AI-Driven Hybrid Privacy Preservation Model For Enhanced Security In Online Social Networks

  • Bodake Sarika Vasantrao
  • Dr. Pooja Sharma
  • Dr. Sandeep Kadam
Keywords: AI-Driven Privacy, Online Social Networks, Hybrid Privacy Model, Machine Learning, Homomorphic Encryption, Adaptive Privacy Management, Threat Detection, Cryptography, Privacy Preservation

Abstract

This paper discusses the design and testing of an AI-Driven Hybrid Privacy Preservation Model, developed for online social networks. The model incorporates advanced AI techniques with cryptographic mechanisms and adaptive management of privacy to enhance security and privacy in OSNs. AI-HPPM considers privacy threat detection and mitigation. Machine learning algorithms are used in order to distinguish between legit activities of the user and suspicious activities of the user. This also makes use of homomorphic encryption to protect user data while processing with no high overhead in performance. Adaptive privacy settings also update automatically in relation to user behavior and context changes greatly reducing manual intervention. Comprehensive testing revealed that AI-HPPM has exhibited better performance when having 95.8% detection rate for threats, a minimal overhead of 2.5% cryptographic, and an adaptability rate of 93%.The model proactively alerts the users to potential risks with an 85% user response rate toward privacy alerts that effectively prevent breach of privacy before incidents arise. AI-HPPM outperforms conventional models in the realms of accuracy, efficacy, and degree of user satisfaction. This hybrid approach provides a comprehensive, future-proof solution for privacy protection in rapidly evolving digital environments. Thus, the paper concludes that AI-HPPM is a scalable, adaptable, and efficient model for enhancing privacy in OSNs and beyond.

 

Author Biographies

Bodake Sarika Vasantrao

Research Scholar, Department of Computer Science, Kalinga Univesity, Naya Raipur (C.G.), India

Dr. Pooja Sharma

Professor, Department of Computer Science, Kalinga Univesity, Naya Raipur (C.G.), India

Dr. Sandeep Kadam

Associate Professor, Department of Computer Science and Engineering, Akhil Bhartiya Maratha Shikshan Parishad’s, Anantrao Pawar College of Engineering & Research, Pune, India

