tracked [10].

Web services and globalization have had a major impact in supporting the service-based economy. However, despite the great improvement, they are initially involved in strengthening the website. [11]. It collects real-world mobile discovery data and the virtual world’s online social data and self-report. [12].

Social

Networks

Security

Face book Twitter Xing YouTube LinkedIn MySpace

(3)

Turkish Journal of Computer and Mathematics Education Vol.12 No.10 (2021),

2632-2639

Research Article

2634

A social norm is a unique concept in the social sciences. It has played an important role in the regulation of social behavior. In organizations and government agencies, there is a cheaper alternative to the proposed new laws and regulations. In the face of various challenges of society [13], Social connectivity between network nodes has been successfully studied as an additional opportunity to network design [14].

Nowadays, social networking sites such as YouTube, Facebook and Twitter connect thousands of serious customers to a common content provider and download their content for free to update [15]. A technique for studying the dynamics of behaviors within social groups is called Social Network Analysis (SNA). Also, the combination of the SNA is believed to give a more comprehensive understanding of the social dynamics [16].

The Broadband Social Network (BSN) uses the support of a multifaceted network. They support that social activity in an instant. As a result, the data is processed to store it for privacy and personal data before releasing it to the owner [18].

3. PROPOSED METHODOLOGY

To use personal information on a social network, you must have an understanding of the security issue. Online social networking has recently emerged as a research field. Many research tasks reveal the risk to personal data.

Figure.2 Proposed System Architecture

The privacy issues of the social network and the social organization and related recipients were identified. It uses the available information related to its applications. Then, these sites are meant to provide sufficient data for linking to identify the owner of the profile, even though they may not disclose too much of the user's private linking capabilities.

Social

Network

User

Block

Social

network

User

Social

Network

(SN)

Collect

user

videos

Database

Social

network

s

Eclat

learning

Classify the user

behavior

Irrelevant

YouTube

video

Relevant

YouTube

video

Key

Generate

[Idiomatic

Expressions

(IE)

algorithm]

Up load

YouTube video

securely

YouTube

video

Share

securely on

(4)

Turkish Journal of Computer and Mathematics Education Vol.12 No.10 (2021),

2632-2639

Research Article

2635

3.1 Collect the user videos

Many of these systems have a direct impact on their daily activities. The quality and behavior of the quality production results of the collected data are eliminated. Data collections were an important exercise in recognizing the environment of a real-world organization with all records.

3.2 Social network database

The data is recorded so that the same real-world sub-query logs match the representation of the other days. You can record the information of the users you want and delete the package with detailed back posts.

3.3 User Behaviour analysis

Behaviors have been needed to share social networks, content, images and YouTube videos and share information securely to social network users. First, check the information on social networks, then analyze the information. The behaviors of users are to be analyzed on social media networks. Then, they classify the data and then divide it into related or unrelated data. The social networks had no irrelevant parts of the information, as this information has been permanently blocked.

3.4 Classify the user behavior analysis using Éclat learning

The Éclat learning methodology provides support for secure data analysis and categorization of any information classified as relevant or inappropriate. Contact data is uploaded to social networks, and unwanted user information is automatically removed from social networks. The following algorithm is used to classify user behaviors.

Éclat learning algorithm Step1:

Input data s;

Weight data w = dataset (“soc.dat”) step2:

User input a; user behaviour data; Step3:

// classify the data If w ==a then. // Relevant data Output Predication p =a Else // Irrelevant data Output Predication p =a Step4:

Final output predication P=p Step5:

End of the process

3.5 Security Key generation based on idiomatic expressions algorithm

Sharing social networks, content, pictures and YouTube videos requires security to share information with social network users. First, look at the information in social networks, analyze it, and explore users' behaviors on social media networks. Then, sort the data based on related or unrelated data. This information is used to permanently block and detect any inappropriate areas of information about social networks. It is also used to upload other information on social networks.

