Influential Node Tracking Using Greedy Approach Algorithm for Secure Social Media

Authors

  • Namrata Shere Computer Engineering, D Y Patil polytechnic, Akurdi
  • Neha Shere Computer Engineering, D Y Patil polytechnic, Akurdi
  • Utkarsha Kedari Computer Engineering, D Y Patil polytechnic, Akurdi
  • Akshata Patil Computer Engineering, D Y Patil polytechnic, Akurdi
  • Prof. Pooja Ahuja Computer Engineering, D Y Patil polytechnic, Akurdi

Keywords:

Social network, Influence maximization, Greedy algorithm, Malicious Attack

Abstract

A social network sites plays very important role for spreading the information and influence in the form
of whole world in hand. There is a basic thing to find small set of influential people in a social network such that
targeting them initially. It will increase the spread of the influence but the problem is that to finding the most
influential nodes in network. There is one Algorithm called as Greedy algorithm used for mining top-K influential
nodes. It has two components: dividing the post of social network into several communities by taking into account
information diffusion and selecting communities to find influential nodes by a dynamic programming. Using Location
Based community Greedy algorithm is used to find the influence node based on Location of the user and we can sort
out the influence for particular Area.
There is one more Serious problem in social network is that there are so many malicious attacks spread by the
people and that malicious contents are hidden behind some attractive posts. i.e viral marketing techniques in the
promotion of new products or posts like how much luckiest today or what does your name meant or post which states
the giving you iphone in lesser prize or giving them free samples of the product etc. such posts in social network may
be harmful to users which has the negative intention of stealing the personal information user. So the takes the
advantage of such usage history of ads i.e. rating of such posts the system analyses the that products impact on social
media users and predicts the positive or negative category for that posts which is beneficial for future users on social
media. So we need to find out that post and block them.

Published

2019-03-25

How to Cite

Namrata Shere, Neha Shere, Utkarsha Kedari, Akshata Patil, & Prof. Pooja Ahuja. (2019). Influential Node Tracking Using Greedy Approach Algorithm for Secure Social Media. International Journal of Advance Research in Engineering, Science & Technology, 6(3), 49–53. Retrieved from https://ijarest.org/index.php/ijarest/article/view/1904