www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242

advertisement
www.ijecs.in
International Journal Of Engineering And Computer Science ISSN:2319-7242
Volume 2 Issue 11 November, 2013 Page No. 3127-3132
Secure Communication for Multiparty OSN
Jaheer Ahmed Syed , Shaik.Abdul
Pursuing M.Tech CSE Nimra Institute of Engineering & Technology,
Email :jaheer.firose@gmail.com
Asst. Professor at Nimra Institute of Engineering & Technology, M.Sc(ComputerScience) M.Tech(Computer Science &
Engineering)
Email:shaik.abdulali@gmail.com,
Abstract: - In recent years people go for online social networks (OSNs) to share their personal information using popular social
networking sites like Facebook, MySpace and Mylife. These OSNs allow user to enforce privacy concerns over shared data with
single user only without providing any model and mechanism to enforce privacy concerns over data associated with multiple
users. To overcome this we come across an approach [1] to enable the protection of shared data associated with multiple users by
proposing a multiparty authorization framework that allows collaborative management of shared data in OSNs. Multiparty Access
Control (MPAC) model is also formulated in order to capture the essence of multiparty authorization requirements. In this MPAC
model some users collude with one another so as to manipulate the final access control. This MPAC gave raise to three issues (1)
There is no fake identity in OSNs.(2) All users tagged are real users appeared in the photo. (3) All controllers of the photo are
honest to specify their privacy preferences [1]. To overcome these issues we utilize a collaborative Face Recognition (FR)
framework [9].in to OSNs. We also demonstrate a proof-of-concept prototype as part of an application in Facebook.
Keywords— Online Social Network, Multiparty Access Control, Collaboration, Face Annotation, Face
Recognition, Personal Photos, Social Context.
INTRODUCTION
Online social networks (OSNs) such as Facebook, Twitter , and Google+ are inherently designed to enable
people to share personal and public information and make social connections with coworkers, family,
friends, colleagues, and even with strangers. In Facebook users can allow groups, friends, and friends of
friends or public to right to use their data, depending on their personal authorization and privacy
requirements. Although Online social networks resently provide simple access control mechanisms allowing
users to govern access to information contained in their own spaces, users, unfortunately, have no power
over data residing outside their spaces. Such as, if a user posts a comment in a friend’s space, he/she cannot
specify which users can view the comment.
Existing System
OSNs currently provide simple access control mechanisms allowing users to govern access to information
contained in their own spaces, users, unfortunately, have no power over data residing outside their spaces.
Such as, if a user posts a comment in a friend’s space, he/she cannot specify which users can view the
comment. In another case, while a user uploads tags and the photograph friends who appear in the
Jaheer Ahmed Syed, IJECS Volume 2 Issue 11 November, 2013 Page No.3127-3132
Page 3127
photograph, the tagged friends cannot restrict who can see this photograph, even though the tagged friends
may have different privacy concerns about the photo. To address such a serious issue, beginning protection
mechanisms have been offered by existing online social networks (OSNs).
o
o
o
o
Access to a resource is granted while the requestor is able to demonstrate of being authorized.
Every user in the group can access the shared content.
Not give any mechanism to enforce privacy concerns over data associated with multiple users
if a user posts a comment in a friend’s space, he/she cannot specify which users can view the
comment
o while a user uploads a photo and tags friends who appear in the photograph, the tagged friends
cannot restrict who can see this photograph
Proposed System
o Our solution is to support the analysis of multiparty access control model and mechanism systems.
The correctness of
o execution of an access control model is based on the premise that the access control model is
suitable. Moreover, while
o the use of multiparty access control mechanism can greatly enhance the flexibility for regulating data
sharing in Online
o social networks (OSNs), it may potentially reduce the certainty of system authorization
consequences due to the reason
o that authorization and privacy conflicts need to be resolved elegantly. We specially analyze the
scenario like content
o sharing to understand the risks posted by the lack of collaborative control in online social networks
(OSNs).
Proposed System Advantages
o It checks the access request against the policy specified for every user and yields a decision for the
access.
o The use of multiparty access control mechanism can greatly enhance the flexibility for regulating
data sharing in online social networks.
o present any mechanism to enforce privacy concerns over data associated with many users
o if a user posts a comment in a friend’s space, he/she can specify which users can view the comment
1. MULTIPARTY ACCESS CONTROL FOR OSNS: REQUIREMENTS AND PATTERNS
In this section we continue with an inclusive requirement analysis of multiparty access control in OSNs. We
specifically analyze three scenarios profile sharing, content sharing and relationship sharing to understand
the risks posted by the lack of collaborative control in OSNs.
Jaheer Ahmed Syed, IJECS Volume 2 Issue 11 November, 2013 Page No.3127-3132
Page 3128
Profile sharing:
An interesting feature of some OSNs is to support social applications written by third-party
developers to create additional functionalities built on the top of users’ profile for OSNs. To provide
significant and attractive services, these social applications munch through user profile attributes, such as
name, birthday, activities, interests, and so on.
Relationship sharing:
Another characteristic of OSNs is that users can share their relationships with other members.
Relations are essentially bidirectional and hold potentially perceptive information that associated users may
not want to reveal. Most OSNs provide mechanisms that users can regulate the display of their friend lists.
