Security and privacy concerns in social networks mathematically modified metaheuristic-based approach
Potential risks and vulnerabilities in Social Networks (SN) that may threaten the confidentiality, accuracy, and accessibility of data provided by users have been identified as safety risks. Unauthorized usage of the system, breaches of data, privacy violations, cyber-attacks, and other malicious be...
Saved in:
Published in | Journal of discrete mathematical sciences & cryptography Vol. 27; no. 2-A; pp. 371 - 382 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | English |
Published |
01.03.2024
|
Online Access | Get full text |
ISSN | 0972-0529 2169-0065 |
DOI | 10.47974/JDMSC-1892 |
Cover
Loading…
Abstract | Potential risks and vulnerabilities in Social Networks (SN) that may threaten the confidentiality, accuracy, and accessibility of data provided by users have been identified as safety risks. Unauthorized usage of the system, breaches of data, privacy violations, cyber-attacks, and other malicious behaviors that negatively impact the SN’s reliability and security may be addressed within these. Innovative techniques that use scientifically enhanced metaheuristic algorithms are the subject of the study, which attempts to address evolving issues of security and privacy in SNs. In order to improve the security of online social networking data encryption, researchers recommend implementing the MMCSOA approach, which is the Mathematically Modified Cuckoo Search Optimization Algorithm. An enhanced tuning of elliptic curve parameters can be accomplished by adapting the Cuckoo Search method, which, in consequence, provides an encrypted environment for multi-party computing. Users’ preferences for confidentiality are considered while applying a fuzzy logic (FL) decision matrix to select individuals. Data security is improved, and users receive additional authority over data shared with MMCSOA. Research findings prove that MMCSOA is higher compared to other methods in securing users’ privacy. |
---|---|
AbstractList | Potential risks and vulnerabilities in Social Networks (SN) that may threaten the confidentiality, accuracy, and accessibility of data provided by users have been identified as safety risks. Unauthorized usage of the system, breaches of data, privacy violations, cyber-attacks, and other malicious behaviors that negatively impact the SN’s reliability and security may be addressed within these. Innovative techniques that use scientifically enhanced metaheuristic algorithms are the subject of the study, which attempts to address evolving issues of security and privacy in SNs. In order to improve the security of online social networking data encryption, researchers recommend implementing the MMCSOA approach, which is the Mathematically Modified Cuckoo Search Optimization Algorithm. An enhanced tuning of elliptic curve parameters can be accomplished by adapting the Cuckoo Search method, which, in consequence, provides an encrypted environment for multi-party computing. Users’ preferences for confidentiality are considered while applying a fuzzy logic (FL) decision matrix to select individuals. Data security is improved, and users receive additional authority over data shared with MMCSOA. Research findings prove that MMCSOA is higher compared to other methods in securing users’ privacy. |
Author | Krishna, Raguru Jaya Amarendra, K. Dadheech, Pankaj Sengan, Sudhakar Gopalakrishnan, T. Divyapushpalakshmi, M. |
Author_xml | – sequence: 1 givenname: Raguru Jaya surname: Krishna fullname: Krishna, Raguru Jaya – sequence: 2 givenname: T. surname: Gopalakrishnan fullname: Gopalakrishnan, T. – sequence: 3 givenname: M. surname: Divyapushpalakshmi fullname: Divyapushpalakshmi, M. – sequence: 4 givenname: K. surname: Amarendra fullname: Amarendra, K. – sequence: 5 givenname: Pankaj surname: Dadheech fullname: Dadheech, Pankaj – sequence: 6 givenname: Sudhakar surname: Sengan fullname: Sengan, Sudhakar |
