An Approach Of Collabrative Access Control To Online Social Network

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 21 Number 7 – March 2015
An Approach Of Collabrative Access Control To
Online Social Network
Mr. Sandip Sharad Shirgave. #1,Prof. Subhash V. Pingale. #2,
#
Department Of Computer Engineering
SKN Sinhgad College of Engineering
Korti, Pandharpur,India-413 304
Abstract—Online social networks (OSNs) have experienced
tremendous growth in recent years and become a de facto portal
for hundreds of millions of Internet users. These OSNs offer
attractive means for digital social interactions and information
sharing, but also raise a number of security and privacy issues.
While OSNs allow users to restrict access to shared data, they
currently do not provide any mechanism to enforce privacy
concerns over data associated with multiple users. To this end, we
propose an approach to enable the protection of shared data
associated with multiple users in OSNs. We formulate an access
control model to capture the essence of multiparty authorization
requirements, along with a multiparty policy specification
scheme and a policy enforcement mechanism.
Keywords—component; formatting; style; styling; insert (key
words) social, security model, policy specification and management
I.
INTRODUCTION
ONLINE social networks (OSNs) such as Facebook,
Google plus, and Twitter are inherently designed to enable
people to share personal and public information and make
social connections with our friends, coworkers which works
with us in company, college friends , family members, and
even with unknown persons. In recent years, we have seen
unprecedented growth in the application of Online social
network, such as, Facebook is one of best social network site, it
says that it has more than 800 million online real users and
more than 30 billion pieces of content and information like web
links, news, written blogs, documented notes, photos, and so on
shared each month. To protect online social networks user data,
access control has become a central feature of online social
network.
A typical OSN provides each user with a virtual space
containing profile information, a list of all online social user’s
friends list, and Web contents, such as status in the Facebook
wall, where user and their friends can post and send the
messages. A online users profile normally contains the user’s
personal information like address, email id, mobile number,
hobbies. In addition, online users upload contents into their
own or others wall and also tag other online users who appear
in the information or content. Every tag is an correct reference
that links to a user’s wall. For the protection of online user’s
information, need a system which secures the online users
social data.
OSNs currently provide simple access control
mechanisms allowing users to govern access to information
contained in their own spaces, users, unfortunately, have no
control over data residing outside their spaces. For example,
ISSN: 2231-5381
when a user uploads a photo and tags friends who appear in
the photo, the tagged friends cannot restrict who can see this
photo, even though the tagged friends may have different
privacy concerns about the photo. Because of this limitation
we are developing collaborative management for shared data
in OSNs, known as MPAC model.
II.
LITERATURE REVIEW
A. A Reachability Based Access Control Model for
Online Social Networks.
Author’s solution aims to support users when they wish to
restrict the visibility of their resources like data, photos, weblinks to a smaller subset of their contacts. In this paper, author
proposes a reachability based access control model that allows
users to express their privacy preferences as constraints on
existing links with other users. Experimental results verify the
effectiveness of our approach over real social networks
datasets.
In this paper, Author developed an access control model for
OSNs that enables a fine-grained description of privacy
policies. These policies are specified in terms of constraints on
the type, direction, depth of relationships and trust levels
between users, as well as on the user’s properties. This model
relies on a reachability- based approach, where a subject
requesting to access an object must satisfy policies determined
by the object owner.
B. A New Access Control Scheme for Facebook-style
Social Net- works..
The popularity of online social networks like Facebook,
linked in and my space and so on makes the protection of
users’ private information an important but scientifically big
problem. In the literature of relationship-based access control
schemes, author has been proposed to address this problem.
However, with the fastest developments of social networks, we
identify new access control requirements which cannot be fully
captured by the current schemes.
In this paper, Author focus on public information in social
networks and treat it as a new dimension which users can use
to regulate access to their resources. Author defines a new
social network model containing users and their relationships
as well as public information. Based on the model, author
introduces a variant of hybrid logic for formulating access
control policies. In addition, author exploit a type of category
http://www.ijettjournal.org
Page 352
International Journal of Engineering Trends and Technology (IJETT) – Volume 21 Number 7 – March 2015
relations among public information to further improve our
logic for its usage in practice.
In this paper, author first identified a new type of access
control policies that are meaningful but have never been
addressed in the literature. Namely, users in social networks
can express access control requirements not only based on their
social relations, but also on their connections through public
information. Then author de- fined a social network model
containing users and public information. Based on this model,
author proposed hybrid logic to define access control policies.
Author gave a number of policies based on public information
and formulated them precisely in our proposed logic. In
addition, authors have used category relations among public
information to extend our logic and make it more practical.
C. Relationship-based Access Control for Online Social
Networks: Beyond User-to-User Relationships
In this paper, author develops a relationship-based access
control model for OSNs that incorporates not only U2U
relationships but also user-to-resource (U2R) and resource-to
resource (R2R) relationships. Furthermore, while most access
control proposals for OSNs only focus on controlling users
normal usage activities, author’s model also captures controls
on user’s administrative activities. Authorization policies are
defined in terms of patterns of relationship paths on social
graph and the hop count limits of these paths. The proposed
policy specification language features hop count skipping of
resource related relationships, allowing more flexibility and
expressive power. Author also provides simple specifications
of conflict resolution policies to resolve possible conflicts
among authorization policies.
