Skip to main content
Top
Published in: Soft Computing 8/2021

10-02-2021 | Methodologies and Application

Fuzzy-based multiparty privacy management in social media using modified elliptic curve cryptography

Authors: P. Jayaprabha, K. Paulose Jacob, K. Preetha Mathew

Published in: Soft Computing | Issue 8/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Sharing data via social media may affect the privacy of other user’s in social media. Also, multiparty privacy management is absent in social media, which leads the users incapable of managing to whom the data are shared. Because of the privacy conflicts, it is not easy to combine the privacy preferences of multiple users. For resolving the privacy conflicts in social media, more methods are required. This study promotes a fuzzy-based multiparty privacy management in social media using modified elliptic curve cryptography. The evaluation model used a method based on secure multiparty computing. Next, the fuzzy technique for order of preference by similarity to ideal solution (fuzzy TOPSIS) method is used to rank and select the participants. Finally, data encryption is performed using a modified elliptic curve encryption (MECC). Here, the optimal selection of private key is performed using the cuckoo search optimization algorithm (CSOA). With these presented techniques, the users can manage who the data are shared. In order to overcome privacy conflicts, users may first rank and select the participants based on fuzzy TOPSIS. Also, the privacy of the users is not affected by using the MECC-based data encryption framework. The presented work is implemented on the JAVA platform. The outcomes of the experiment prove that the presented approach outperforms the other existing approaches.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Abualigah LMQ (2019) Feature selection and enhanced krill herd algorithm for text document clustering. Springer, BerlinCrossRef Abualigah LMQ (2019) Feature selection and enhanced krill herd algorithm for text document clustering. Springer, BerlinCrossRef
go back to reference Abualigah LM, Khader AT, Hanandeh ES (2018) A new feature selection method to improve the document clustering using particle swarm optimization algorithm. Comput Sci 25:456–466CrossRef Abualigah LM, Khader AT, Hanandeh ES (2018) A new feature selection method to improve the document clustering using particle swarm optimization algorithm. Comput Sci 25:456–466CrossRef
go back to reference Abualigah LM, Khader AT, Hanandeh ES (2018) Hybrid clustering analysis using improved krill herd algorithm. Appl Intell 48(11):4047–4071CrossRef Abualigah LM, Khader AT, Hanandeh ES (2018) Hybrid clustering analysis using improved krill herd algorithm. Appl Intell 48(11):4047–4071CrossRef
go back to reference Antoci A, Bonelli L, Paglieri F, Reggiani T, Sabatini F (2019) Civility and trust in social media. J Econ Behav Organ 160:83–99CrossRef Antoci A, Bonelli L, Paglieri F, Reggiani T, Sabatini F (2019) Civility and trust in social media. J Econ Behav Organ 160:83–99CrossRef
go back to reference Börekci R, Aydin S (2019) Foreign language teachers’ interactions with their students on Facebook. Comput Assist Lang Learn 1–23 Börekci R, Aydin S (2019) Foreign language teachers’ interactions with their students on Facebook. Comput Assist Lang Learn 1–23
go back to reference Devi SS, Indhumathi R (2019) A study on privacy-preserving approaches in online social network for data publishing. Data management, analytics and innovation. Springer, Singapore, pp 99–115CrossRef Devi SS, Indhumathi R (2019) A study on privacy-preserving approaches in online social network for data publishing. Data management, analytics and innovation. Springer, Singapore, pp 99–115CrossRef
go back to reference Guerar M, Migliardi M, Merlo A, Benmohammed M, Palmieri F, Castiglione A (2018) Using screen brightness to improve security in mobile social network access. IEEE Trans Dependable Secure Comput 15(4):621–632 Guerar M, Migliardi M, Merlo A, Benmohammed M, Palmieri F, Castiglione A (2018) Using screen brightness to improve security in mobile social network access. IEEE Trans Dependable Secure Comput 15(4):621–632
go back to reference Heravi A, Mubarak S, Choo K-KR (2018) Information privacy in online social networks: uses and gratification perspective. Comput Hum Behav 84:441–459CrossRef Heravi A, Mubarak S, Choo K-KR (2018) Information privacy in online social networks: uses and gratification perspective. Comput Hum Behav 84:441–459CrossRef