BookMark | eNotkE1LAzEYhINUsK2e_AO5SzTJfmRzlPpNxUN7X5I3b2h0v0hWZf-9a_UyAzMwMM-KLLq-Q0IuBb_OlVb5zcvd627DRKXlCVlKUWrGeVksyJJrJRkvpD4jq5TeOS-0FHpJcIfwGcM4UdM5OsTwZWCi0HeAsUs0dDT1EExDOxy_-_iRaGvGA84SwDTNRNveBR_Q0RZHc8B5K80VsybNmRmG2Bs4nJNTb5qEF_--JvuH-_3miW3fHp83t1sGQouRlZAZzLUrLSjlVKbBSgs-0y6XUnmQQmImq1JZboQHWynEQiP3hahs5bI1ufqbhdinFNHX86HWxKkWvD4Cqo-A6l9A2Q_I3F4C |
ContentType | Journal Article |
DBID | AAYXX CITATION |
DOI | 10.47974/JDMSC-1892 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | CrossRef |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 2169-0065 |
EndPage | 382 |
ExternalDocumentID | 10_47974_JDMSC_1892 |
GroupedDBID | 30N 4.4 AAYXX ABCCY ABFIM ABPEM ABTAI ABXYU ACAGQ ACFPA ACGFS ACTIO ADCVX AEYOC AGDLA AGROQ AIJEM AKOOK ALCKM ALMA_UNASSIGNED_HOLDINGS ALQZU AQRUH AVBZW AWYRJ BLEHA CCCUG CITATION CRFIH DGEBU DKSSO DMQIW EBS EJD E~A E~B GTTXZ H13 HZ~ H~P IPNFZ J9A KYCEM LJTGL M4Z O9- P2P QCRFL RIG S-T SNACF TDBHL TFW TTHFI UT5 |
ID | FETCH-LOGICAL-c191t-6c3ae49d6bc77d739cb2bcf39d4227fc212e32867b0a1fcb87ee59e0f518b8d3 |
ISSN | 0972-0529 |
IngestDate | Tue Jul 01 01:03:25 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 2-A |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c191t-6c3ae49d6bc77d739cb2bcf39d4227fc212e32867b0a1fcb87ee59e0f518b8d3 |
PageCount | 12 |
ParticipantIDs | crossref_primary_10_47974_JDMSC_1892 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2024-03-01 |
PublicationDateYYYYMMDD | 2024-03-01 |
PublicationDate_xml | – month: 03 year: 2024 text: 2024-03-01 day: 01 |
PublicationDecade | 2020 |
PublicationTitle | Journal of discrete mathematical sciences & cryptography |
PublicationYear | 2024 |
SSID | ssj0059219 |
Score | 2.304235 |
Snippet | Potential risks and vulnerabilities in Social Networks (SN) that may threaten the confidentiality, accuracy, and accessibility of data provided by users have... |
SourceID | crossref |
SourceType | Index Database |
StartPage | 371 |
Title | Security and privacy concerns in social networks mathematically modified metaheuristic-based approach |
Volume | 27 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lj9owELbo9tJL31Xf8mFvyDSxjZ0c0faxWok9dKm0N2Q7TkGFFIVkJfrv-s86jp0QVlTa9hIhYyeC-fB8Y2bmQ-g0gaCCc66J4sYFKDIiqVaC8Cxi8GuiSktXjTy9FOff-MX1-How-N3LWqorPTK_jtaV_I9VYQzs6qpk_8Gy3U1hAF6DfeEKFobrnWx8FcTnQrX_8sZptxtXiFj6_PBwIl74XO_tcN01aVWr1c7J4Cxzx0HXtlILW_uuzcR5tqzrNv4X-urKeUtg3Af3HAaHum0QZcrdpuq3xHYbu1O093VoX9X3uqyHF2rXuYYvEMKv1A8_x-smjzqqvbzZqU29XTRTtot1k4cw7d6frF1dW1b6GrdR_ziD8n0-V3suKSlxfz96B9WM0VikxJGl_rbtWwoEeFIy6e3CzKu6BIfOvLrRbV_BJYRSTgf74_TqjMSJl-Q77Mh9y1N2-YsQOTXL583iuVt8D92nEKk4EQ0WXbZkYJzS2Ld7DJ_Kl4g2iz_sn9wjRT12M3uMHga74onH2BM0sMVT9KiV_MDBAzxDtoUcBsjhADncQg4vC-whh1vI4UPI4RZy-AjkcAu552j2-dPs7JwEpQ5iIN6viDBMWZ5mQhspM8lSo6k2OUszTqnMDfAjy2gipI5UnBudSGvHqY3ycZzoJGMv0Enxs7AvERYZjdLcqR5IzbUQSjCTiDzJ4yhJga6-QqftNzXf-H4s8yPWeH23aW_Qgz0G36KTqqztOyCZlX7fmPEPRuSEFA |
linkProvider | Taylor & Francis |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Security+and+privacy+concerns+in+social+networks+mathematically+modified+metaheuristic-based+approach&rft.jtitle=Journal+of+discrete+mathematical+sciences+%26+cryptography&rft.au=Krishna%2C+Raguru+Jaya&rft.au=Gopalakrishnan%2C+T.&rft.au=Divyapushpalakshmi%2C+M.&rft.au=Amarendra%2C+K.&rft.date=2024-03-01&rft.issn=0972-0529&rft.eissn=2169-0065&rft.volume=27&rft.issue=2-A&rft.spage=371&rft.epage=382&rft_id=info:doi/10.47974%2FJDMSC-1892&rft.externalDBID=n%2Fa&rft.externalDocID=10_47974_JDMSC_1892 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0972-0529&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0972-0529&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0972-0529&client=summon |