Security and privacy concerns in social networks mathematically modified metaheuristic-based approach

Potential risks and vulnerabilities in Social Networks (SN) that may threaten the confidentiality, accuracy, and accessibility of data provided by users have been identified as safety risks. Unauthorized usage of the system, breaches of data, privacy violations, cyber-attacks, and other malicious be...

Full description

Saved in:
Bibliographic Details
Published inJournal of discrete mathematical sciences & cryptography Vol. 27; no. 2-A; pp. 371 - 382
Main Authors Krishna, Raguru Jaya, Gopalakrishnan, T., Divyapushpalakshmi, M., Amarendra, K., Dadheech, Pankaj, Sengan, Sudhakar
Format Journal Article
LanguageEnglish
Published 01.03.2024
Online AccessGet full text
ISSN0972-0529
2169-0065
DOI10.47974/JDMSC-1892

Cover

Loading…
Abstract Potential risks and vulnerabilities in Social Networks (SN) that may threaten the confidentiality, accuracy, and accessibility of data provided by users have been identified as safety risks. Unauthorized usage of the system, breaches of data, privacy violations, cyber-attacks, and other malicious behaviors that negatively impact the SN’s reliability and security may be addressed within these. Innovative techniques that use scientifically enhanced metaheuristic algorithms are the subject of the study, which attempts to address evolving issues of security and privacy in SNs. In order to improve the security of online social networking data encryption, researchers recommend implementing the MMCSOA approach, which is the Mathematically Modified Cuckoo Search Optimization Algorithm. An enhanced tuning of elliptic curve parameters can be accomplished by adapting the Cuckoo Search method, which, in consequence, provides an encrypted environment for multi-party computing. Users’ preferences for confidentiality are considered while applying a fuzzy logic (FL) decision matrix to select individuals. Data security is improved, and users receive additional authority over data shared with MMCSOA. Research findings prove that MMCSOA is higher compared to other methods in securing users’ privacy.
AbstractList Potential risks and vulnerabilities in Social Networks (SN) that may threaten the confidentiality, accuracy, and accessibility of data provided by users have been identified as safety risks. Unauthorized usage of the system, breaches of data, privacy violations, cyber-attacks, and other malicious behaviors that negatively impact the SN’s reliability and security may be addressed within these. Innovative techniques that use scientifically enhanced metaheuristic algorithms are the subject of the study, which attempts to address evolving issues of security and privacy in SNs. In order to improve the security of online social networking data encryption, researchers recommend implementing the MMCSOA approach, which is the Mathematically Modified Cuckoo Search Optimization Algorithm. An enhanced tuning of elliptic curve parameters can be accomplished by adapting the Cuckoo Search method, which, in consequence, provides an encrypted environment for multi-party computing. Users’ preferences for confidentiality are considered while applying a fuzzy logic (FL) decision matrix to select individuals. Data security is improved, and users receive additional authority over data shared with MMCSOA. Research findings prove that MMCSOA is higher compared to other methods in securing users’ privacy.
Author Krishna, Raguru Jaya
Amarendra, K.
Dadheech, Pankaj
Sengan, Sudhakar
Gopalakrishnan, T.
Divyapushpalakshmi, M.
Author_xml – sequence: 1
  givenname: Raguru Jaya
  surname: Krishna
  fullname: Krishna, Raguru Jaya
– sequence: 2
  givenname: T.
  surname: Gopalakrishnan
  fullname: Gopalakrishnan, T.
– sequence: 3
  givenname: M.
  surname: Divyapushpalakshmi
  fullname: Divyapushpalakshmi, M.