Idiomatic Expressions algorithm Step1:

Query record: q Step2:

Similarity function S

Generate key: SK (Sorting Key) Step3:

Database search record D Skv=generate key (SK, q) Step4:

(5)

Turkish Journal of Computer and Mathematics Education Vol.12 No.10 (2021),

2632-2639

Research Article

2636

N=find key records (skv)

Condition N=q Step5:

Condition N= null N= generate the key (sky) Step6:

M=Compare to record (n) Step7:

Output key M

After the R record has been read, the data set the SKV is created, and all the records of the investigation are indexed. It is greatly helpful to share information on the social network using this recipe. This method allows you to generate the key using the SKV process and safely share information. It also helps to ensure and improve security on social networking sites.

4. Result and Discussion

Different generations of key formation have been carried out to test the proposed algorithm that produces reliable security keys. Note that 5 polynomials create 5 binary 256-bit symmetric key sequences. After applying the proposed algorithm, the serial test results with the NIST frequency appear to accept the generated 256-bit symmetric key. They pass an acceptable threshold range. Therefore, the generated key has been valid. Then, after analyzing user behaviors using machine learning, simulation results are analyzed. Simulation parameters were based on the different levels. This method proposes several factors to evaluate its effectiveness, as shown in Table 2. Social networking requires simulation of the analysis and transformation of user behaviors. Behavior analysis is based on relevant information or irrelevant information of the user. The user is sharing information after watching their behaviors on social media.

Table.2 Predication User Relevant Data Performance Ratio social networks SVM (%) Naive Bayes (%) KNN (%) K-Means (%) Eclat learning [proposed](%) Facebook 68 78 81 85 86 Twitter 44 75 76 81 82 Instagram 54 53 78 79 87 Reddit 56 58 80 81 89 YouTube 68 71 75 78 90.1

(6)

Turkish Journal of Computer and Mathematics Education Vol.12 No.10 (2021),

2632-2639

Research Article

2637

Figure.3User Relevant data Performance

Figure 3 defines the user behaviors analysis performance of different methods. SVM, NiveBays, KNN, and K-algorithms do not perform well on social networking sites such as Facebook, Twitter, Instagram, and YouTube. So, the behaviors of Table 3 users are analyzed and compared with various methods, showing that Éclat learning methods have the best performance.

Table.3 User-based Irrelevant error detection rate social networks SVM (%) Naive Bayes(%) kNN(%) K-Means(%) Eclat learning [proposed](%) Facebook 37 36 38 39 29 Twitter 45 37 37 40 38.1 Instagram 54 45 40 41 37 Reddit 37 36 37 38 35.1 YouTube 39 37 34 35 31 0 10 20 30 40 50 60 70 80 90 100 D ata r e lav an t R ati io (% ) Methods

Relevant data Performance

(7)

Turkish Journal of Computer and Mathematics Education Vol.12 No.10 (2021),

2632-2639

Research Article

2638

Figure.4 User-based Irrelevant Data Error detection rate

Social networks like Facebook, Twitter, Instagram and YouTube have compared to SVM, NiveBays, KNN, K-means methods. It is confirmed that the Eclat learning method provides better performance in predictive data error detection, as shown in Figure 4

Figure.5 User Security Key performance ratio

Figure 5 defines the key performance ratio of the security equivalence of the user module of different modes. DES, 3DES, AES, BF processes do not work well in social networking. Only IE algorithms give the best performance, as shown in Figure 5.

5. Conclusion

Disclosure of personal information is on the rise as more information becomes available on online social networks. Information used on various online social networks can attack computer systems, steal activities and personal information and block Internet activity, however, with these benefits. Some issues are raised based on its functionality. Key levels of user safety have been enhanced using Idiomatic Expression (IE) methods and behavioral analysis using Éclat learning methods. The Éclat learning method has provided excellent results for user behavior analysis and data error detection rate. Users' security, privacy and data have become the key issues related to social media. These issues describe the various privacy and security issues associated with SN users of

0 10 20 30 40 50 60 E rro r d et ect io n Ra te( %) Methods

Predication Data Error detection rate

facebook Twitter Instagram Reddit YouTube

0 20 40 60 80 100

DES 3DES AES BF IE algorithm

MB

/Sec

No.of Methods

Key performance

(8)

Turkish Journal of Computer and Mathematics Education Vol.12 No.10 (2021),

2632-2639

Research Article

2639

the social network (SN). It May come from an SN service provider, or an unauthorized user or a third party. The study's main purpose is to teach SN users how to protect themselves from social media issues.

