SlideShare a Scribd company logo
1 of 10
Download to read offline
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 1, Issue 2, pp: (44-53), Month: October 2014 - March 2015, Available at: www.paperpublications.org
Page | 44
Paper Publications
MUTATION AND CROSSOVER ISSUES
FOR OSN PRIVACY
C. Narasimham1
, Jacob2
1
II Year M.Tech-CSE, 2
Assoc Prof. of CSE
Nova College of Engineering, Jangareddy Gudem, AP, India
Abstract: Privacy is one of the friction points that emerge when communications get mediated in Online Social
Networks (OSNs). Different communities of computer science researchers have framed the ‘OSN privacy problem’
as one of surveillance, institutional or social privacy. In this article, first we provide an introduction to the
surveillance and social privacy perspectives emphasizing the narratives that inform them, as well as their
assumptions and goals. This paper mainly addresses visitors events(population) on an users account and updates
the account holders log information. And thus the evolutionary aspects of Surveillance are reflected in User's Log,
this needs the implementation of Genetic Algorithm. Further, this requires a bridge module between every
interaction between the user and social network server. This paper implements mutation aspects through Genetic
Algorithm by differing users into Guests and Friends, and identifies and Cross over issues of a guest Clicking
Friend of a friend.
I. INTRODUCTION
The existing work could model and analyze access control requirements with respect to collaborative authorization
management of shared data in OSNs. The need of joint management for data sharing, especially photo sharing, in OSNs
has been recognized by the recent work provided a solution for collective privacy management in OSNs. Their work
considered access control policies of a content that is co-owned by multiple users in an OSN, such that each co-owner
may separately specify her/his own privacy preference for the shared content. After careful analysis the system has been
identified to have the following stages:
 The Social Privacy
 The Surveillance
 The Institutional Privacy
 Privacy As Protection
Social Privacy:
Social privacy relates to the concerns that users raise and to the harms that they experience when technologically mediated
communications disrupt social boundaries. The users are thus “consumers” of these services. They spend time in these
(semi-)public spaces in order to socialize with family and friends, get access to information and discussions, and to
expand matters of the heart as well as those of belonging. That these activities are made public to „friends‟ or a greater
audience is seen as a crucial component of OSNs. In Access Control, solutions that employ methods from user modeling
aim to develop “meaningful” privacy settings that are intuitive to use, and that cater to users‟ information management
needs.
Surveillance Module:
With respect to surveillance, the design of PETs starts from the premise that potentially adversarial entities operate or
monitor OSNs. These have an interest in getting hold of as much user information as possible, including user-generated
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 1, Issue 2, pp: (44-53), Month: October 2014 - March 2015, Available at: www.paperpublications.org
Page | 45
Paper Publications
content (e.g., posts, pictures, private messages) as well as interaction and behavioral data (e.g., list of friends, pages
browsed, „likes‟). Once an adversarial entity has acquired user information, it may use it in unforeseen ways – and
possibly to the disadvantage of the individuals associated with the data.
Institutional Privacy:
The way in which personal control and institutional transparency requirements, as defined through legislation, are
implemented has an impact on both surveillance and social privacy problems, and vice versa. institutional privacy studies
ways of improving organizational data management practices for compliance, e.g., by developing mechanisms for
information flow control and accountability in the back end. The challenges identified in this paper with integrating
surveillance and social privacy are also likely to occur in relation to institutional privacy, given fundamental differences in
assumptions and research methods.
Privacy As Protection:
The goal of PETs (“Privacy Enhancing Technologies”) in the context of OSNs is to enable individuals to engage with
others, share, access and publish information online, free from surveillance and interference. Ideally, only information that
a user explicitly shares is available to his/her intended recipients, while the disclosure of any other information to any
other parties is prevented. Furthermore, PETs aim to enhance the ability of a user to publish and access information on
OSNs by providing her with means to circumvent censorship.
Proposed System:
We distinguish three types of privacy problems that researchers in computer science have to tackle. The first approach
addresses the “surveillance problem” that arises when the personal information and social interactions of OSN users are
leveraged by governments and service providers. The second approach addresses those problems that emerge through the
necessary renegotiation of boundaries as social interactions get mediated by OSN services, in short called “social
privacy”. The third approach addresses problems related to users losing control and oversight over the collection and
