A Review on Resemblance of User Profiles in Social Networks using Similarity Measures


  • Nidhi Goyal M.Tech Student CSE, GJUS&T, Hisar (Haryana) -125001,India
  • Jaswinder Singh Assistant Prof. CSE, GJUS&T, Hisar (Haryana) -125001,India


Best Resemblance, Heterogeneous Similarity measures, user profiles.


Online Social Networking is increasing at a fast rate. There are lots of profiles of the users and there is too much resemblance between the user profiles which can help recruiter’s to select the best candidates for the Job Profile. Now, each similarity measure has its own applicability and best suited to a particular type of attribute values and if these measures are collectively combined then it can help us to find the best resemblance among the user profile ,the result of which matches to the actual result. In this paper, the discussion of the past studies is done and how our research is proposing a framework for finding the resemblance is being discussed. 


A. Malhotra, L. Totti, W. Meira Jr., P. Kumaraguru, and V. Almeida, “Studying User Footprints in Different Online Social Networks,” Jan. 2013.

A. R. Ahmad Rawashdeh, “Similarity Measure for Social Networks – A Brief Survey,” in CEUR Workshop Proceedings, At Greensboro,NC,USA, 2015, vol. 1353.

Bhume Bhumiratana.“A Model for Automating Persistent Identity Clone in Online Social Network,” 681–86. IEEE, 2011. doi:10.1109/TrustCom.2011.87.

C. G. Akcora, B. Carminati, and E. Ferrari, “Network and profile based measures for user similarities on social networks,” in 2011 IEEE International Conference on Information Reuse and Integration (IRI), 2011, pp. 292–298.

Conti, Mauro, Radha Poovendran, and Marco Secchiero. “FakeBook: Detecting Fake Profiles in On-Line Social Networks.” in Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), 1071–1078. ASONAM ’12. Washington, DC, USA: IEEE Computer Society, 2012. doi:10.1109/ASONAM.2012.185.

D. Bollegala, Y. Matsuo, and M. Ishizuka, “A Web Search Engine-Based Approach to Measure Semantic Similarity between Words,” IEEE Transactions on Knowledge and Data Engineering, vol. 23, no. 7, pp. 977–990, Jul. 2011.

E. Cohen, D. Delling, F. Fuchs, A. V. Goldberg, M. Goldszmidt, and R. F. Werneck, “Scalable Similarity Estimation in Social Networks: Closeness, Node Labels, and Random Edge Lengths,” in Proceedings of the First ACM Conference on Online Social Networks, New York, NY, USA, 2013, pp. 131–142.

E. Raad, R. Chbeir, and A. Dipanda, “User profile matching in social networks,” in Network-Based Information Systems (NBiS), Japan, 2010, pp. 297–304.

E. Spertus, M. Sahami, and O. Buyukkokten, “Evaluating Similarity Measures: A Large-scale Study in the Orkut Social Network,” in Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, New York, NY, USA, 2005, pp. 678–684.

Jaswinder Singh, Parvinder Singh, Yogesh Chaba, “Performance Modeling of Information Retrieval Techniques Using Similarity Functions in Wide Area Networks,” in International Journal of Advanced Research in Computer Science and Software Engineering, vol.4, pp.786-793, 2014.

Kharaji, Morteza Yousefi, and Fatemeh Salehi Rizi. “An IAC Approach for Detecting Profile Cloning in Online Social Networks.” International Journal of Network Security & Its Applications 6, no. 1 (January 31, 2014): 75–90. doi:10.5121/ijnsa.2014.6107.

Khayyambashi, Mohammad Reza, and Fatemeh Salehi Rizi. “An Approach for Detecting Profile Cloning in Online Social Networks.” In E-Commerce in Developing Countries: With Focus on E-Security (ECDC), 2013 7th Intenational Conference on, 1–12. IEEE, 2013.

KiruthigaS. ,Kola Sujatha P. , and Kannan A. , “Detecting cloning attack in Social Networks using classification and clustering techniques,” in 2014 International Conference on Recent Trends in Information Technology (ICRTIT), 2014, pp. 1–6.

Kontaxis, Georgios, Iasonas Polakis, Sotiris Ioannidis, and Evangelos P. Markatos. “Detecting Social Network Profile Cloning.” In Pervasive Computing and Communications Workshops (PERCOM Workshops), 2011 IEEE International Conference on, 295–300. IEEE, 2011.

L. Jin, H. Takabi and J. Joshi, ” Towards Active Detection of Identity Clone Attacks on Online Social Networks”, In Proceedings of the first ACM Conference on Data and application security and privacy, pp. 27-38, 2011.

M. S. Hamani and R. Maamri, “Word Semantic Similarity Based on Document’s Title,” presented at the Database and Expert Systems Applications (DEXA), 2013 24th International Workshop on, 2013, pp. 43–47.

“Never Eat Alone Quotes by Keith Ferrazi.”https://www.goodreads.com/work/quotes/81738-never-eat-alone-and-other-secrets-to-success-one-relationship-at-a-tim.

N. Hariharan, S. Priyanga and V.M. Priyadharshini, “Prevention of Fake Profile Proliferation in Online Social Networks”, in IJIRSET, May 2015, vol. 4, pp. 25-32.

P. Jain, P. Kumaraguru, and A. Joshi, “@I Seek ‘Fb.Me’: Identifying Users Across Multiple Online Social Networks,” in Proceedings of the 22Nd International Conference on World Wide Web, Republic and Canton of Geneva, Switzerland, 2013, pp. 1259–1268.

Q. Xu and W. Shi, “A comparison of semantic similarity models in evaluating concept similarity,” International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences (ISPRS’2012), vol. 39, p. B2, 2012.

S. Soundarajan, T. Eliassi-Rad, and B. Gallagher, “Which network similarity measure should you choose: an empirical study,” in Workshop on Information in Networks, New York, USA, 2013.

“Top 15 Most Popular Social Networking Sites January 2016.” [Online]. Available: http://www. ebizmba.com/articles/social-networking-websites.

V.A. Dabeeru, “User Profile Relationships using String Similarity Metrics in Social Networks,” Aug. 2014.

W. H. Gomaa and A. A. Fahmy, “A survey of text similarity approaches,” International Journal of Computer Applications, vol. 68, no. 13, pp. 13–18, 2013.




How to Cite

Goyal, N., & Singh, J. (2016). A Review on Resemblance of User Profiles in Social Networks using Similarity Measures. International Journal of Computer (IJC), 22(1), 1–8. Retrieved from https://ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/654