Qualification: 
M.Tech
mr_neethu@cb.amrita.edu

Ms. Neethu MR serves as Faculty Associate in the Department of Computer Science and Engineering, School of Engineering, Coimbatore campus.

Publications

Publication Type: Journal Article

Year of Publication Title

2021

Neethu M. R., Dr. Harini N., and Abirami K., “Investigating Peers in Social Networks: Reliable or Unreilable”, Advances in Distributed Computing and Machine Learning, vol. pp 173-180, 2021.[Abstract]


Social networking sites have made its impact in converting a passive reader into content contributor. This has turned online social networks into a commercial sphere. The site demands creation of public profiles. The main goal of online social networks is to share content with maximum users. This enormous sharing of information can lead to malicious users leverage the privacy of an individual. An attempt has been made in this paper to improve privacy preservation by calculating the reliability of a user, can entrust on his/her peer using the content sharing, Machine Learning and tone analysis. The recorded metrics and transaction details are stored in IPFS.

More »»

2019

Neethu M. R. and .N, H., “A model to ensure business ethicsin social networks”, International Journal of Scientific and Technology Research, vol. 8, no. 10, pp. 586-591, 2019.[Abstract]


Social networking sites generally push aside trust issues to maximize social interaction. One of the barriers to trust in online environment is
privacy because Internet by design lacks a unified method for identifying who communicates with whom. Privacy concern is a person's awareness and
assessment of risks related to privacy violations. Violation to privacy happens mostly because users themselves don't understand the consequences of
sharing their personal data with peers. Context aware systems like cameras, accelerometers, microphones etc. affect privacy to a larger extent.
Individuals are more likely to be concerned about their privacy when information is used without one's knowledge. In this paper, a privacy preservation
scheme that safeguards users from online social networks selling data to third parties, based on distributed ledger technology is presented. The
proposed scheme uses IPFS to store the digital content with high integrity thus making it available to all.

More »»

2018

Neethu M. R. and Harini, N., “Safe sonet: A framework for building trustworthy relationships”, International Journal of Engineering and Technology(UAE), vol. 7, pp. 57-62, 2018.[Abstract]


The advent of easy to use services and the ability to bridge boundaries in space and time has increasingly changed our social lives and com-munication habits. Being unaware of their audience people on social networks inconsiderately share many personal items. Generally Social Networking Sites (SNS) users depend on the SNS platform for managing their social identities. Although SNS providers have introduced privacy settings to protect users against threats, these are insufficient and the access control models are difficult to be under-stood by novice users [1]. Unexpectedly, even those who are aware of the security and privacy threats and the preventive tools that com-bat those threats, lack the motivation to utilize security features to protect themselves. The paper discusses a frame-work (Safe SoNet) that aims to provide a plat-form for secure sharing of posts. The objective of this framework is twofold. Firstly, to analyze user behavior by retrieving user information from various social networking sites, addressing transliteration issues. Secondly, apply the user behavior to quantify the trust score of a connect, which would in turn form a decision making parameter to decide on the peer with whom the in-formation can be securely shared. © 2018 Neethu. MR, N. Harini.

More »»

Publication Type: Conference Paper

Year of Publication Title

2020

Neethu M. R. and Dr. Harini N., “Secure Request Response (SRR): A Framework to Classify Trust/Distrust Relationships in Social Networking”, in Advances in Intelligent Systems and Computing, 307–317, 2020.[Abstract]


The rapid development of the online social media and its application has enabled people to share interests and activities, through the Internet using online social platforms. The enormous sharing of information in the media has enabled hackers to steal personal information about the user. This calls for improved schemes capable of mitigating Internet fraud, privacy leak, dissemination of rumors, etc. The unawareness that exists in the peers related to the risk associated with uploading sensitive information paves way for cyber conspirators to prey on personal information. Failure to apply security policies will easily compromise the social stature of the individual. The paper proposes a security framework SRR (Secure Request, Response) to classify the trust/distrust relationship in the online social network.

More »»

Publication Type: Conference Proceedings

Year of Publication Title

2018

Neethu M. R. and Harini, N., “Securing image posts in social networking sites”, Lecture Notes in Computational Vision and Biomechanics, vol. 28. Springer Netherlands, pp. 79-91, 2018.[Abstract]


The most unbeatable technology, Internet brings to people for communication is social networks. Starting from exchange of text messages it goes up to posting of images and videos in social networking sites which are viewed by many people. When these social networks are available to all the users for free, it will lead to various types of security issues. Image security has been a topic of research over decades. Enhancements to individual techniques and combinations proposed till date have offered different levels of security assurances. This paper aim to present a technique for secure sharing of image posts in social network. The significant feature of the scheme lies in the selection of security technique based on image content, evaluation of peers with whom the image can be shared based on text classification, transliteration and tone analysis. The proposed scheme a cost effective solution as it does not require any additional hardware. The utility of the model is demonstrated by mapping the scheme with Facebook and analyzing its performance through simulation. © 2018, Springer International Publishing AG.

More »»
Faculty Research Interest: