SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1040
Secure Social Network Using Text Mining
YogeshMalode1, AkshaySawade2, Surbhi Jais3, Shubham Nandanwar4, ManjushaMeshram5,
SampadaBhoyar6
1,2,3,4,5,6 Department of Information Technology, Priyadarshini Bhagwati College of Engineering, Nagpur,
Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Social media is the name suggest is the large
collection of the data for which the traditional data
processing techniques are not sufficient. Social media istoday
gaining popularity very fast in the internet. Many socialmedia
sites like Face book are using the huge data storage
mechanism. In this project, we will discuss about that data
storage and its security of social site .Here we are going to
implement some module like, One user account by
authenticating user registration. This is for the security
purpose one user can only make it one account. To overcome
the problem of multiple accounts by one user we are working
on this objective. Also we are going to restrict posting of
vulgar/improper words. This is one of the most important
concern for any social media to make the user’s profile clean
and protected. So we are maintaining a dictionary of abusive
words so that if anybody try to use these words in their post
then this post will be discarded by administrator. Finally we
are concentrate on Preventing abuse/vulgarimagesandvideo
posting.
Key Words: Authentication; restrict; Data processing
techniques; Vulgar
1. INTRODUCTION
Social networks have become a part of human life. Starting
from sharing information like text, photos, messages, many
have started share latest news, and news related pictures in
the Media domain, question papers, assignments, and
workshops in Education domain, online survey, marketing,
and targeting customers in Business domain, and jokes,
music, and videos in Entertainment domain. In the larger
context of data mining, a considerablemeasureofproductive
analyzing so as to learn can be found advanced records of
human conduct in interpersonal organizations without
breaching the users’ privacy. Thus, information ought to be
made accessible in a manner that privacy should be
safeguarded and protection is extremely scrutinized. The
specific instance of interpersonal organizations, the most
grounded measure that can be received is to make
unflinching quality of individual’sprivacy whoexpressesthe
affiliation. As a matter of fact, we can consider Facebookthat
it is not just a positive relationship with an online substance
additionally as center doled out by the social users.
Maintaining privacy of the register users isthecentralroleof
the authorities and any deviation of policy given would
totally wreck the organizational policy governance which in
turn leads to serious havoc to the fundamental rights of
society.
In the larger context of data mining, a considerable measure
of productive analyzing so asto learn can be foundadvanced
records of human conduct in interpersonal organizations
without breaching the users’ privacy. Thus, information
ought to be made accessible in a manner that privacy should
be safeguarded and protection is extremely scrutinized. On
the other hand, the suspicion that any outsider which is
intrigued to break down information can be viewed as
reliable is truth be told unlikely, because of the key point of
preference that the usage of all information, including
recognizing and delicate ones, may provide for these
gatherings. Due to the specific instance of interpersonal
organizations, the most grounded measure that can be
received is to make unflinching quality of individual’s
privacy who expresses the affiliation.
Advance development of technology internet plays an
important role. When pointing out internet social
networking is an essential thing to people, theusageofsocial
networking sites is dramatically high compared to other
websites. Reason behind this is people who lives in 21st
century hasbeen addicted to social networking sitesto keep
connection with others. Social networking sites are not only
to communicate or interact with each other currently it is
used as a way of business promotion. Due to tremendous
growth of social networking sites it also under arrested to
cyber-attacks. This issue has led even with data sharing
process, this raise number of cyber issues on security and
privacy through social networking sites.
2. Problems in existing system
Registered user can post any message, pictures, video any
time anywhere to any person. No restriction for posting
(messages, videos, images ) and only some basic restriction
on viewing of profile.
3. Proposed Methodology
3.1 Authentication:
Here we maintain the authenticate users dataset with its
Aadhar no. When particular user get registered at that time
we get some details from them. Firstly Adminwillverifythat
particular user is authenticate or not by matching their
details with our dataset details .once the particular user is
verified Admin allow them for login. If details is not get
verified then Admin denied the services of login for
particular user.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1041
Fig -1: Flowchart of the Proposed System
3.2 Friend Suggestion, Keyword Extraction and
matching with dataset
In this module all the registered usershas been able to send
friend request to the another authenticate users whoever
available in their friend suggestion list. If the request is
accepted then these users are view in their friend list. Also,
users can able to post textual content on the wall of their
friends. But here ,we are avoiding the posting of abuse
words. Because Security is one of the important concernfor
any social media to make the user’s profile clean. So we are
maintaining a dictionary of abusive words if anybody try to
use these words in their post then this post will be
discarded by administrator
3.3 Prevent abuse/vulgar image posting:
Here, in this module we are going to prevent the posting of
vulgar images on user wall. To prevent the vulgar/abusive
images we are providing a notification to those users who
are tagged by user for posting .so that notification is view at
notification page of tagged users and then tagged user
decideswhether he/she wantsto post thatimageonhis/her
post wall. If he denies to post that image he will never see
the post related to this.
4. Future Work
Here we work only on the text data to identify that it is
abused or not and provide the authority to post it by going
throw it we get the problem for vulgar image ,videosrelated
to abuse any communitiesor religions etc., identification. In
future reference we will work on it to make it more secure
and user friendly.
5. Conclusion
It has been observed that privacy and security concerns are
very important in the social networking sites and the users
endeavors to make the appropriate changes on their social
media privacy is substantially lower than other mode of
security operations. Hence, we had given the possible root
cause of the unsecure sites and proposed the changes to
take over for the security and privacy concerns of social
networking site. Here we providesall kindsofsecuritytoour
social site by using authentication, prevent abuse posting
and spam and non spam keyword detection.
REFERENCES
[1]Anjitha, Harsha, “Secure Authentication and Cyber Crime
Mitigation for Social Networking Sites”,InternationalJournal
of Science and Research (IJSR) ISSN (Online): 2319-
7064,Volume 5 Issue 5, May 2016.
[2] Dan Gunter, Solomon Sonya “The Danger of Data
Exfiltration over Social Media Sites” Western International
University.
[3] Adu Michael K, Alese Boniface K and AdewaleOlumide S.
“Mitigating Cybercrime and Online Social NetworksThreats
in Nigeria” Proceedings of the World Congress on
Engineering and Computer Science 2014 Vol I WCECS 2014,
22-24 October, 2014, San Francisco, USA.
[4] Senthil Kumar N , Saravanakumar K, Deepa K, “On
Privacy and Security in Social Media – A Comprehensive
Study”, International Conference on Information Security &
Privacy (ICISP2015), 11-12 December 2015, Nagpur, INDIA
[5] L.S.Y. Dehigaspege, U.A.A.S. Hamy, H.A.H. Shehan, S.A.
Dissanayake, H.P. Dangalla, W.H.I. Wijewantha and
DhishanDhammearatchi, “Secure Authentication:Defending
Social Networks from Cyber Attacks Using Voice
Recognition”, International JournalofScientificandResearch
Publications, Volume 6, Issue 10, October 2016 ISSN 2250-
3153

More Related Content

PDF
Detecting and Resolving Privacy Conflicts in Online Social Networks
PDF
My Privacy My decision: Control of Photo Sharing on Online Social Networks
PDF
549 458-465
PDF
IRJET- Cyber Bullying Detection in Web Chat Application
PDF
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
PPTX
How to Like Social Media Network Security
PDF
Research on Privacy Protection in Big Data Environment
PPTX
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
Detecting and Resolving Privacy Conflicts in Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
549 458-465
IRJET- Cyber Bullying Detection in Web Chat Application
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
How to Like Social Media Network Security
Research on Privacy Protection in Big Data Environment
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...

What's hot (17)

PDF
Security techniques for intelligent spam sensing and anomaly detection in onl...
PDF
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
PDF
Mobile Cyber Security
PDF
Privacy and Security in Online Social Media : Privacy and Social Media
PDF
How Safe Is YOUR Social Network?
PDF
IRJET- A Survey on Internet Addiction
PDF
Posn private information protection in online social networks 2
PDF
A Survey On Privacy Policy Inference for Social Images
PPTX
Social media and Security: How to Ensure Safe Social Networking
PPTX
OSINT EXPLOITATION OF UNIVERSITY TWEETS
PDF
PRIVACY PRESERVATION IN SOCIAL MEDIA BY IMAGE PROCESSING
PPTX
Social network privacy & security
PDF
Security in social network araceli&arlethe
PPT
Network GRC Delivery
PPT
Security Dangers of Social Networking
PDF
Kt3518501858
PDF
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Security techniques for intelligent spam sensing and anomaly detection in onl...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
Mobile Cyber Security
Privacy and Security in Online Social Media : Privacy and Social Media
How Safe Is YOUR Social Network?
IRJET- A Survey on Internet Addiction
Posn private information protection in online social networks 2
A Survey On Privacy Policy Inference for Social Images
Social media and Security: How to Ensure Safe Social Networking
OSINT EXPLOITATION OF UNIVERSITY TWEETS
PRIVACY PRESERVATION IN SOCIAL MEDIA BY IMAGE PROCESSING
Social network privacy & security
Security in social network araceli&arlethe
Network GRC Delivery
Security Dangers of Social Networking
Kt3518501858
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Ad