III.
METHODOLOGY
The architecture of MController application, which is
divided into two major parts social network server and
application server. The social network server provides an entry
via the online social network application page, and provides
references to pictures, friendships of users with others, and give
data through API calls. Online social network server takes
inputs from online social network users, and then forwards
them to the online social networks application server. The
online social networks application server is responsible for the
input processing and multiparty management of shared
information. Information related to user data such as email id,
date of birth, mobile number are stored in the application
database. Online social network Users can access the
MController application through online social network. When
access requests are made to the decision-making portion in the
application server, results are re- turned in the form of access to
photos or proper information about access to photos.
In addition, when privacy changes are made, the decision
making portion re- turns change-impact information to the
interface to alert the main user. Moreover, analysis services in
MController application are provided by implementing an
answer set programming (ASP) translator, which
communicates with an answer set programming (ASP)
reasoner. Online users can leverage the analysis services to
perform complicated authorization queries.
A core component of MController is the decision-making
part of application, which processes access requests and returns
responses which may be either permit or deny for the requests.
To evaluate an access request, the policies of every controller
of the final targeted content are enforced first to generate a
decision for the controller. Then, the decisions from all
controllers are aggregated to yield a final decision as the
response of the request. Collaborative privacy conflicts are
resolved based on the configured conflict resolution
mechanism when aggregating the decisions of controllers. If
the owner of the data or owner of information chooses
automatic conflict resolution, the aggregated final sensitivity
value is utilized as a threshold for decision making. Otherwise,
Collaborative privacy conflicts are resolved by applying the
strategy selected by the owner, and the aggregated is
considered as a recommendation for strategy selection.
According to the access requests to disseminated content, the
final and last decision is made by combining the disseminator’s
decision and original users (who uploaded the data) controller’s
decision accepting corresponding combination strategy
discussed previously.
MPAC Model
An Online social network can be represented by a
relationship network between different users, a set of online
user groups, and a different collection of user data. The
relationship network of an Online social network is a directed
labeled graph, where each node of directed graph denotes a
user and each edge of directed graph represents a relationship
between two online users. Multiparty access control (MPAC)
includes different controllers, owner, contributor, stakeholder,
and disseminator.
MPAC Controllers
• Definition 1 (Owner). Let S be a data item in the space of
a user u in the online social network. The online user u is called
the owner of S.
• Definition 2 (Contributor). Let S be a data item published
by a user u in someone else's wall in the online social network.
The online user u is called the contributor of S.
• Definition 3 (Stakeholder). Let S be a data item in the
wall of a online user in the online social network. Let T be the
set of tagged online users associated with S. A online user u is
called a stakeholder of S, if u 2 T.
• Definition 4 (Disseminator). Let S be a data item shared
by online user u from someone else wall to his/her wall in the
online social network. The online user u is called a
disseminator of S.
Multiparty policy evaluation process
Figure 1: - Architecture of MController Application.
ISSN: 2231-5381
http://www.ijettjournal.org
Page 353
International Journal of Engineering Trends and Technology (IJETT) – Volume 21 Number 7 – March 2015
Figure 2:- Multiparty policy evaluation process.
IV.
CONCLUSION
In this paper, we have proposed a novel solution for
collaborative management of shared data in online social
network. A collaborative access control model was formulated,
along with a collaborative policy specification scheme and
corresponding policy evaluation method. An access control
model of our solution called collaborative Access Control
model has been discussed as well. For the part of future work,
we are planning to investigate more comprehensive privacy
conflict resolution approach and analysis services for
collaborative management of shared data in online social
network. Also, we would explore more criteria to evaluate the
features of our proposed collaborative access control model.
On the other side, we plan to systematically integrate the notion
of trust and reputation into our collaborative access control
model and investigate a comprehensive solution to cope with
collusion attacks for providing a robust collaborative access
control service in online social networks.
REFERENCES
[1] ”Multiparty Access Control for Online Social Networks:
Model and Mechanisms”Hongxin Hu, Member, IEEE, GailJoon Ahn, Senior Member, IEEE,and Jan Jorgensen.IEEE
TRANSACTIONS ON KNOWLEDGE AND DATA
ENGINEERING, VOL. 25, NO. 7, JULY 2013
[2] S. Kruk, S. Grzonkowski, A. Gzella, T.Woroniecki, and
H. Choi.D-FOAF: Distributed identity management with
access rights delegation”. The Se- mantic WebASWC 2006,
pages 140154, 2006
[3] B. Carminati, E. Ferrari, and A. Perego. Rule-based access
control for social networks. In On the Move to Meaningful
Internet Systems 2006: OTM 2006 Workshops, pages
17341744. Springer, 2006
[4] P. Fong, M. Anwar, and Z. Zhao. A privacy preservation
model for facebookstyle social network systems. In
Proceedings of the 14th Euro- pean conference on Research in
computer security, pages 303320. Springer- Verlag, 2009.
