
Submit your paper : editorIJETjournal@gmail.com ![]() ISSN : 2395-1303 Year of Publication : 2020 ![]() ![]() ![]() MLA Style: -Himani Saini, Gopal Singh " A Review of Challenges and Methods on Privacy Preservation of Social Networking Data" Volume 6 - Issue 3(1-8) May - June,2020 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org APA Style: -Himani Saini, Gopal Singh " A Review of Challenges and Methods on Privacy Preservation of Social Networking Data" Volume 6 - Issue 3(1-8) May - June,2020 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org Abstract - Enormous amount of data is being generated by various ecommerce or social Networking sites. To provide suggestions and recommendation to the customers or users, there is a need to processed and analyzed this voluminous data. Sharing of these data is helpful for application users. While sharing the private data, privacy preservation become one of the major concern for everyone. Due to the easy availability of numerous digital technologies, tons of data is generated every minute and preserving or securing such huge amount of data is not an easy task. this paper examines various privacy threats and privacy preservation techniques such as anonymization, randomization and cryptography. Reference [1] “techopedia,” [Online]. Available: https://www.techopedia.com/definition/4956/social-networking-site-sns. [Accessed 29 may 2020]. [2] J. Zhang, J. Sun, R. Zhang, Y. Zhang and X. Hu, “Privacy-Preserving Social Media Outsourcing,” in IEEE INFOCOM 2018-IEEE Conference on Computer Communications, Honolulu,HI,USA, 2018. [3] M. Siddula, L. LI and Y. LI, “An Empirical Study on the Privacy Preservation of Online Social Networks,” IEEE, vol. 6, pp. 19912-19922, 2018. [4] “Whatsapp Revenue And Usage Statistics 2020,” 24 april 2018. [Online]. Available: https://www.businessofapps.com/data/whatsapp-statistics/. [Accessed 29 may 2020]. [5] P. M. Rao, S. Krishna and P. Kumar, “Privacy Preservation Techniques in big data analytics: a survey,” Springer open, pp. 1-12, 2018. [6] S. and K. , “ A Research on Bigdata Privacy Preservation Methods,” IJRTE, vol. 8, no. 1S4, pp. 175-177, 2019. [7] w. contibutors, “k-anonymity,” WIKIPEDIA,The Free Encyclopedia, 2014. [Online]. Available: https://en.wikipedia.org/w/index.php?title=K-anonymity&oldid=959297811. [Accessed 30 may 2020]. [8] S. Shelke and B. Bhagat, “Techniques for Privacy Preservation in Data Mining,” International Journal of Enginnering Research & Technology, vol. 4, no. 10, pp. 490-493, 2015. [9] WilliamKF, “L-diversity,” WIKIPEDIA,The Free Encyclopedia, 2014. [Online]. Available: https://en.wikipedia.org/w/index.php?title=L-diversity&oldid=910039769. [Accessed 30 may 2020]. [10] P. Nivetha and s. Thamarai, “A Survey on Privacy Preserving Data Mining Techniques,” International Journal of Computer Science and MobileComputing, vol. 2, no. 10, pp. 166-170, 2013. [11] The Economic Times, “Definition of Cryptography,” Economic times, 2020. [Online]. Available: https://economictimes.indiatimes.com/definition/cryptography. [Accessed 30 may 2020]. [12] N. Mogre, G. Agarwal and P. Patil, “A Review On Anonymization Technique For Data Publishing,” International Journal of Engineering Research & Technology, vol. 1, no. 10, pp. 1-5, 2012. [13] K. Rajendran, M. Jayabalan and M. E. Rana, “A Study on K-anonymity, l-diversity and t-closeness Techniques focusing Medical Data,” International Journal of Computer Science and Network Security, vol. 17, no. 12, pp. 172-177, 2017. [14] P. M. Rao, S. Krishna and A. S. Kumar, “Privacy Preservation techniques in big data analytics: a survey,” springer nature, pp. 1-12, 2018. [15] “Social Media logo Collection,” Freepik, 2010. [Online]. Available: https://www.freepik.com/free-vector/social-media-logotypeset_3765835.htm#page=1&query=social%20media%20icon&position=43. [Accessed 2 Jun 2020]. [16]] “9 Biggest threats to Privacy- is the Right to Privacy dead?,” blokt, 2020. [Online]. Available: https://blokt.com/guides/biggest-privacy-threats. [Accessed 2 Jun 2020]. Keywords Sarcasm Detection, Multi sprivacy preservation, privacy threats, data anonymization, Randomization, cryptography. |