www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 11 November, 2013 Page No. 3127-3132 Secure Communication for Multiparty OSN Jaheer Ahmed Syed , Shaik.Abdul Pursuing M.Tech CSE Nimra Institute of Engineering & Technology, Email :jaheer.firose@gmail.com Asst. Professor at Nimra Institute of Engineering & Technology, M.Sc(ComputerScience) M.Tech(Computer Science & Engineering) Email:shaik.abdulali@gmail.com, Abstract: - In recent years people go for online social networks (OSNs) to share their personal information using popular social networking sites like Facebook, MySpace and Mylife. These OSNs allow user to enforce privacy concerns over shared data with single user only without providing any model and mechanism to enforce privacy concerns over data associated with multiple users. To overcome this we come across an approach [1] to enable the protection of shared data associated with multiple users by proposing a multiparty authorization framework that allows collaborative management of shared data in OSNs. Multiparty Access Control (MPAC) model is also formulated in order to capture the essence of multiparty authorization requirements. In this MPAC model some users collude with one another so as to manipulate the final access control. This MPAC gave raise to three issues (1) There is no fake identity in OSNs.(2) All users tagged are real users appeared in the photo. (3) All controllers of the photo are honest to specify their privacy preferences [1]. To overcome these issues we utilize a collaborative Face Recognition (FR) framework [9].in to OSNs. We also demonstrate a proof-of-concept prototype as part of an application in Facebook. Keywords— Online Social Network, Multiparty Access Control, Collaboration, Face Annotation, Face Recognition, Personal Photos, Social Context. INTRODUCTION Online social networks (OSNs) such as Facebook, Twitter , and Google+ are inherently designed to enable people to share personal and public information and make social connections with coworkers, family, friends, colleagues, and even with strangers. In Facebook users can allow groups, friends, and friends of friends or public to right to use their data, depending on their personal authorization and privacy requirements. Although Online social networks resently provide simple access control mechanisms allowing users to govern access to information contained in their own spaces, users, unfortunately, have no power over data residing outside their spaces. Such as, if a user posts a comment in a friend’s space, he/she cannot specify which users can view the comment. Existing System OSNs currently provide simple access control mechanisms allowing users to govern access to information contained in their own spaces, users, unfortunately, have no power over data residing outside their spaces. Such as, if a user posts a comment in a friend’s space, he/she cannot specify which users can view the comment. In another case, while a user uploads tags and the photograph friends who appear in the Jaheer Ahmed Syed, IJECS Volume 2 Issue 11 November, 2013 Page No.3127-3132 Page 3127 photograph, the tagged friends cannot restrict who can see this photograph, even though the tagged friends may have different privacy concerns about the photo. To address such a serious issue, beginning protection mechanisms have been offered by existing online social networks (OSNs). o o o o Access to a resource is granted while the requestor is able to demonstrate of being authorized. Every user in the group can access the shared content. Not give any mechanism to enforce privacy concerns over data associated with multiple users if a user posts a comment in a friend’s space, he/she cannot specify which users can view the comment o while a user uploads a photo and tags friends who appear in the photograph, the tagged friends cannot restrict who can see this photograph Proposed System o Our solution is to support the analysis of multiparty access control model and mechanism systems. The correctness of o execution of an access control model is based on the premise that the access control model is suitable. Moreover, while o the use of multiparty access control mechanism can greatly enhance the flexibility for regulating data sharing in Online o social networks (OSNs), it may potentially reduce the certainty of system authorization consequences due to the reason o that authorization and privacy conflicts need to be resolved elegantly. We specially analyze the scenario like content o sharing to understand the risks posted by the lack of collaborative control in online social networks (OSNs). Proposed System Advantages o It checks the access request against the policy specified for every user and yields a decision for the access. o The use of multiparty access control mechanism can greatly enhance the flexibility for regulating data sharing in online social networks. o present any mechanism to enforce privacy concerns over data associated with many users o if a user posts a comment in a friend’s space, he/she can specify which users can view the comment 1. MULTIPARTY ACCESS CONTROL FOR OSNS: REQUIREMENTS AND PATTERNS In this section we continue with an inclusive requirement analysis of multiparty access control in OSNs. We specifically analyze three scenarios profile sharing, content sharing and relationship sharing to understand the risks posted by the lack of collaborative control in OSNs. Jaheer Ahmed Syed, IJECS Volume 2 Issue 11 November, 2013 Page No.3127-3132 Page 3128 Profile sharing: An interesting feature of some OSNs is to support social applications written by third-party developers to create additional functionalities built on the top of users’ profile for OSNs. To provide significant and attractive services, these social applications munch through user profile attributes, such as name, birthday, activities, interests, and so on. Relationship sharing: Another characteristic of OSNs is that users can share their relationships with other members. Relations are essentially bidirectional and hold potentially perceptive information that associated users may not want to reveal. Most OSNs provide mechanisms that users can regulate the display of their friend lists. Content sharing: OSNs present built-in mechanisms enabling users to communicate and share contents with other members. OSN users can post statuses and notes, upload photos and tag others to their contents, videos in their own spaces and share the contents with their friends. On the other hand, users can also post contents in their friends’ spaces. The shared contents may be connected with multiple users Fig. 1: Multiparty Access Control Pattern for Content Sharing. 