[5] E. Carrie. Access Control Requirements forWeb 2.0
Security and Privacy. In Proc. of Workshop on Web 2.0
Security and Privacy (W2SP). Citeseer, 2007.
[6] F. Paci. Collective privacy management in social
networks. In Proceedings of the 18th international conference
on World wide web, pages 521530. ACM,2009.
[7] B. Carminati and E. Ferrari. Collaborative access control
in online social networks. In Proceedings of the 7th
ISSN: 2231-5381
International Conference on Collabo- rative Computing:
Networking, Applications and Worksharing (CollaborateCom),pages 231240. IEEE, 2011
[8] W. Luo, Q. Xie, and U. Hengartner, “Facecloak: An
architecture for user privacy on social networking sites,” in
CSE (3). IEEE Computer Society, 2009, pp. 26–33.
[9] M. M. Lucas and N. Borisov, “flybynight: mitigating the
privacy risks of social networking,” in SOUPS,ser. ACM
International Conference Proceeding Series, L. F. Cranor, Ed.
ACM, 2009.
[10] R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D.
Starin, “Persona: an online social network with user-defined
privacy,” in SIGCOMM, P. Rodriguez, E. W. Biersack, K.
Papagiannaki, and L. Rizzo,Eds. ACM, 2009, pp. 135–146.
[11] B. Carminati, E. Ferrari, and A. Perego, “Private
relationships in social networks,” in ICDE Workshops.IEEE
Computer Society, 2007, pp. 163–171.
[12] S. Guha, K. Tang, and P. Francis, “Noyb: privacy in
online social networks,” Proceedings of the first workshop on
online social networks, pp. 49–54, 2008.
[13] B. Carminati and E. Ferrari, “Privacy-aware collaborative
access control in web-based social networks,” in DBSec,
ser. Lecture Notes in Computer Science, V. Atluri, Ed.,
vol. 5094. Springer, 2008, pp. 81–96.
[14] J. Domingo-Ferrer, “A public-key protocol for social
networks with private relationships,” in MDAI, ser.
Lecture Notes in Computer Science, V. Torra, Y.
Narukawa, and Y. Yoshida, Eds., vol. 4617.
Springer,2007, pp. 373–379.
[15] J. Domingo-Ferrer, A. Viejo, F. Seb´e, and ´U.
Gonz´alez-Nicol´as, “Privacy homomorphisms for social
networks with private relationships,” Computer
Networks, vol. 52, no. 15, pp. 3007–3016, 2008.
[16] S. D. C. di Vimercati, S. Foresti, S. Jajodia, S.
Paraboschi, G. Pelosi, and P. Samarati, “Preserving
confidentiality of security policies in data outsourcing,” in
WPES, 2008, pp. 75–84.
[17] K. B. Frikken and P. Srinnivas, “Key allocation schemes
for private social networks,” in Proceedings of the 8th
ACM workshop on Privacy in the electronic society,
2009, pp. 11–20.
[18] B. Carminati, E. Ferrari, and A. Perego, “Rule-based
access control for social networks,” in OTM
Workshops(2), ser. Lecture Notes in Computer Science,
R. Meersman, Z. Tari, and P. Herrero, Eds., vol. 4278.
Springer, 2006, pp. 1734–1744.
[19] V. Goyal, O. Pandey, A. Sahai, and B.Waters, “Attributebased encryption for fine-grained access control of
encrypted data,” in ACM Conference on Computer and
Communications Security, 2006, pp. 89–98.
[20] B. Carminati, E. Ferrari, and A. Perego, “Enforcing
access control in web-based social networks,” ACM
Trans. Inf. Syst. Secur., vol. 13, no. 1, 2009.
[21] M. J. Atallah, M. Blanton, N. Fazio, and K. B. Frikken,
“Dynamic and efficient key management for access
hierarchies,” ACM Trans. Inf. Syst. Secur., vol. 12, no. 3,
2009.
[22] G. Ateniese, A. D. Santis, A. L. Ferrara, and B. Masucci,
“Provably-secure time-bound hierarchical key assignment
schemes,” in ACM Conference on Computer and
Communications Security, A. Juels, R. N. Wright, and S.
D. C. di Vimercati, Eds. ACM, 2006, pp. 288–297.
[23] A. Tootoonchian, S. Saroiu, Y. Ganjali, and A. Wolman,
“Lockr: Better privacy for social networks,” in In Proc. of
the 5th coNEXT, 2009.
[24] M. M. Lucas and N. Borisov, “Flybynight: mitigating the
privacy risks of social networking,” in WPES,V. Atluri and M.
Winslett, Eds. ACM, 2008, pp. 1–8.
http://www.ijettjournal.org
Page 354
Download