Ashalata Nayak, Security aspects in social network - A rough set approach
International Journal of Development Research
Ashalata Nayak, Security aspects in social network - A rough set approach
Received 24th February, 2018; Received in revised form; 20th March, 2018; Accepted 27th April, 2018; Published online 28th May, 2018
Copyright © 2018, Dr. Panda,and Ashalata Nayak. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Social networks come in many different facets. Some are strong in a particular geographic location like Orkut in Brazil, VKontakte in Rus¬sia, or Mixi in Japan. Others are well known globally, like Facebook and Twitter. Depending on the user base, there are specialized or focused groups LinkedIn and Xing have a business-oriented focus enabling people to share business contacts and job offerings. Other networks specialize in keeping in touch with your old friends from high school.The fast development of interconnections among computer systems, network-basedcomputer systems are playing increasingly vital roles in modem society. They becomethe targets of security and privacy issues of modern technology. Network security is becoming amajor challenge. In order to meet this challenge, the rough set technique (RST) to protect network information systems. The notion of rough sets as a model to capture impreciseness in data was introduced by Pawlak(1). Scientific study of social network data can reveal many important behaviors of the elements involved and social trends and provides insight for suitable changes in the social structure and roles of individuals in it. As more and more rich social media, popular online social networking sites and various kinds of social network privacy in social networks becomes a serious concern. When social network data is made public in one way or other, it is far from sufficient to protect privacy by simply replacing the identifying attributes.