processing of their information in OSNs, also known as “institutional privacy”. This paper implements mutation aspects
through Genetic Algorithm by differing users into Guests and Friends, and identifies and Cross Over issues of a guest
Clicking Friend of a friend.
II. DESIGN
The system that we propose to describe in using Object Oriented Modeling Diagrams.
Use-case Diagram:
Fig 1: Use Case Diagram
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 1, Issue 2, pp: (44-53), Month: October 2014 - March 2015, Available at: www.paperpublications.org
Page | 46
Paper Publications
Class Diagram:
Fig 2: Class Diagram
Sequence Diagram:
Fig 3: Sequence Diagram
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 1, Issue 2, pp: (44-53), Month: October 2014 - March 2015, Available at: www.paperpublications.org
Page | 47
Paper Publications
Activity Diagram:
Fig 4: Activity Chart
Component Diagram:
Fig 5: Component Diagram
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 1, Issue 2, pp: (44-53), Month: October 2014 - March 2015, Available at: www.paperpublications.org
Page | 48
Paper Publications
Deployment Diagram:
Fig: 6. Deployment Diagram
III. IMPLEMENTATION
This module collects vistors events (population) on an users account and updates the account holders log information.
And Thus the evolutionary aspects of Surveillance are reflected in User's Log. Thus Completing GA's implementation
public static void saveActions (String actioned, String actioner, String action, String actionertype, String sensitiveaction)
throws ClassNotFoundException, SQLException {
if(actioned.trim().equals(actioner.trim()))
{ return; }
DataBase dbfunc = new DataBase();
dbfunc.createConnection();
String query = "insert into actionsmonitor(`actioned`,`actioner`,`action`,`actionon`,`actionertype`,`sensitiveaction`)
values('" + actioned.trim() + "','" + actioner + "','" + action + "',now(),'" + actionertype + "','" + sensitiveaction + "')";
System.out.println(query);
dbfunc.updateRecord(query);
dbfunc.closeConnection();
}
This happens to be a bridge module between every interaction between the user and social network server. This module
implements mutational aspects of GA by differing users into Guests and Friends. This module implements and identifies
Cross Over Activities of a guest Clicking Friend of a friend of a friend.
public class Surveillance extends HttpServlet {
* Processes requests for both HTTP
* <code>GET</code> and
* <code>POST</code> methods.
* @param request servlet request
* @param response servlet response
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 1, Issue 2, pp: (44-53), Month: October 2014 - March 2015, Available at: www.paperpublications.org
Page | 49
Paper Publications
* @throws ServletException if a servlet-specific error occurs
* @throws IOException if an I/O error occurs
*/
protected void processRequest(HttpServletRequest request, HttpServletResponse response)
throws ServletException, IOException {
response.setContentType("text/html;charset=UTF-8");
PrintWriter out = response.getWriter();
try {
HttpSession session = request.getSession(false);
String store = (String) session.getAttribute("id");
String email = (String) session.getAttribute("email");
String name = (String) session.getAttribute("name");
String option = request.getParameter("option");
if (option.trim().equals("2")) {
String friendMail = request.getParameter("friendMail");
Globals.saveActions(friendMail, email, "ViewedProfile", "GUEST", "YES");
String page = "viewProfile.jsp?option=2&friendMail=" + friendMail;
response.sendRedirect(page);
}
if (option.trim().equals("3")) {
String friendMail = request.getParameter("friendMail");
Globals.saveActions(friendMail, email, "ViewedProfile", "FRIEND", "NO");
String page = "viewProfile.jsp?option=1&friendMail=" + friendMail;
response.sendRedirect(page);
}
// 4 users's page
if (option.trim().equals("4")) {
String friendMail = request.getParameter("friendMail");
Globals.saveActions(friendMail, email, "AccountAccess", "FRIEND", "NO");
String page = "template.jsp?option=1&friendMail=" + friendMail;
response.sendRedirect(page);
}
// 5 users's wall
if (option.trim().equals("5")) {
String friendMail = request.getParameter("friendMail");
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 1, Issue 2, pp: (44-53), Month: October 2014 - March 2015, Available at: www.paperpublications.org
Page | 50
Paper Publications
Globals.saveActions(friendMail, email, "WallAccess", "FRIEND", "NO");
String page = "template.jsp?option=2&friendMail=" + friendMail;
response.sendRedirect(page);
}
// 6 users's photos
if (option.trim().equals("6")) {
String friendMail = request.getParameter("friendMail");
Globals.saveActions(friendMail, email, "ImageAccess", "FRIEND", "NO");
String page = "template.jsp?option=3&friendMail=" + friendMail;
response.sendRedirect(page);
}
// 7 users's videos
if (option.trim().equals("7")) {
String friendMail = request.getParameter("friendMail");
Globals.saveActions(friendMail, email, "VideoAccess", "FRIEND", "NO");
String page = "template.jsp?option=4&friendMail=" + friendMail;
response.sendRedirect(page);
}
// 8 users's friends
if (option.trim().equals("8")) {
String friendMail = request.getParameter("friendMail");
Globals.saveActions(friendMail, email, "FriendAccess", "FRIEND", "NO");
String page = "template.jsp?option=5&friendMail=" + friendMail;
response.sendRedirect(page);
}
// 9 chain users's page