2. MULTIPARTY AUTHORIZATION FOR OSNS Jaheer Ahmed Syed, IJECS Volume 2 Issue 11 November, 2013 Page No.3127-3132 Page 3129 This model permits the specification of access rules for on-line resources, wherever licensed users are denoted in terms of the connection kind, depth, and trust level between users in OSNs. They additional had given a semidecentralized discretionary access management model and a connected social control mechanism for controlled sharing of data in OSNs [8]. Fong et al. [12] projected Associate in an access management model that formalizes and generalizes the access anagement mechanism enforced in Facebook, admitting arbitrary policy vocabularies that are supported theoretical graph properties. Gates delineated relationshipbased access management united of recent security paradigms that addresses istinctive needs of internet a pair of 2.0 Then, Fong [11] recently developed this paradigm known as a Relationship-Based Access management (ReBAC) model that bases authorization selections on the relationships between the resource owner and therefore the resource accessor in Associate in an OSN. However, none of those existing work might model and analyze access management needs with relation to cooperative authorization management of shared knowledge in OSNs. The requirement of joint management for knowledge sharing, particularly photo sharing, in OSNs has been recognized by the recent work [5,15].The nearest work to the present paper is maybe the answer provided by ref [14] for collective privacy management in OSNs. Different connected work includes general conflict resolution mechanisms for access management [11, 12,] and learn-based generation of privacy policies for OSNs. Fig. 2: An Example of Multiparty Social Network Representation. 2.1. REQUIREMENTS OSNs give intrinsic mechanisms for facultative users to communicate and share data with different members. OSN users will post statuses and notes, upload photos and videos in their own spaces, and tag others to their contents and share the contents with their friends. On the opposite hand, users may also post contents in their friends’ spaces. The shared contents could also be connected with multiple users. Take an example wherever a photo contains three users, Alice, Bob and Carol. If Alice uploads it to her own space and tags each Bob and Carol within the photo, we have a tendency to decision Alice an owner of the photo, and Bob and Carol stakeholders of the photo. All of those users could specify access management policies over this a data. Figure 1depicts a data sharing state of affairs wherever the owner of a data item shares the info item with different OSN members, and therefore the data item has multiple stakeholders who may Jaheer Ahmed Syed, IJECS Volume 2 Issue 11 November, 2013 Page No.3127-3132 Page 3130 additionally wish to involve within the management of information sharing. Figure 1(b) shows another data sharing scenario wherever a contributor publishes an information item to somebody else’s house and therefore the data item may additionally have multiple stakeholders (e.g., labelled users). All associated users should be allowed to outline access management policies for the shared data item 2.2. MODELING SOCIAL NETWORKS An OSN are often diagrammatical by a relationship network, a collection of user teams and a set of user data. The link network of an OSN may be a directed labelled graph, wherever every node denotes a user, and every edge represents a relationship between users. The label related to every edge indicates the kind of the link. Edge direction denotes that the initial node of a grip establishes the link and therefore the terminal node of the string accepts the link. The quantity and sort of supported relationships believe the precise OSNs and its functions. Besides, OSNs embody a very important feature that enables users to be organized in teams, wherever every cluster encompasses a distinctive name. This feature permits users of an OSN to simply notice different users with whom they may share specific interests (e.g., same hobbies), demographic teams (e.g., finding out at an equivalent schools), political theory, and so on. Users will take part teams ithout any approval from different cluster members. Moreover, OSNs give every member with an online house wherever users will store and manage their personal data together with profile info, friend list and user content. 2.3.MULTIPARTY AUTHORIZATION SPECIFICATION To change a cooperative authorization management of information sharing in OSNs, it's essential for multiparty access management policies to be in situ to control access over shared data, representing authorization needs from multiple associated users. Our policy specification theme is constructed upon the above-named OSN model (Section three.2). Recently, many access management schemes (e.g., [7,11, and 12]) are projected to support fine-grained authorization specifications for OSNs. Sadly, these schemes will solely enable one manager (the resource owner) to specify access control policies. Indeed, a versatile access management mechanism in a very multi-user setting like OSNs is important to permit multiple managers related to the shared data item to specify access control policies. As we have a tendency to mention in Section three.1, additionally to the owner of information, different controllers, together with the contributor, neutral and propagator of information, conjointly need to control access to the shared data. 2.4. MULTIPARTY POLICY ANALYSIS In our projected multiparty authorization model, every controller will specify a collection of policies, which can contains each positive and negative policies, to control access of the shared information. . Jaheer Ahmed Syed, IJECS Volume 2 Issue 11 November, 2013 Page No.3127-3132 Page 3131 Jaheer Ahmed Syed, IJECS Volume 2 Issue 11 November, 2013 Page No.3127-3132 Page 3132