References

1. Can, U., & Alatas, B. (2019). A new direction in social network analysis: Online social network analysis problems and applications. Physica A: Statistical Mechanics and its Applications, 535, 122372.
2. Jain, A. K., Sahoo, S. R., & Kaubiyal, J. (2021). Online social networks security and privacy: comprehensive review and analysis. Complex & Intelligent Systems, 7(5), 2157-2177.
3. Al-Garadi, M. A., Khan, M. S., Varathan, K. D., Mujtaba, G., & Al-Kabsi, A. M. (2016). Using online social networks to track a pandemic: A systematic review. Journal of biomedical informatics, 62, 1-11.
4. Paul, T., Famulari, A., & Strufe, T. (2014). A survey on decentralized online social networks. Computer Networks, 75, 437-452.
5. Gupta, B. B., & Sahoo, S. R. (2021). Online social networks security: principles, algorithm, applications, and perspectives. CRC Press.
6. Al-Yazidi, S., Berri, J., Al-Qurishi, M., & Al-Alrubaian, M. (2020). Measuring reputation and influence in online social networks: a systematic literature review. IEEE Access, 8, 105824-105851.
7. Kayes, I., & Iamnitchi, A. (2017). Privacy and security in online social networks: A survey. Online Social Networks and Media, 3, 1-21.
8. Ali, S., Islam, N., Rauf, A., Din, I. U., Guizani, M., & Rodrigues, J. J. (2018). Privacy and security issues in online social networks. Future Internet, 10(12), 114.
9. Srivastava, A., & Geethakumari, G. (2015). Privacy landscape in online social networks. International Journal of Trust Management in Computing and Communications, 3(1), 19-39.
10. Jain, A. K., Sahoo, S. R., & Kaubiyal, J. (2021). Online social networks security and privacy: comprehensive review and analysis. Complex & Intelligent Systems, 7(5), 2157-2177.
11. Kayes, I., & Iamnitchi, A. (2017). Privacy and security in online social networks: A survey. Online Social Networks and Media, 3, 1-21.
12. Tennakoon, H. (2015). Information Security and Privacy in Social Media: The Threat Landscape. In Implications of Social Media Use in Personal and Professional Settings (pp. 73-101). IGI Global.
13. Schadt, E. E. (2012). The changing privacy landscape in the era of big data. Molecular systems biology, 8(1), 612.
14. Ochs, C., & Ilyes, P. (2013). Sociotechnical privacy. Mapping the research landscape. Tecnoscienza–Italian Journal of Science & Technology Studies, 4(2), 73-91.
15. Lewis, K., Kaufman, J., & Christakis, N. (2008). The taste for privacy: An analysis of college student privacy settings in an online social network. Journal of computer-mediated communication, 14(1), 79-100.
16. Marwick, A. E., & Boyd, D. (2014). Networked privacy: How teenagers negotiate context in social media. New media & society, 16(7), 1051-1067.
17. Nissenbaum, H. (2011). A contextual approach to privacy online. Daedalus, 140(4), 32-48.
18. Casadesus-Masanell, R., & Hervas-Drane, A. (2020). Strategies for managing the privacy landscape. Long range planning, 53(4), 101949.
19. Torre, D., Chennamaneni, A., & Rodriguez, A. (2023). Privacy-preservation techniques for IoT devices: a systematic mapping study. IEEE Access, 11, 16323-16345.
20. Ram Mohan Rao, P., Murali Krishna, S., & Siva Kumar, A. P. (2018). Privacy preservation techniques in big data analytics: a survey. Journal of Big Data, 5(1), 33.
21. Boulemtafes, A., Derhab, A., & Challal, Y. (2020). A review of privacy-preserving techniques for deep learning. Neurocomputing, 384, 21-45.
22. Li, N., Zhang, N., Das, S. K., & Thuraisingham, B. (2009). Privacy preservation in wireless sensor networks: A state-of-the-art survey. Ad Hoc Networks, 7(8), 1501-1514.
23. Sachan, A., Roy, D., & Arun, P. V. (2013). An analysis of privacy preservation techniques in data mining. In Advances in Computing and Information Technology: Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India-Volume 3 (pp. 119-128). Springer Berlin Heidelberg.
24. Yin, R., Yan, Z., Liang, X., Xie, H., & Wan, Z. (2023). A survey on privacy preservation techniques for blockchain interoperability. Journal of Systems Architecture, 140, 102892.
25. Jayaraman, P. P., Yang, X., Yavari, A., Georgakopoulos, D., & Yi, X. (2017). Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation. Future Generation Computer Systems, 76, 540-549.
26. Carvalho, T., Moniz, N., Faria, P., & Antunes, L. (2022). Survey on privacy-preserving techniques for data publishing. arXiv preprint arXiv:2201.08120.
27. Hamza, R., & Zettsu, K. (2021, August). Investigation on privacy-preserving techniques for personal data. In Proceedings of the 2021 ACM Workshop on Intelligent Cross-Data Analysis and Retrieval (pp. 62-66).
28. Antwi-Boasiako, E., Zhou, S., Liao, Y., Liu, Q., Wang, Y., & Owusu-Agyemang, K. (2021). Privacy preservation in Distributed Deep Learning: A survey on Distributed Deep Learning, privacy preservation techniques used and interesting research directions. Journal of Information Security and Applications, 61, 102949.
29. Curzon, J., Kosa, T. A., Akalu, R., & El-Khatib, K. (2021). Privacy and artificial intelligence. IEEE Transactions on Artificial Intelligence, 2(2), 96-108.
30. Murdoch, B. (2021). Privacy and artificial intelligence: challenges for protecting health information in a new era. BMC Medical Ethics, 22, 1-5.
31. Li, Z. (2024). Ethical frontiers in artificial intelligence: navigating the complexities of bias, privacy, and accountability. International Journal of Engineering and Management Research, 14(3), 109-116.
32. Zhu, T., Ye, D., Wang, W., Zhou, W., & Philip, S. Y. (2020). More than privacy: Applying differential privacy in key areas of artificial intelligence. IEEE Transactions on Knowledge and Data Engineering, 34(6), 2824-2843.
33. Kumar, S., Chaube, M. K., Nenavath, S. N., Gupta, S. K., & Tetarave, S. K. (2022). Privacy preservation and security challenges: a new frontier multimodal machine learning research. International Journal of Sensor Networks, 39(4), 227-245.
34. Dhinakaran, D., Sankar, S. M., Selvaraj, D., & Raja, S. E. (2024). Privacy-Preserving Data in IoT-based Cloud Systems: A Comprehensive Survey with AI Integration. arXiv preprint arXiv:2401.00794.
35. Vegesna, V. V. (2023). Privacy-Preserving Techniques in AI-Powered Cyber Security: Challenges and Opportunities. International Journal of Machine Learning for Sustainable Development, 5(4), 1-8.
36. Liu, J., Chen, C., Qu, Y., Yang, S., & Xu, L. (2023). RASS: Enabling privacy-preserving and authentication in online AI-driven healthcare applications. ISA transactions, 141, 20-29.
37. Padmanaban, H. (2024). Privacy-Preserving Architectures for AI/ML Applications: Methods, Balances, and Illustrations. Journal of Artificial Intelligence General science (JAIGS) ISSN: 3006-4023, 3(1), 235-245.
38. Castro, O. E. L., Deng, X., & Park, J. H. (2023). Comprehensive Survey on AI-Based Technologies for Enhancing IoT Privacy and Security: Trends, Challenges, and Solutions. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 13.
39. Moeed, S. A., Munawar, S., & Ashmitha, G. (2025). AI-Driven Privacy Preservation Using Homomorphic Encryption with AM-ResNet Based Classification in Gastrointestinal Diseases. In Sustainable Development Using Private AI (pp. 63-84). CRC Press.
Published
2024-10-15
How to Cite
Bodake Sarika Vasantrao, Dr. Pooja Sharma, & Dr. Sandeep Kadam. (2024). AI-Driven Hybrid Privacy Preservation Model For Enhanced Security In Online Social Networks. Revista Electronica De Veterinaria, 25(1), 2399 - 2408. https://doi.org/10.69980/redvet.v25i1.1198
Section
Articles