References

1. J. Hu, L. Yang and L. Hanzo, "Energy-Efficient Cross-Layer Design of Wireless Mesh Networks for Content Sharing in Online Social Networks," in IEEE Transactions on Vehicular Technology, vol. 66, no. 9, pp. 8495-8509, Sept. 2017, doi: 10.1109/TVT.2017.2678167.

2. J. Yu, Z. Kuang, B. Zhang, W. Zhang, D. Lin and J. Fan, "Leveraging Content Sensitiveness and User Trustworthiness to Recommend Fine-Grained Privacy Settings for Social Image Sharing," in IEEE Transactions on Information Forensics and Security, vol. 13, no. 5, pp. 1317-1332, May 2018, doi: 10.1109/TIFS.2017.2787986.

3. J. Shen, A. Wang, C. Wang, J. Li and Y. Zhang, "Content-Centric Group User Authentication for Secure Social Networks," in IEEE Transactions on Emerging Topics in Computing, vol. 8, no. 3, pp. 833-844, 1 July-Sept. 2020, doi: 10.1109/TETC.2017.2779163.

4. K. Thilakarathna, A. C. Viana, A. Seneviratne and H. Peter, "Design and Analysis of an Efficient Friend-to-Friend Content Dissemination System," in IEEE Transactions on Mobile Computing, vol. 16, no. 3, pp. 702-715, 1 March 2017, doi: 10.1109/TMC.2016.2570747.

5. P. Zhou, K. Wang, J. Xu and D. Wu, "Differentially-Private and Trustworthy Online Social Multimedia Big Data Retrieval in Edge Computing," in IEEE Transactions on Multimedia, vol. 21, no. 3, pp. 539-554, March 2019, doi: 10.1109/TMM.2018.2885509.

6. D. Kim and J. Lee, "Efficient and Secure Device Clustering for Networked Home Domains," in IEEE Transactions on Consumer Electronics, vol. 65, no. 2, pp. 224-232, May 2019, doi: 10.1109/TCE.2019.2902412.

7. C. Ma, Z. Yan and C. W. Chen, "Scalable Access Control For Privacy-Aware Media Sharing," in IEEE Transactions on Multimedia, vol. 21, no. 1, pp. 173-183, Jan. 2019, doi: 10.1109/TMM.2018.2851446. 8. S. Zhang, X. Liang, Y. Wei and X. Zhang, "On Structural Features, User Social Behavior, and Kinship

Discrimination in Communication Social Networks," in IEEE Transactions on Computational Social Systems, vol. 7, no. 2, pp. 425-436, April 2020, doi: 10.1109/TCSS.2019.2962231.

9. X. Chen, B. Proulx, X. Gong and J. Zhang, "Exploiting Social Ties for Cooperative D2D Communications: A Mobile Social Networking Case," in IEEE/ACM Transactions on Networking, vol. 23, no. 5, pp. 1471-1484, Oct. 2015, doi: 10.1109/TNET.2014.2329956.

10. L. Meng, Y. Hulovatyy, A. Striegel and T. Milenković, "On the Interplay Between Individuals’ Evolving Interaction Patterns and Traits in Dynamic Multiplex Social Networks," in IEEE Transactions on Network Science and Engineering, vol. 3, no. 1, pp. 32-43, 1 Jan.-March 2016, doi: 10.1109/TNSE.2016.2523798. 11. W. Chen, I. Paik and P. C. K. Hung, "Constructing a Global Social Service Network for Better Quality of Web Service Discovery," in IEEE Transactions on Services Computing, vol. 8, no. 2, pp. 284-298, March-April 2015, doi: 10.1109/TSC.2013.20.

