J. Aneeta Maria, R. Shanmugapriya, S. Veena, Mishmala Sushith, Kalaignar Karunanidhi Institute of Technology, Coimbatore, Tamilnadu, India.
DOI : 01.0401/ijaict.2015.11.04
International Journal of Advanced Information and Communication Technology
Received On : December 12, 2018
Revised On : January 19, 2018
Accepted On : February 10, 2018
Published On : March 05, 2018
Volume 05, Issue 03
Pages : 830-833
Abstract
The sharing of one’s own personal data in the online social networks has become such a sort of common task. In this paper we have reviewed the concepts of the techniques that enable us to locate our buddies online, the reasons for the leakage of our personal data to the third party vendors which are being used for the purposes of targeted ads. This paper also enlightens the anonymity for continuous queries, secure function evaluation technique, L-diversity method. The various privacy measures for the different environment has also been studied in detail.
Keywords
Location, Online Social Networks, Privacy, Security Sharing
Cite this article
J. Aneeta Maria, R. Shanmugapriya, S. Veena, Mishmala Sushith, “A Efficient Role Mining –RBAM with Constraint Satisfaction Problem” INTERNATIONAL JOURNAL OF ADVANCED INFORMATION AND COMMUNICATION TECHNOLOGY, pp.807-813, March 05, 2018.
Copyright
© 2018 J. Aneeta Maria, R. Shanmugapriya, S. Veena, Mishmala Sushith. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.