Content sharing:
OSNs present built-in mechanisms enabling users to communicate and share contents with other
members. OSN users can post statuses and notes, upload photos and tag others to their contents, videos in
their own spaces and share the contents with their friends. On the other hand, users can also post contents in
their friends’ spaces. The shared contents may be connected with multiple users
Fig. 1: Multiparty Access Control Pattern for Content Sharing.
2. MULTIPARTY AUTHORIZATION FOR OSNS
Jaheer Ahmed Syed, IJECS Volume 2 Issue 11 November, 2013 Page No.3127-3132
Page 3129
This model permits the specification of access rules for on-line resources, wherever licensed users
are denoted in terms of the connection kind, depth, and trust level between users in OSNs. They additional
had given a semidecentralized discretionary access management model and a connected social control
mechanism for controlled sharing of data in OSNs [8]. Fong et al. [12] projected Associate in an access
management model that formalizes and generalizes the access anagement mechanism enforced in Facebook,
admitting arbitrary policy vocabularies that are supported theoretical graph properties. Gates delineated
relationshipbased access management united of recent security paradigms that addresses istinctive needs of
internet a pair of 2.0 Then, Fong [11] recently developed this paradigm known as a Relationship-Based
Access management (ReBAC) model that bases authorization selections on the relationships between the
resource owner and therefore the resource accessor in Associate in an OSN. However, none of those existing
work might model and analyze access management needs with relation to cooperative authorization
management of shared knowledge in OSNs.
The requirement of joint management for knowledge sharing, particularly photo sharing, in OSNs
has been recognized by the recent work [5,15].The nearest work to the present paper is maybe the answer
provided by ref [14] for collective privacy management in OSNs. Different connected work includes
general conflict resolution mechanisms for access management [11, 12,] and learn-based generation of
privacy policies for OSNs.
Fig. 2: An Example of Multiparty Social Network Representation.
2.1.
REQUIREMENTS
OSNs give intrinsic mechanisms for facultative users to communicate and share data with different
members. OSN users will post statuses and notes, upload photos and videos in their own spaces, and tag
others to their contents and share the contents with their friends. On the opposite hand, users may also post
contents in their friends’ spaces. The shared contents could also be connected with multiple users. Take an
example wherever a photo contains three users, Alice, Bob and Carol. If Alice uploads it to her own space
and tags each Bob and Carol within the photo, we have a tendency to decision Alice an owner of the photo,
and Bob and Carol stakeholders of the photo. All of those users could specify access management policies
over this a data. Figure 1depicts a data sharing state of affairs wherever the owner of a data item shares the
info item with different OSN members, and therefore the data item has multiple stakeholders who may
Jaheer Ahmed Syed, IJECS Volume 2 Issue 11 November, 2013 Page No.3127-3132
Page 3130
additionally wish to involve within the management of information sharing. Figure 1(b) shows another data
sharing scenario wherever a contributor publishes an information item to somebody else’s house and
therefore the data item may additionally have multiple stakeholders (e.g., labelled users). All associated
users should be allowed to outline access management policies for the shared data item
2.2. MODELING SOCIAL NETWORKS
An OSN are often diagrammatical by a relationship network, a collection of user teams and a set of
user data. The link network of an OSN may be a directed labelled graph, wherever every node denotes a
user, and every edge represents a relationship between users. The label related to every edge indicates the
kind of the link. Edge direction denotes that the initial node of a grip establishes the link and therefore the
terminal node of the string accepts the link. The quantity and sort of supported relationships believe the
precise OSNs and its functions. Besides, OSNs embody a very important feature that enables users to be
organized in teams, wherever every cluster encompasses a distinctive name. This feature permits users of an
OSN to simply notice different users with whom they may share specific interests (e.g., same hobbies),
demographic teams (e.g., finding out at an equivalent schools), political theory, and so on. Users will take
part teams ithout any approval from different cluster members. Moreover, OSNs give every member with
an online house wherever users will store and manage their personal data together with profile info, friend
list and user content.
2.3.MULTIPARTY AUTHORIZATION SPECIFICATION
To change a cooperative authorization management of information sharing in OSNs, it's essential for
multiparty access management policies to be in situ to control access over shared data, representing
authorization needs from multiple associated users. Our policy specification theme is constructed upon the
above-named OSN model (Section three.2). Recently, many access management schemes (e.g., [7,11, and
12]) are projected to support fine-grained authorization specifications for OSNs. Sadly, these schemes will
solely enable one manager (the resource owner) to specify access control policies. Indeed, a versatile access
management mechanism in a very multi-user setting like OSNs is important to permit multiple managers
related to the shared data item to specify access control policies. As we have a tendency to mention in
Section three.1, additionally to the owner of information, different controllers, together with the contributor,
neutral and propagator of information, conjointly need to control access to the shared data.
2.4. MULTIPARTY POLICY ANALYSIS
In our projected multiparty authorization model, every controller will specify a collection of policies,
which can contains each positive and negative policies, to control access of the shared information. .
Jaheer Ahmed Syed, IJECS Volume 2 Issue 11 November, 2013 Page No.3127-3132
Page 3131
Jaheer Ahmed Syed, IJECS Volume 2 Issue 11 November, 2013 Page No.3127-3132
Page 3132
Download