12. H. Zhao, H. Zhou, C. Yuan, Y. Huang and J. Chen, "Social Discovery: Exploring the Correlation Among Three-Dimensional Social Relationships," in IEEE Transactions on Computational Social Systems, vol. 2, no. 3, pp. 77-87, Sept. 2015, doi: 10.1109/TCSS.2016.2517092.

13. S. H. Sajadi, M. Fazli and J. Habibi, "The Affective Evolution of Social Norms in Social Networks," in IEEE Transactions on Computational Social Systems, vol. 5, no. 3, pp. 727-735, Sept. 2018, doi: 10.1109/TCSS.2018.2855417.

14. Z. Lu, Y. E. Sagduyu and Y. Shi, "Integrating Social Links into Wireless Networks: Modeling, Routing, Analysis, and Evaluation," in IEEE Transactions on Mobile Computing, vol. 18, no. 1, pp. 111-124, 1 January 2019, doi: 10.1109/TMC.2018.2827985.

15. T. Wang, Y. Sun, L. Song and Z. Han, "Social Data Offloading in D2D-Enhanced Cellular Networks by Network Formation Games," in IEEE Transactions on Wireless Communications, vol. 14, no. 12, pp. 7004-7015, Dec. 2015, doi: 10.1109/TWC.2015.2463281.

16. D. Vimalajeewa, S. Balasubramaniam, B. O’Brien, C. Kulatunga and D. P. Berry, "Leveraging Social Network Analysis for Characterizing Cohesion of Human-Managed Animals," in IEEE Transactions on Computational Social Systems, vol. 6, no. 2, pp. 323-337, April 2019, doi: 10.1109/TCSS.2019.2902456. 17. Z. Yan, W. Feng and P. Wang, "Anonymous Authentication for Trustworthy Pervasive Social Networking," in IEEE Transactions on Computational Social Systems, vol. 2, no. 3, pp. 88-98, Sept. 2015, doi: 10.1109/TCSS.2016.2519463.

18. H. Huang, D. Zhang, F. Xiao, K. Wang, J. Gu and R. Wang, "Privacy-Preserving Approach PBCN in Social Network With Differential Privacy," in IEEE Transactions on Network and Service Management, vol. 17, no. 2, pp. 931-945, June 2020, doi: 10.1109/TNSM.2020.2982555.

Referanslar

Benzer Belgeler

Gereç ve Yöntem: Ümraniye Eğitim Araştırma Hastanesi Çocuk Acil Servise 1 Ocak 2010-1 Temmuz 2012 tarihleri arasında başvuran yaşları 1 ay-16 yaş arasında değişen

Bu çalışmanın amacı gri suyun tama- mının beton üretiminde kullanılmasına imkân veren CLR-S sistemi hakkında bilgi verilmesidir. CLR-S sistemi; gri suyun yoğunluğunu

Congresium Ankara’da düzenlenen seminerin açılış konuş- masını yapan Türkiye Hazır Beton Birliği Yönetim Kurulu Başkanı Yavuz Işık, konuşmasına betonun dünyada en çok

Müzenin bir başka ilginç yanı da Alsancak tâki eski bir İzmir evinin restore edilip, o günün dekorasyon anlayışıyla düzenlenerek yaşayan bir sanat kurumu haline

13- Mevlidi İmam El Hasan Elmücteba ( Hz.İmam Hasan Müctebanın doğumu) Bayramı 14- Mevlidi İmam El Hüseyn Eşşehid (Hz. İmam Hüseyin Eşşehid’in Doğumu) Bayramı 15-

4 şubat pazar günü Pendik Belediye Başkanı Burhan Köseoğlu Pendik’te Neyzen Tevfik adına bir parkın temel atma törenini de gerçekleştirecek ve parka

Eski dünyanın ilk anonim şirketi ve ilk hisse senedi ihraç ederek modern borsanın temellerinin oluşmasına vesile olan şirket olarak bilinen VOC ile ilgili literatüre

Sadece Almanya’da 10971 adet biyogaz üretim tesisi bulunmaktadır (European Biogas Association, 2018, s.3). Buda onbinlerce insan için iş imkânı anlamına gelmektedir. 5)