Skip to main content
Log in

Fuzzy-based multiparty privacy management in social media using modified elliptic curve cryptography

  • Methodologies and Application
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Sharing data via social media may affect the privacy of other user’s in social media. Also, multiparty privacy management is absent in social media, which leads the users incapable of managing to whom the data are shared. Because of the privacy conflicts, it is not easy to combine the privacy preferences of multiple users. For resolving the privacy conflicts in social media, more methods are required. This study promotes a fuzzy-based multiparty privacy management in social media using modified elliptic curve cryptography. The evaluation model used a method based on secure multiparty computing. Next, the fuzzy technique for order of preference by similarity to ideal solution (fuzzy TOPSIS) method is used to rank and select the participants. Finally, data encryption is performed using a modified elliptic curve encryption (MECC). Here, the optimal selection of private key is performed using the cuckoo search optimization algorithm (CSOA). With these presented techniques, the users can manage who the data are shared. In order to overcome privacy conflicts, users may first rank and select the participants based on fuzzy TOPSIS. Also, the privacy of the users is not affected by using the MECC-based data encryption framework. The presented work is implemented on the JAVA platform. The outcomes of the experiment prove that the presented approach outperforms the other existing approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  • Abualigah LMQ (2019) Feature selection and enhanced krill herd algorithm for text document clustering. Springer, Berlin

    Book  Google Scholar 

  • Abualigah LM, Khader AT, Hanandeh ES (2018) A new feature selection method to improve the document clustering using particle swarm optimization algorithm. Comput Sci 25:456–466

    Article  Google Scholar 

  • Abualigah LM, Khader AT, Hanandeh ES (2018) Hybrid clustering analysis using improved krill herd algorithm. Appl Intell 48(11):4047–4071

    Article  Google Scholar 

  • Antoci A, Bonelli L, Paglieri F, Reggiani T, Sabatini F (2019) Civility and trust in social media. J Econ Behav Organ 160:83–99

    Article  Google Scholar 

  • Börekci R, Aydin S (2019) Foreign language teachers’ interactions with their students on Facebook. Comput Assist Lang Learn 1–23

  • Devi SS, Indhumathi R (2019) A study on privacy-preserving approaches in online social network for data publishing. Data management, analytics and innovation. Springer, Singapore, pp 99–115

    Chapter  Google Scholar 

  • Guerar M, Migliardi M, Merlo A, Benmohammed M, Palmieri F, Castiglione A (2018) Using screen brightness to improve security in mobile social network access. IEEE Trans Dependable Secure Comput 15(4):621–632

    Google Scholar 

  • Heravi A, Mubarak S, Choo K-KR (2018) Information privacy in online social networks: uses and gratification perspective. Comput Hum Behav 84:441–459

    Article  Google Scholar 

  • Kizza MJ (2019) Ethical, privacy and security issues in the online social network ecosystems. Ethical and secure computing. Springer, Cham, pp 229–257

    Chapter  Google Scholar 

  • Laleh N, Carminati B, Ferrari E (2018) Risk assessment in social networks based on user anomalous behaviors. IEEE Trans Dependable Secure Comput 15(2):295–308

    Article  Google Scholar 

  • Li F, He Y, Niu B, Li H (2017) Small-world: secure friend matching over physical world and social networks. Inf Sci 387:205–220

    Article  Google Scholar 

  • Li H, Zhu H, Du S, Liang X, Shen XS (2018) Privacy leakage of location sharing in mobile social networks: attacks and defense. IEEE Trans Dependable Secure Comput 15(4):646–660

    Article  Google Scholar 

  • Luo E, Liu Q, Abawajy JH, Wang G (2017) Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks. Future Gener Comput Syst 68:222–233

    Article  Google Scholar 

  • Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2018) Image steganography using uncorrelated color space and its application for security of visual contents in online social networks. Future Gener Comput Syst 86:951–960