– sequence: 4
  givenname: K.
  surname: Amarendra
  fullname: Amarendra, K.
– sequence: 5
  givenname: Pankaj
  surname: Dadheech
  fullname: Dadheech, Pankaj
– sequence: 6
  givenname: Sudhakar
  surname: Sengan
  fullname: Sengan, Sudhakar
BookMark eNotkE1LAzEYhINUsK2e_AO5SzTJfmRzlPpNxUN7X5I3b2h0v0hWZf-9a_UyAzMwMM-KLLq-Q0IuBb_OlVb5zcvd627DRKXlCVlKUWrGeVksyJJrJRkvpD4jq5TeOS-0FHpJcIfwGcM4UdM5OsTwZWCi0HeAsUs0dDT1EExDOxy_-_iRaGvGA84SwDTNRNveBR_Q0RZHc8B5K80VsybNmRmG2Bs4nJNTb5qEF_--JvuH-_3miW3fHp83t1sGQouRlZAZzLUrLSjlVKbBSgs-0y6XUnmQQmImq1JZboQHWynEQiP3hahs5bI1ufqbhdinFNHX86HWxKkWvD4Cqo-A6l9A2Q_I3F4C
ContentType Journal Article
DBID AAYXX
CITATION
DOI 10.47974/JDMSC-1892
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList CrossRef
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2169-0065
EndPage 382
ExternalDocumentID 10_47974_JDMSC_1892
GroupedDBID 30N
4.4
AAYXX
ABCCY
ABFIM
ABPEM
ABTAI
ABXYU
ACAGQ
ACFPA
ACGFS
ACTIO
ADCVX
AEYOC
AGDLA
AGROQ
AIJEM
AKOOK
ALCKM
ALMA_UNASSIGNED_HOLDINGS
ALQZU
AQRUH
AVBZW
AWYRJ
BLEHA
CCCUG
CITATION
CRFIH
DGEBU
DKSSO
DMQIW
EBS
EJD
E~A
E~B
GTTXZ
H13
HZ~
H~P
IPNFZ
J9A
KYCEM
LJTGL
M4Z
O9-
P2P
QCRFL
RIG
S-T
SNACF
TDBHL
TFW
TTHFI
UT5
ID FETCH-LOGICAL-c191t-6c3ae49d6bc77d739cb2bcf39d4227fc212e32867b0a1fcb87ee59e0f518b8d3
ISSN 0972-0529
IngestDate Tue Jul 01 01:03:25 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 2-A
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c191t-6c3ae49d6bc77d739cb2bcf39d4227fc212e32867b0a1fcb87ee59e0f518b8d3
PageCount 12
ParticipantIDs crossref_primary_10_47974_JDMSC_1892
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2024-03-01
PublicationDateYYYYMMDD 2024-03-01
PublicationDate_xml – month: 03
  year: 2024
  text: 2024-03-01
  day: 01
PublicationDecade 2020
PublicationTitle Journal of discrete mathematical sciences & cryptography
PublicationYear 2024
SSID ssj0059219
Score 2.304235
Snippet Potential risks and vulnerabilities in Social Networks (SN) that may threaten the confidentiality, accuracy, and accessibility of data provided by users have...
SourceID crossref
SourceType Index Database
StartPage 371
Title Security and privacy concerns in social networks mathematically modified metaheuristic-based approach
Volume 27
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lj9owELbo9tJL31Xf8mFvyDSxjZ0c0faxWok9dKm0N2Q7TkGFFIVkJfrv-s86jp0QVlTa9hIhYyeC-fB8Y2bmQ-g0gaCCc66J4sYFKDIiqVaC8Cxi8GuiSktXjTy9FOff-MX1-How-N3LWqorPTK_jtaV_I9VYQzs6qpk_8Gy3U1hAF6DfeEKFobrnWx8FcTnQrX_8sZptxtXiFj6_PBwIl74XO_tcN01aVWr1c7J4Cxzx0HXtlILW_uuzcR5tqzrNv4X-urKeUtg3Af3HAaHum0QZcrdpuq3xHYbu1O093VoX9X3uqyHF2rXuYYvEMKv1A8_x-smjzqqvbzZqU29XTRTtot1k4cw7d6frF1dW1b6GrdR_ziD8n0-V3suKSlxfz96B9WM0VikxJGl_rbtWwoEeFIy6e3CzKu6BIfOvLrRbV_BJYRSTgf74_TqjMSJl-Q77Mh9y1N2-YsQOTXL583iuVt8D92nEKk4EQ0WXbZkYJzS2Ld7DJ_Kl4g2iz_sn9wjRT12M3uMHga74onH2BM0sMVT9KiV_MDBAzxDtoUcBsjhADncQg4vC-whh1vI4UPI4RZy-AjkcAu552j2-dPs7JwEpQ5iIN6viDBMWZ5mQhspM8lSo6k2OUszTqnMDfAjy2gipI5UnBudSGvHqY3ycZzoJGMv0Enxs7AvERYZjdLcqR5IzbUQSjCTiDzJ4yhJga6-QqftNzXf-H4s8yPWeH23aW_Qgz0G36KTqqztOyCZlX7fmPEPRuSEFA
linkProvider Taylor & Francis
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Security+and+privacy+concerns+in+social+networks+mathematically+modified+metaheuristic-based+approach&rft.jtitle=Journal+of+discrete+mathematical+sciences+%26+cryptography&rft.au=Krishna%2C+Raguru+Jaya&rft.au=Gopalakrishnan%2C+T.&rft.au=Divyapushpalakshmi%2C+M.&rft.au=Amarendra%2C+K.&rft.date=2024-03-01&rft.issn=0972-0529&rft.eissn=2169-0065&rft.volume=27&rft.issue=2-A&rft.spage=371&rft.epage=382&rft_id=info:doi/10.47974%2FJDMSC-1892&rft.externalDBID=n%2Fa&rft.externalDocID=10_47974_JDMSC_1892
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0972-0529&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0972-0529&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0972-0529&client=summon