if (option.trim().equals("9")) {
String source = request.getParameter("source");
String friendMail = request.getParameter("friendMail");
Globals.saveActions(friendMail, email, "FriendAccess:Source("+source+") and Friend("+friendMail+")",
"FRIEND", "NO");
String page = "template.jsp?option=1&friendMail=" + friendMail;
response.sendRedirect(page);
}
} catch (ClassNotFoundException ex) {
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 1, Issue 2, pp: (44-53), Month: October 2014 - March 2015, Available at: www.paperpublications.org
Page | 51
Paper Publications
Logger.getLogger(Surveillance.class.getName()).log(Level.SEVERE, null, ex);
} catch (SQLException ex) {
Logger.getLogger(Surveillance.class.getName()).log(Level.SEVERE, null, ex);
} finally {
out.close();
}}
// <editor-fold defaultstate="collapsed" desc="HttpServlet methods. Click on the + sign on the left to edit the code.">
/**
* Handles the HTTP
* <code>GET</code> method.
* @param request servlet request
* @param response servlet response
* @throws ServletException if a servlet-specific error occurs
* @throws IOException if an I/O error occurs
*/
@Override
protected void doGet(HttpServletRequest request, HttpServletResponse response)
throws ServletException, IOException {
processRequest(request, response);
}
* Handles the HTTP
* <code>POST</code> method.
*
* @param request servlet request
* @param response servlet response
* @throws ServletException if a servlet-specific error occurs
* @throws IOException if an I/O error occurs
*/
@Override
protected void doPost(HttpServletRequest request, HttpServletResponse response)
throws ServletException, IOException {
processRequest(request, response);
}
* Returns a short description of the servlet.
* @return a String containing servlet description
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 1, Issue 2, pp: (44-53), Month: October 2014 - March 2015, Available at: www.paperpublications.org
Page | 52
Paper Publications
@Override
public String getServletInfo() {
return "Short description";
}// </editor-fold>
}
IV. RESULTS
Profile Created Successfully
osn@gmail.com
Email: narasimham_c@yahoo.com
Event Name : Profile Creation
Date : 28-10-2014 16:22:54
IP Address : 0:0:0:0:0:0:0:1
...Thank You...Please Visit Us For Social Networking..
New Image Upload
User Id : gvravindranath@gmail.com
Event Name : User (gvravindranath@gmail.com) Uploaded New Image:Jellyfish.jpg
Activity : New Image Upload
Activity On : 2014-10-28 16:19:47.0
Sent On : 28-10-2014 16:20:44
...Thank You...Please Visit Us...
Profile Picture Up dation
User Id : gvravindranath@gmail.com
Event Name : User(gvravindranath@gmail.com) Updated Their Profile Pic
Activity : Profile Picture Updation
Activity On : 2014-10-28 16:18:40.0
Sent On : 28-10-2014 16:19:35
...Thank You...Please Visit Us...
New Profile Update
osn@gmail.com
User Id : gvravindranath@gmail.com
Event Name : User (gvravindranath@gmail.com) Uploaded New Image: Koala.jpg
Activity : New Image Upload
Activity On : 2014-10-28 16:19:47.0
Sent On : 28-10-2014 16:20:35
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 1, Issue 2, pp: (44-53), Month: October 2014 - March 2015, Available at: www.paperpublications.org
Page | 53
Paper Publications
...Thank You...Please Visit Us...
User Id : gvravindranath@gmail.com
Event Name : User (gvravindranath@gmail.com) updated Their Profile
Activity : New Profile Update
Activity On : 2014-10-28 16:17:20.0
Sent On : 28-10-2014 16:17:35
...Thank You...Please Visit Us...
V. CONCLUSION
Privacy is one of the friction points in Online Social Networks (OSNs). In this article, we conclude that the surveillance
and social privacy perspectives have been emphasized. And, addressed the visitors events on an users account and
updated with the account holders log information. This paper described the implementation of a bridge process between
every interaction between the user and social network server. Further, implemented mutational aspects of Genetic
Algorithm by differing users into Guests and Friends, and identified Cross Over Activities of a guest Clicking Friend of a
friend of a friend.
REFERENCES
[1] Seda Gurses, Claudia Diaz “Two Tales of Privacy in Online Social Networks” IEEE Security and Privacy Vol: PP
No 99, 2013.
[2] J. Anderson, C. Diaz, J. Bonneau, and F. Stajano. Privacy-Enabling Social Networking over Untrusted Networks.
InACM Workshop on Online Social Networks (WOSN), pages 1–6. ACM, 2009.
[3] F. Beato, M. Kohlweiss, and K. Wouters. Scramble! your social network data. In Privacy Enhancing Technologies
Symposium, PETS 2011, volume 6794 of LNCS, pages 211–225. Springer, 2011.
[4] E. De Cristofaro, C. Soriente, G. Tsudik, and A. Williams. Humming-bird: Privacy at the time of twitter, IEEE
Symposium on Security and Privacy, pages 285–299. IEEE Computer Society, 2012.
[5] .A. Cutillo, R. Molva, and T. Strufe. Safebook: A privacy-preserving online social network leveraging on real-life
trust. Communications Magazine, 47(12):94–101, 2009.
[6] James Grimmelmann. Saving Facebook. Iowa Law Review, 94:1137– 1206, 2009.
[7] Kevin D. Haggerty and Richard V. Ericson. The Surveillant Assemblage. British Journal of Sociology, 51(4):605 –
622, 2000.
[8] Evgeny Morozov. Face book and Twitter are just places revolutionaries go. The Guardian, 11. March 2011.
[9] Deirdre K. Mulligan and Jennifer King. Bridging the gap between privacy and design. Journal of Constitutional
Law, 14 (4):989 – 1034, 2012.