go back to reference Kizza MJ (2019) Ethical, privacy and security issues in the online social network ecosystems. Ethical and secure computing. Springer, Cham, pp 229–257CrossRef Kizza MJ (2019) Ethical, privacy and security issues in the online social network ecosystems. Ethical and secure computing. Springer, Cham, pp 229–257CrossRef
go back to reference Laleh N, Carminati B, Ferrari E (2018) Risk assessment in social networks based on user anomalous behaviors. IEEE Trans Dependable Secure Comput 15(2):295–308CrossRef Laleh N, Carminati B, Ferrari E (2018) Risk assessment in social networks based on user anomalous behaviors. IEEE Trans Dependable Secure Comput 15(2):295–308CrossRef
go back to reference Li F, He Y, Niu B, Li H (2017) Small-world: secure friend matching over physical world and social networks. Inf Sci 387:205–220CrossRef Li F, He Y, Niu B, Li H (2017) Small-world: secure friend matching over physical world and social networks. Inf Sci 387:205–220CrossRef
go back to reference Li H, Zhu H, Du S, Liang X, Shen XS (2018) Privacy leakage of location sharing in mobile social networks: attacks and defense. IEEE Trans Dependable Secure Comput 15(4):646–660CrossRef Li H, Zhu H, Du S, Liang X, Shen XS (2018) Privacy leakage of location sharing in mobile social networks: attacks and defense. IEEE Trans Dependable Secure Comput 15(4):646–660CrossRef
go back to reference Luo E, Liu Q, Abawajy JH, Wang G (2017) Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks. Future Gener Comput Syst 68:222–233CrossRef Luo E, Liu Q, Abawajy JH, Wang G (2017) Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks. Future Gener Comput Syst 68:222–233CrossRef
go back to reference Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2018) Image steganography using uncorrelated color space and its application for security of visual contents in online social networks. Future Gener Comput Syst 86:951–960CrossRef Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2018) Image steganography using uncorrelated color space and its application for security of visual contents in online social networks. Future Gener Comput Syst 86:951–960CrossRef
go back to reference Nisar TM, Prabhakar G, Strakova L (2019) Social media information benefits, knowledge management and smart organizations. J Bus Res 94:264–272CrossRef Nisar TM, Prabhakar G, Strakova L (2019) Social media information benefits, knowledge management and smart organizations. J Bus Res 94:264–272CrossRef
go back to reference Osatuyi B, Hiltz SR (2019) The impact of cross-addiction on information sharing behaviors on social networking sites. J Comput Inf Syst 59(2):105–115 Osatuyi B, Hiltz SR (2019) The impact of cross-addiction on information sharing behaviors on social networking sites. J Comput Inf Syst 59(2):105–115
go back to reference Priya KF, Patil N (2019) Resolving privacy conflict for maintaining privacy policies in online social networks. Int J Comput Eng Technol 10(3):94–101 Priya KF, Patil N (2019) Resolving privacy conflict for maintaining privacy policies in online social networks. Int J Comput Eng Technol 10(3):94–101
go back to reference Rathore S, Loia V, Park JH (2018) SpamSpotter: an efficient spammer detection framework based on intelligent decision support system on facebook. Appl Soft Comput 67:920–932CrossRef Rathore S, Loia V, Park JH (2018) SpamSpotter: an efficient spammer detection framework based on intelligent decision support system on facebook. Appl Soft Comput 67:920–932CrossRef
go back to reference Ruas HBP, Machado AD, Silva MC, Meireles MRG, Cardoso AMP, Zárate LE, Nobre CN (2019) Identification and characterisation of Facebook user profiles considering interaction aspects. Behav Inform Technol 1–15 Ruas HBP, Machado AD, Silva MC, Meireles MRG, Cardoso AMP, Zárate LE, Nobre CN (2019) Identification and characterisation of Facebook user profiles considering interaction aspects. Behav Inform Technol 1–15
go back to reference Salehan M, Kim DJ, Koo C (2018) A study of the effect of social trust, trust in social networking services, and sharing attitude, on two dimensions of personal information sharing behavior. J Supercomput 74(8):3596–3619CrossRef Salehan M, Kim DJ, Koo C (2018) A study of the effect of social trust, trust in social networking services, and sharing attitude, on two dimensions of personal information sharing behavior. J Supercomput 74(8):3596–3619CrossRef
