International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 3 Issue: 2 521 - 523 _______________________________________________________________________________________________ 521 IJRITCC | February 2015, Available @ http://www.ijritcc.org _______________________________________________________________________________________ A Survey on Securing User Data in Social Networks using Privacy Preserving Options Priyanka Thakare Department of Computer Science and Engineering G.H. Raisoni Institute of Engineering and Technology for Women, Nagpur, India thakarepriya89@gmail.com Hemlata Dakhore Assistant Professor, Department of Computer Science and Engineering G.H Raisoni Institute of Engineering and Technology for Women, Nagpur, India AbstractPrivacy is one of greatest rubbing focuses that rises when interchanges get interceded in Online Social Networks (OSNs).different groups of software engineering analysts have been surrounded the 'OSN security issue' as one of the observation, institutional or social protection. On account of handling these issues they have likewise treated them as though they were free. The principle contends is that the diverse security issues are snared and that the examination on protection in OSNs would profit from a more all encompassing methodology. In this paper, we first give a prologue to the observation and social security viewpoint stressing the account that the educate them, and their suspicions, objectives and techniques. __________________________________________________*****_________________________________________________ I. INTRODUCTION On-line interpersonal organization applications seriously experience the ill effects of different security and protection exposures. Protection is one of the grating focuses that rise when interchanges get intervened in Online Social Networks (OSNs). Distinctive groups of software engineering scientists have surrounded the 'OSN security issue' as one of observation, institutional or social protection. In handling these issues they have likewise treated them as though they were free. These requirements for a better grain and more customized security in information distribution of informal organizations. Because of the prevalence of informal organizations, numerous recommendations have been proposed to ensure the security of the systems. All these works accept that the assaults utilize the same foundation information. On the other hand, in practice, distinctive clients have diverse security secure prerequisites. Accordingly, accepting the assaults with the same foundation information don't meet the customized security necessities, in the mean time, it loses the opportunity to accomplish better utility by exploiting contrasts of clients' protection prerequisites. This paper is roused by the distinguishment of the requirement for a better grain and more customized security in information production of informal communities. We propose a protection security conspire that not just keeps the divulgence of character of clients additionally the exposure of chose gimmicks in clients' profiles. An individual client can choose which gimmicks of her profile she wishes to hide. Properties of client are indicated either as delicate or as non-touchy. We give client more security alternatives and security by utilizing client data and criticism. II. RELATED WORK Yi Song Panagiotis Karras, Qian Xiao Stephane Bressan has explore the method to present privacy protection algorithms that allow for graph data to be published in a form such that an adversary who possesses information about a node's neighborhood cannot safely infer its identity and its sensitive labels. Seda Gurses and Claudia Diaz has first provide an introduction to the surveillance and social privacy perspectives emphasizing the narratives that inform them, as well as their assumptions, goals and methods. They then just expose the differences between these two approaches in order to understand their complementarily, and to identify potential integration challenges as well as research questions that so far have been left unanswered. Mingxuan Yuan Lei Chen Philip S. Yu has explore the method to They introduce a framework which provides privacy preserving services based on the user’s personal privacy requests. Specifically, they define three levels of protection requirements based on the gradually increasing attacker’s background knowledge and combine the label generalization protection and the structure protection techniques (i.e. adding noise edge or nodes) together to satisfy different users’ protection requirements. They verify the effectiveness of the framework through extensive experiments. Leucio Antonio Cutillo Refik Molva Thorsten Strufe Sophia Antipolice has developed the method to suggest a new approach to tackle these security and privacy problems with a special emphasis on the privacy of users with respect to the application provider in addition to the defense against intruders or malicious users. In order to assure users’ privacy