    Article  Google Scholar 

  • Nisar TM, Prabhakar G, Strakova L (2019) Social media information benefits, knowledge management and smart organizations. J Bus Res 94:264–272

    Article  Google Scholar 

  • Osatuyi B, Hiltz SR (2019) The impact of cross-addiction on information sharing behaviors on social networking sites. J Comput Inf Syst 59(2):105–115

    Google Scholar 

  • Priya KF, Patil N (2019) Resolving privacy conflict for maintaining privacy policies in online social networks. Int J Comput Eng Technol 10(3):94–101

    Google Scholar 

  • Rathore S, Loia V, Park JH (2018) SpamSpotter: an efficient spammer detection framework based on intelligent decision support system on facebook. Appl Soft Comput 67:920–932

    Article  Google Scholar 

  • Ruas HBP, Machado AD, Silva MC, Meireles MRG, Cardoso AMP, Zárate LE, Nobre CN (2019) Identification and characterisation of Facebook user profiles considering interaction aspects. Behav Inform Technol 1–15

  • Salehan M, Kim DJ, Koo C (2018) A study of the effect of social trust, trust in social networking services, and sharing attitude, on two dimensions of personal information sharing behavior. J Supercomput 74(8):3596–3619

    Article  Google Scholar 

  • Shareef AM, Mukerji B, Dwivedi YK, Rana NP, Islam R (2019) Social media marketing: comparative effect of advertisement sources. J Retail Consumer Serv 46:58–69

    Article  Google Scholar 

  • Shpigelman C-N (2018) Leveraging social capital of individuals with intellectual disabilities through participation on Facebook. J Appl Res Intellect Disabil 31(1):e79–e91

    Article  Google Scholar 

  • Song X, Zhou M (2017) Challenges to China’s diplomacy in the context of new media. New media and Chinese Society. Springer, Singapore, pp 149–164

    Chapter  Google Scholar 

  • Such JM, Criado N (2016) Resolving multi-party privacy conflicts in social media. IEEE Trans Knowl Data Eng 28(7):1851–1863

    Article  Google Scholar 

  • Tian Y, Li X, Sangaiah AK, Ngai E, Song Z, Zhang L, Wang W (2018) Privacy-preserving scheme in social participatory sensing based on secure multi-party cooperation. Comput Commun 119:167–178

    Article  Google Scholar 

  • Wang S, Sinnott R, Nepal S (2018) Privacy-protected statistics publication over social media user trajectory streams. Future Gener Comput Syst 87:792–802

    Article  Google Scholar 

  • Wang H, He D, Yu J (2019) Privacy-preserving incentive and rewarding scheme for crowd computing in social media. Inf Sci 470:15–27

    Article  Google Scholar 

  • Yu F, Chen M, Yu B, Li W, Ma L, Gao H (2018) Privacy preservation based on clustering perturbation algorithm for social network. Multimed Tools Appl 77(9):11241–11258

    Article  Google Scholar 

  • Zhang Z, Gupta BB (2018) Social media security and trustworthiness: overview and new direction. Future Gener Comput Syst 86:914–925

    Article  Google Scholar 

  • Zhang B, Liu CH, Lu J, Song Z, Ren Z, Ma J, Wang W (2016) Privacy-preserving QoI-aware participant coordination for mobile crowdsourcing. Comput Netw 101:29–41

    Article  Google Scholar 

  • Zhang S, Kwok RC-W, Lowry PB, Liu Z, Wu J (2019) The influence of role stress on self-disclosure on social networking sites: a conservation of resources perspective. Inform Manag

Download references

Funding

No funding is provided for the preparation of manuscript.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. Jayaprabha.

Ethics declarations

Conflict of interest

All authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jayaprabha, P., Paulose Jacob, K. & Preetha Mathew, K. Fuzzy-based multiparty privacy management in social media using modified elliptic curve cryptography. Soft Comput 25, 6083–6100 (2021). https://doi.org/10.1007/s00500-021-05601-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-021-05601-y

Keywords

Navigation