More Related Content

What's hot

A Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data RatingA Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data RatingIRJET Journal
 
Big Data Analytics : A Social Network Approach
Big Data Analytics : A Social Network ApproachBig Data Analytics : A Social Network Approach
Big Data Analytics : A Social Network ApproachAndry Alamsyah
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networksHarshitha Reddy
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networksIEEEFINALYEARPROJECTS
 
Designing People’s Interconnections in Mobile Social Networks
Designing People’s Interconnections in Mobile Social NetworksDesigning People’s Interconnections in Mobile Social Networks
Designing People’s Interconnections in Mobile Social Networksinscit2006
 
IRJET- An Intuitive Sky-High View of Recommendation Systems
IRJET- An Intuitive Sky-High View of Recommendation SystemsIRJET- An Intuitive Sky-High View of Recommendation Systems
IRJET- An Intuitive Sky-High View of Recommendation SystemsIRJET Journal
 
Identity Resolution across Different Social Networks using Similarity Analysis
Identity Resolution across Different Social Networks using Similarity AnalysisIdentity Resolution across Different Social Networks using Similarity Analysis
Identity Resolution across Different Social Networks using Similarity Analysisrahulmonikasharma
 
exploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queriesexploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queriesswathi78
 
Improvement in the usability of gis based services by
Improvement in the usability of gis based services byImprovement in the usability of gis based services by
Improvement in the usability of gis based services byeSAT Publishing House
 