go back to reference Shareef AM, Mukerji B, Dwivedi YK, Rana NP, Islam R (2019) Social media marketing: comparative effect of advertisement sources. J Retail Consumer Serv 46:58–69CrossRef Shareef AM, Mukerji B, Dwivedi YK, Rana NP, Islam R (2019) Social media marketing: comparative effect of advertisement sources. J Retail Consumer Serv 46:58–69CrossRef
go back to reference Shpigelman C-N (2018) Leveraging social capital of individuals with intellectual disabilities through participation on Facebook. J Appl Res Intellect Disabil 31(1):e79–e91CrossRef Shpigelman C-N (2018) Leveraging social capital of individuals with intellectual disabilities through participation on Facebook. J Appl Res Intellect Disabil 31(1):e79–e91CrossRef
go back to reference Song X, Zhou M (2017) Challenges to China’s diplomacy in the context of new media. New media and Chinese Society. Springer, Singapore, pp 149–164CrossRef Song X, Zhou M (2017) Challenges to China’s diplomacy in the context of new media. New media and Chinese Society. Springer, Singapore, pp 149–164CrossRef
go back to reference Such JM, Criado N (2016) Resolving multi-party privacy conflicts in social media. IEEE Trans Knowl Data Eng 28(7):1851–1863CrossRef Such JM, Criado N (2016) Resolving multi-party privacy conflicts in social media. IEEE Trans Knowl Data Eng 28(7):1851–1863CrossRef
go back to reference Tian Y, Li X, Sangaiah AK, Ngai E, Song Z, Zhang L, Wang W (2018) Privacy-preserving scheme in social participatory sensing based on secure multi-party cooperation. Comput Commun 119:167–178CrossRef Tian Y, Li X, Sangaiah AK, Ngai E, Song Z, Zhang L, Wang W (2018) Privacy-preserving scheme in social participatory sensing based on secure multi-party cooperation. Comput Commun 119:167–178CrossRef
go back to reference Wang S, Sinnott R, Nepal S (2018) Privacy-protected statistics publication over social media user trajectory streams. Future Gener Comput Syst 87:792–802CrossRef Wang S, Sinnott R, Nepal S (2018) Privacy-protected statistics publication over social media user trajectory streams. Future Gener Comput Syst 87:792–802CrossRef
go back to reference Wang H, He D, Yu J (2019) Privacy-preserving incentive and rewarding scheme for crowd computing in social media. Inf Sci 470:15–27CrossRef Wang H, He D, Yu J (2019) Privacy-preserving incentive and rewarding scheme for crowd computing in social media. Inf Sci 470:15–27CrossRef
go back to reference Yu F, Chen M, Yu B, Li W, Ma L, Gao H (2018) Privacy preservation based on clustering perturbation algorithm for social network. Multimed Tools Appl 77(9):11241–11258CrossRef Yu F, Chen M, Yu B, Li W, Ma L, Gao H (2018) Privacy preservation based on clustering perturbation algorithm for social network. Multimed Tools Appl 77(9):11241–11258CrossRef
go back to reference Zhang Z, Gupta BB (2018) Social media security and trustworthiness: overview and new direction. Future Gener Comput Syst 86:914–925CrossRef Zhang Z, Gupta BB (2018) Social media security and trustworthiness: overview and new direction. Future Gener Comput Syst 86:914–925CrossRef
go back to reference Zhang B, Liu CH, Lu J, Song Z, Ren Z, Ma J, Wang W (2016) Privacy-preserving QoI-aware participant coordination for mobile crowdsourcing. Comput Netw 101:29–41CrossRef Zhang B, Liu CH, Lu J, Song Z, Ren Z, Ma J, Wang W (2016) Privacy-preserving QoI-aware participant coordination for mobile crowdsourcing. Comput Netw 101:29–41CrossRef
go back to reference Zhang S, Kwok RC-W, Lowry PB, Liu Z, Wu J (2019) The influence of role stress on self-disclosure on social networking sites: a conservation of resources perspective. Inform Manag Zhang S, Kwok RC-W, Lowry PB, Liu Z, Wu J (2019) The influence of role stress on self-disclosure on social networking sites: a conservation of resources perspective. Inform Manag
Metadata
Title
Fuzzy-based multiparty privacy management in social media using modified elliptic curve cryptography
Authors
P. Jayaprabha
K. Paulose Jacob
K. Preetha Mathew
Publication date
10-02-2021
Publisher
Springer Berlin Heidelberg
Published in
Soft Computing / Issue 8/2021
Print ISSN: 1432-7643
Electronic ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-021-05601-y

Other articles of this Issue 8/2021

Soft Computing 8/2021 Go to the issue

Premium Partner