Reference Hub2
A Conceptual Framework for Social Network Data Security: The Role of Social Network Analysis and Data Mining Techniques

A Conceptual Framework for Social Network Data Security: The Role of Social Network Analysis and Data Mining Techniques

Sanur Sharma, Vishal Bhatnagar
Copyright: © 2013 |Pages: 29
ISBN13: 9781466642133|ISBN10: 1466642130|EISBN13: 9781466642140
DOI: 10.4018/978-1-4666-4213-3.ch004
Cite Chapter Cite Chapter

MLA

Sharma, Sanur, and Vishal Bhatnagar. "A Conceptual Framework for Social Network Data Security: The Role of Social Network Analysis and Data Mining Techniques." Data Mining in Dynamic Social Networks and Fuzzy Systems, edited by Vishal Bhatnagar, IGI Global, 2013, pp. 58-86. https://doi.org/10.4018/978-1-4666-4213-3.ch004

APA

Sharma, S. & Bhatnagar, V. (2013). A Conceptual Framework for Social Network Data Security: The Role of Social Network Analysis and Data Mining Techniques. In V. Bhatnagar (Ed.), Data Mining in Dynamic Social Networks and Fuzzy Systems (pp. 58-86). IGI Global. https://doi.org/10.4018/978-1-4666-4213-3.ch004

Chicago

Sharma, Sanur, and Vishal Bhatnagar. "A Conceptual Framework for Social Network Data Security: The Role of Social Network Analysis and Data Mining Techniques." In Data Mining in Dynamic Social Networks and Fuzzy Systems, edited by Vishal Bhatnagar, 58-86. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-4213-3.ch004

Export Reference

Mendeley
Favorite

Abstract

In recent times, there has been a tremendous increase in the number of social networking sites and their users. With the amount of information posted on the public forums, it becomes essential for the service providers to maintain the privacy of an individual. Anonymization as a technique to secure social network data has gained popularity, but there are challenges in implementing it effectively. In this chapter, the authors have presented a conceptual framework to secure the social network data effectively by using data mining techniques to perform in-depth social network analysis before carrying out the actual anonymization process. The authors’ framework in the first step defines the role of community analysis in social network and its various features and temporal metrics. In the next step, the authors propose the application of those data mining techniques that can deal with the dynamic nature of social network and discover important attributes of the social network. Finally, the authors map their security requirements and their findings of the network properties which provide an appropriate base for selection and application of the anonymization technique to protect privacy of social network data.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.