International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020


IJSTR >> Volume 8 - Issue 10, October 2019 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

A Model To Ensure Business Ethicsin Social Networks

[Full Text]



Neethu. MR, Harini.N



Social Networking Sites, Internet, Information sharing Privacy, Distributed ledger technology, IPFS



Social networking sites generally push aside trust issues to maximize social interaction. One of the barriers to trust in online environment is privacy because Internet by design lacks a unified method for identifying who communicates with whom. Privacy concern is a person's awareness and assessment of risks related to privacy violations. Violation to privacy happens mostly because users themselves don't understand the consequences of sharing their personal data with peers. Context aware systems like cameras, accelerometers, microphones etc. affect privacy to a larger extent. Individuals are more likely to be concerned about their privacy when information is used without one's knowledge. In this paper, a privacy preservation scheme that safeguards users from online social networks selling data to third parties, based on distributed ledger technology is presented. The proposed scheme uses IPFS to store the digital content with high integrity thus making it available to all.



[1] Alalwan A., Rana N., Dwivedi Y., Algharabat R.: Social Media in Marketing: A Review and Analysis of the Existing Literature. In: Telematics and Informatics, 2017.

[2] Ali M.S.,Dolui K.,Antonelli F.:IoT data privacy via blockchains and IPFS.,2017.

[3] Alves H., Fernandes C., Raposo M.: Social Media Marketing: A Literature Review and Implications: IMPLICATIONS OF SOCIAL MEDIA MARKETING. In: Psychology Marketing, vol. 33, pp.1029-1038, 2016..

[4] Bahri L., Carminati B., Ferrari E.: Decentralized privacy preserving services for online social networks. In: Online Social Networks and Media, vol. 6, pp. 1825, 2018.

[5] Benkhelifa R., Laallam F.Z.: Exploring demographic information in online social networks for improving content classification. In: Journal of King Saud University-Computer and Information Sciences, 2018.

[6] Chen Y., Li H., Li K., Zhang J.: An improved P2P file system scheme based on IPFS and Blockchain. In: 2017 IEEE International Conference on Big Data (Big Data), pp. 26522657. IEEE, 2017.

[7] De Salve A., Mori P., Ricci L.: A survey on privacy in decentralized online social networks. In: Computer Science Review, vol. 27, pp. 154176, 2018.

[8] Feng Q., He D., Zeadally S., Khan M.K., Kumar N.: A survey on privacy protection in blockchain system. In: Journal of Network and Computer Applications, 2018.

[9] Giang Do H., Ng W.K.: Blockchain-Based System for Secure Data Storage with Private Keyword Search. pp. 9093.2017.

[10] Godey B., Manthiou A., Pederzoli D., Rokka J., Aiello G., Donvito R., Singh R.: Social media marketing efforts of luxury brands: Influence on brand equity and consumer behavior. In: Journal of Business Research, vol. 69, 2016.

[11] Golbeck J., Mauriello M.: User perception of Facebook app data access: A comparison of methods and privacy concerns. In: Future Internet, vol. 8(2), p. 9, 2016.

[12] Gowthaman A., Sumathi M.: Performance Study of Enhanced SHA-256 Algorithm.In: International Journal of Applied Engineering Research, vol. 10(4), pp.1092110932, 2015.

[13] Hao J., Sun Y., Luo H.: A Safe and Efficient Storage Scheme Based on BlockChain and IPFS for Agricultural Products Tracking. In: Journal of Computers, vol. 29(6), pp. 158167, 2018.
[14] Kosba A., Miller A., Shi E., Wen Z., Papamanthou C.: Hawk: The blockchain model of cryptography and privacy preserving smart contracts. In: 2016 IEEE symposium on security and privacy (SP), pp. 839858. IEEE, 2016.

[15] Neethu M., Harini N.: Safe sonet: A framework for building trustworthy relationships. In: International Journal of Engineering Technology, vol. 7, p. 57, 2018.

[16] Neethu M.R., Harini N.: Securing Image Posts in Social Networking Sites. In: D.J. Hemanth, S. Smys, eds., Computational Vision and Bio Inspired Computing, pp. 7991. Springer International Publishing, Cham, 2018.

[17] Rachmawati D., Tarigan J., B C Ginting A.: A comparative study of Message Digest 5(MD5) and SHA256 algorithm. In: Journal of Physics: Conference Series,vol. 978, p. 012116, 2018.

[18] Rathore S., Sharma P.K., Loia V., Jeong Y.S., Park J.H.: Social network security: Issues, challenges, threats, and solutions. In: Information sciences, vol. 421, pp. 4369, 2017.

[19] Wang S., Zhang Y., Zhang Y.: A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems. In: IEEE Access, vol. 6, pp. 3843738450, 2018.