Similar to IRJET- Secure Social Network using Text Mining (20)

PDF
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
PDF
PDF
IRJET- Private Social Media and Data Security
PDF
IRJET - Detecting Spiteful Accounts in Social Network
PDF
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
PDF
Posn private information protection in online social networks 2
PDF
Social media platform and Our right to privacy
PDF
IRJET- Fake Profile Identification using Machine Learning
PDF
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
PDF
Authorization mechanism for multiparty data sharing in social network
DOCX
3202020 Originality Reporthttpsucumberlands.blackboar.docx
DOCX
3202020 Originality Reporthttpsucumberlands.blackboar.docx
PDF
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
PDF
Terrorism Analysis through Social Media using Data Mining
PDF
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
PDF
IRJET - Social Network Question and Answer System
PDF
OSA - Internet Security in India
PDF
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
PDF
A Survey on Privacy in Social Networking Websites
PDF
IRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
IRJET- Private Social Media and Data Security
IRJET - Detecting Spiteful Accounts in Social Network
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
Posn private information protection in online social networks 2
Social media platform and Our right to privacy
IRJET- Fake Profile Identification using Machine Learning
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
Authorization mechanism for multiparty data sharing in social network
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
Terrorism Analysis through Social Media using Data Mining
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
IRJET - Social Network Question and Answer System
OSA - Internet Security in India
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
A Survey on Privacy in Social Networking Websites
IRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
additive manufacturing of ss316l using mig welding
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPT
Mechanical Engineering MATERIALS Selection
PPTX
Current and future trends in Computer Vision.pptx
PPTX
Artificial Intelligence
PPT
introduction to datamining and warehousing
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
web development for engineering and engineering
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
OOP with Java - Java Introduction (Basics)
CH1 Production IntroductoryConcepts.pptx
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
bas. eng. economics group 4 presentation 1.pptx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
UNIT 4 Total Quality Management .pptx
additive manufacturing of ss316l using mig welding
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Mechanical Engineering MATERIALS Selection
Current and future trends in Computer Vision.pptx
Artificial Intelligence
introduction to datamining and warehousing
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
web development for engineering and engineering
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
OOP with Java - Java Introduction (Basics)