A literature survey on recommendation
A literature survey on recommendationA literature survey on recommendation
A literature survey on recommendationaciijournal
 
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSA SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSIJCI JOURNAL
 
An updated look at social network extraction system a personal data analysis ...
An updated look at social network extraction system a personal data analysis ...An updated look at social network extraction system a personal data analysis ...
An updated look at social network extraction system a personal data analysis ...eSAT Publishing House
 
MANAGING THE INTERTWINING AMONG USERS, ROLES, PERMISSIONS, AND USER RELATIONS...
MANAGING THE INTERTWINING AMONG USERS, ROLES, PERMISSIONS, AND USER RELATIONS...MANAGING THE INTERTWINING AMONG USERS, ROLES, PERMISSIONS, AND USER RELATIONS...
MANAGING THE INTERTWINING AMONG USERS, ROLES, PERMISSIONS, AND USER RELATIONS...ijsptm
 
Current trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networksCurrent trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networkseSAT Publishing House
 

What's hot (19)

A Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data RatingA Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
 
Big Data Analytics : A Social Network Approach
Big Data Analytics : A Social Network ApproachBig Data Analytics : A Social Network Approach
Big Data Analytics : A Social Network Approach
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networks
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networks
 
Designing People’s Interconnections in Mobile Social Networks
Designing People’s Interconnections in Mobile Social NetworksDesigning People’s Interconnections in Mobile Social Networks
Designing People’s Interconnections in Mobile Social Networks
 
IRJET- An Intuitive Sky-High View of Recommendation Systems
IRJET- An Intuitive Sky-High View of Recommendation SystemsIRJET- An Intuitive Sky-High View of Recommendation Systems
IRJET- An Intuitive Sky-High View of Recommendation Systems
 
Q046049397
Q046049397Q046049397
Q046049397
 
T0 numtq0njc=
T0 numtq0njc=T0 numtq0njc=
T0 numtq0njc=
 
Identity Resolution across Different Social Networks using Similarity Analysis
Identity Resolution across Different Social Networks using Similarity AnalysisIdentity Resolution across Different Social Networks using Similarity Analysis
Identity Resolution across Different Social Networks using Similarity Analysis
 
[IJET-V2I1P14] Authors:Aditi Verma, Rachana Agarwal, Sameer Bardia, Simran Sh...
[IJET-V2I1P14] Authors:Aditi Verma, Rachana Agarwal, Sameer Bardia, Simran Sh...[IJET-V2I1P14] Authors:Aditi Verma, Rachana Agarwal, Sameer Bardia, Simran Sh...
[IJET-V2I1P14] Authors:Aditi Verma, Rachana Agarwal, Sameer Bardia, Simran Sh...
 
exploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queriesexploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queries
 
Improvement in the usability of gis based services by
Improvement in the usability of gis based services byImprovement in the usability of gis based services by
Improvement in the usability of gis based services by
 
A literature survey on recommendation
A literature survey on recommendationA literature survey on recommendation
A literature survey on recommendation
 
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSA SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
 
An updated look at social network extraction system a personal data analysis ...
An updated look at social network extraction system a personal data analysis ...An updated look at social network extraction system a personal data analysis ...
An updated look at social network extraction system a personal data analysis ...
 
4 newmain doc
4 newmain doc4 newmain doc
4 newmain doc
 
MANAGING THE INTERTWINING AMONG USERS, ROLES, PERMISSIONS, AND USER RELATIONS...
MANAGING THE INTERTWINING AMONG USERS, ROLES, PERMISSIONS, AND USER RELATIONS...MANAGING THE INTERTWINING AMONG USERS, ROLES, PERMISSIONS, AND USER RELATIONS...
MANAGING THE INTERTWINING AMONG USERS, ROLES, PERMISSIONS, AND USER RELATIONS...
 
