Skip to main content

Investigating Peers in Social Networks: Reliable or Unreilable

  • Conference paper
  • First Online:
Advances in Distributed Computing and Machine Learning

Abstract

Social networking sites have made its impact in converting a passive reader into content contributor. This has turned online social networks into a commercial sphere. The site demands creation of public profiles. The main goal of online social networks is to share content with maximum users. This enormous sharing of information can lead to malicious users leverage the privacy of an individual. An attempt has been made in this paper to improve privacy preservation by calculating the reliability of a user, can entrust on his/her peer using the content sharing, Machine Learning and tone analysis. The recorded metrics and transaction details are stored in IPFS.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Neethu MR, Harini N (2018) A model to ensure business ethics in social networks. Int J Sci Technol Res 2(5):79–91

    Google Scholar 

  2. Rathore S et al (2017) Social network security: issues, challenges, threats, and solutions. Inform Sci 421(5):43–69

    Google Scholar 

  3. Sapountzi A, Psannis KE (2018) Social networking data analysis tools & challenges. Fut Gener Comput Syst 86:893–913

    Google Scholar 

  4. Chen Y, Li H, Li K, Zhang J (2017) An improved P2P file system scheme based on IPFS and Blockchain. In: 2017 IEEE international conference on big data (big data). IEEE, pp 2652–2657

    Google Scholar 

  5. Ali MS, Dolui K, Antonelli F (2017) IoT data privacy via blockchains and IPFS. In: Proceedings of the seventh international conference on the internet of things. ACM

    Google Scholar 

  6. Sowmya Lakshmi BS, Shambhavi BR (2019) Automatic English to Kannada back-transliteration using combination-based approach. In: Emerging research in electronics, computer science and technology. Springer, Singapore, pp 159–170

    Google Scholar 

  7. Marouf Al Ahmed (2019) Recognizing language and emotional tone from music lyrics using IBM Watson Tone Analyzer. In: IEEE international conference on electrical, computer and communication technologies (ICECCT). IEEE

    Google Scholar 

  8. Neethu MR, Harini N (2018) Securing image posts in social networking sites. Comput Vis Bio Inspired Comput 2(5):79-91

    Google Scholar 

  9. Feng X (2017) An improved text classification model for mobile data security testing. In: 2017 IEEE 2nd advanced information technology, electronic and automation control conference (IAEAC). IEEE

    Google Scholar 

  10. Neethu MR, Harini N (2020) Secure request response (SRR): a framework to classify trust/distrust relationships in social networking. Comput Eng Technol 2(5):307–317

    Google Scholar 

  11. Kayes I, Iamnitchi A (2017) Privacy and security in online social networks: a survey. Online Soc Networks Media 3–4(5):1–21

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. Harini .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Neethu, M.R., Harini, N., Abirami, K. (2021). Investigating Peers in Social Networks: Reliable or Unreilable. In: Tripathy, A., Sarkar, M., Sahoo, J., Li, KC., Chinara, S. (eds) Advances in Distributed Computing and Machine Learning. Lecture Notes in Networks and Systems, vol 127. Springer, Singapore. https://doi.org/10.1007/978-981-15-4218-3_18

Download citation

Publish with us

Policies and ethics