IRJET- Secure Social Network using Text Mining

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1040 Secure Social Network Using Text Mining YogeshMalode1, AkshaySawade2, Surbhi Jais3, Shubham Nandanwar4, ManjushaMeshram5, SampadaBhoyar6 1,2,3,4,5,6 Department of Information Technology, Priyadarshini Bhagwati College of Engineering, Nagpur, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Social media is the name suggest is the large collection of the data for which the traditional data processing techniques are not sufficient. Social media istoday gaining popularity very fast in the internet. Many socialmedia sites like Face book are using the huge data storage mechanism. In this project, we will discuss about that data storage and its security of social site .Here we are going to implement some module like, One user account by authenticating user registration. This is for the security purpose one user can only make it one account. To overcome the problem of multiple accounts by one user we are working on this objective. Also we are going to restrict posting of vulgar/improper words. This is one of the most important concern for any social media to make the user’s profile clean and protected. So we are maintaining a dictionary of abusive words so that if anybody try to use these words in their post then this post will be discarded by administrator. Finally we are concentrate on Preventing abuse/vulgarimagesandvideo posting. Key Words: Authentication; restrict; Data processing techniques; Vulgar 1. INTRODUCTION Social networks have become a part of human life. Starting from sharing information like text, photos, messages, many have started share latest news, and news related pictures in the Media domain, question papers, assignments, and workshops in Education domain, online survey, marketing, and targeting customers in Business domain, and jokes, music, and videos in Entertainment domain. In the larger context of data mining, a considerablemeasureofproductive analyzing so as to learn can be found advanced records of human conduct in interpersonal organizations without breaching the users’ privacy. Thus, information ought to be made accessible in a manner that privacy should be safeguarded and protection is extremely scrutinized. The specific instance of interpersonal organizations, the most grounded measure that can be received is to make unflinching quality of individual’sprivacy whoexpressesthe affiliation. As a matter of fact, we can consider Facebookthat it is not just a positive relationship with an online substance additionally as center doled out by the social users. Maintaining privacy of the register users isthecentralroleof the authorities and any deviation of policy given would totally wreck the organizational policy governance which in turn leads to serious havoc to the fundamental rights of society. In the larger context of data mining, a considerable measure of productive analyzing so asto learn can be foundadvanced records of human conduct in interpersonal organizations without breaching the users’ privacy. Thus, information ought to be made accessible in a manner that privacy should be safeguarded and protection is extremely scrutinized. On the other hand, the suspicion that any outsider which is intrigued to break down information can be viewed as reliable is truth be told unlikely, because of the key point of preference that the usage of all information, including recognizing and delicate ones, may provide for these gatherings. Due to the specific instance of interpersonal organizations, the most grounded measure that can be received is to make unflinching quality of individual’s privacy who expresses the affiliation. Advance development of technology internet plays an important role. When pointing out internet social networking is an essential thing to people, theusageofsocial networking sites is dramatically high compared to other websites. Reason behind this is people who lives in 21st century hasbeen addicted to social networking sitesto keep connection with others. Social networking sites are not only to communicate or interact with each other currently it is used as a way of business promotion. Due to tremendous growth of social networking sites it also under arrested to cyber-attacks. This issue has led even with data sharing process, this raise number of cyber issues on security and privacy through social networking sites. 2. Problems in existing system Registered user can post any message, pictures, video any time anywhere to any person. No restriction for posting (messages, videos, images ) and only some basic restriction on viewing of profile. 3. Proposed Methodology 3.1 Authentication: Here we maintain the authenticate users dataset with its Aadhar no. When particular user get registered at that time we get some details from them. Firstly Adminwillverifythat particular user is authenticate or not by matching their details with our dataset details .once the particular user is verified Admin allow them for login. If details is not get verified then Admin denied the services of login for particular user.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1041 Fig -1: Flowchart of the Proposed System 3.2 Friend Suggestion, Keyword Extraction and matching with dataset In this module all the registered usershas been able to send friend request to the another authenticate users whoever available in their friend suggestion list. If the request is accepted then these users are view in their friend list. Also, users can able to post textual content on the wall of their friends. But here ,we are avoiding the posting of abuse words. Because Security is one of the important concernfor any social media to make the user’s profile clean. So we are maintaining a dictionary of abusive words if anybody try to use these words in their post then this post will be discarded by administrator 3.3 Prevent abuse/vulgar image posting: Here, in this module we are going to prevent the posting of vulgar images on user wall. To prevent the vulgar/abusive images we are providing a notification to those users who are tagged by user for posting .so that notification is view at notification page of tagged users and then tagged user decideswhether he/she wantsto post thatimageonhis/her post wall. If he denies to post that image he will never see the post related to this. 4. Future Work Here we work only on the text data to identify that it is abused or not and provide the authority to post it by going throw it we get the problem for vulgar image ,videosrelated to abuse any communitiesor religions etc., identification. In future reference we will work on it to make it more secure and user friendly. 5. Conclusion It has been observed that privacy and security concerns are very important in the social networking sites and the users endeavors to make the appropriate changes on their social media privacy is substantially lower than other mode of security operations. Hence, we had given the possible root cause of the unsecure sites and proposed the changes to take over for the security and privacy concerns of social networking site. Here we providesall kindsofsecuritytoour social site by using authentication, prevent abuse posting and spam and non spam keyword detection. REFERENCES [1]Anjitha, Harsha, “Secure Authentication and Cyber Crime Mitigation for Social Networking Sites”,InternationalJournal of Science and Research (IJSR) ISSN (Online): 2319- 7064,Volume 5 Issue 5, May 2016. [2] Dan Gunter, Solomon Sonya “The Danger of Data Exfiltration over Social Media Sites” Western International University. [3] Adu Michael K, Alese Boniface K and AdewaleOlumide S. “Mitigating Cybercrime and Online Social NetworksThreats in Nigeria” Proceedings of the World Congress on Engineering and Computer Science 2014 Vol I WCECS 2014, 22-24 October, 2014, San Francisco, USA. [4] Senthil Kumar N , Saravanakumar K, Deepa K, “On Privacy and Security in Social Media – A Comprehensive Study”, International Conference on Information Security & Privacy (ICISP2015), 11-12 December 2015, Nagpur, INDIA [5] L.S.Y. Dehigaspege, U.A.A.S. Hamy, H.A.H. Shehan, S.A. Dissanayake, H.P. Dangalla, W.H.I. Wijewantha and DhishanDhammearatchi, “Secure Authentication:Defending Social Networks from Cyber Attacks Using Voice Recognition”, International JournalofScientificandResearch Publications, Volume 6, Issue 10, October 2016 ISSN 2250- 3153