Current trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networksCurrent trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networks
 
Ijcatr04041017
Ijcatr04041017Ijcatr04041017
Ijcatr04041017
 

Similar to MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY

IRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster WarningIRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster WarningIRJET Journal
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSZac Darcy
 
Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...
Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...
Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...AM Publications
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networksJPINFOTECH JAYAPRAKASH
 
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET Journal
 
Privacy Protection Using Formal Logics in Onlne Social Networks
Privacy Protection Using   Formal Logics in Onlne Social NetworksPrivacy Protection Using   Formal Logics in Onlne Social Networks
Privacy Protection Using Formal Logics in Onlne Social NetworksIRJET Journal
 
Intelligent access control policies for Social network site
Intelligent access control policies for Social network siteIntelligent access control policies for Social network site
Intelligent access control policies for Social network siteijcsit
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...ijtsrd
 
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesIRJET Journal
 
Detecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social NetworksDetecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social NetworksIRJET Journal
 
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social NetworksMy Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social NetworksIRJET Journal
 
Electronic copy available at httpsssrn.comabstract=28526.docx
Electronic copy available at httpsssrn.comabstract=28526.docxElectronic copy available at httpsssrn.comabstract=28526.docx
Electronic copy available at httpsssrn.comabstract=28526.docxAASTHA76
 
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...Kumar Goud
 
Identical Users in Different Social Media Provides Uniform Network Structure ...
Identical Users in Different Social Media Provides Uniform Network Structure ...Identical Users in Different Social Media Provides Uniform Network Structure ...
Identical Users in Different Social Media Provides Uniform Network Structure ...IJMTST Journal
 
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTION
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTIONDYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTION
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTIONcscpconf
 
Proactive Intelligent Home System Using Contextual Information and Neural Net...
Proactive Intelligent Home System Using Contextual Information and Neural Net...Proactive Intelligent Home System Using Contextual Information and Neural Net...
Proactive Intelligent Home System Using Contextual Information and Neural Net...IJERA Editor
 
Towards Decision Support and Goal AchievementIdentifying Ac.docx
Towards Decision Support and Goal AchievementIdentifying Ac.docxTowards Decision Support and Goal AchievementIdentifying Ac.docx
Towards Decision Support and Goal AchievementIdentifying Ac.docxturveycharlyn
 
INFORMATION RETRIEVAL Anandraj.L
INFORMATION RETRIEVAL Anandraj.LINFORMATION RETRIEVAL Anandraj.L
INFORMATION RETRIEVAL Anandraj.Lanujessy
 
BenMartine.doc
BenMartine.docBenMartine.doc
BenMartine.docbutest
 

Similar to MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY (20)

IRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster WarningIRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster Warning
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
 
Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...
Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...
Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networks
 
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
 
Privacy Protection Using Formal Logics in Onlne Social Networks
Privacy Protection Using   Formal Logics in Onlne Social NetworksPrivacy Protection Using   Formal Logics in Onlne Social Networks
Privacy Protection Using Formal Logics in Onlne Social Networks
 
Intelligent access control policies for Social network site
Intelligent access control policies for Social network siteIntelligent access control policies for Social network site
Intelligent access control policies for Social network site
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
 
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
 
Detecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social NetworksDetecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social Networks
 
204
204204
204
 
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social NetworksMy Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
 
Electronic copy available at httpsssrn.comabstract=28526.docx
Electronic copy available at httpsssrn.comabstract=28526.docxElectronic copy available at httpsssrn.comabstract=28526.docx
Electronic copy available at httpsssrn.comabstract=28526.docx
 
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
 
Identical Users in Different Social Media Provides Uniform Network Structure ...
Identical Users in Different Social Media Provides Uniform Network Structure ...Identical Users in Different Social Media Provides Uniform Network Structure ...
Identical Users in Different Social Media Provides Uniform Network Structure ...
 
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTION
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTIONDYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTION
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTION
 
Proactive Intelligent Home System Using Contextual Information and Neural Net...
Proactive Intelligent Home System Using Contextual Information and Neural Net...Proactive Intelligent Home System Using Contextual Information and Neural Net...
Proactive Intelligent Home System Using Contextual Information and Neural Net...
 
Towards Decision Support and Goal AchievementIdentifying Ac.docx
Towards Decision Support and Goal AchievementIdentifying Ac.docxTowards Decision Support and Goal AchievementIdentifying Ac.docx
Towards Decision Support and Goal AchievementIdentifying Ac.docx
 
INFORMATION RETRIEVAL Anandraj.L
INFORMATION RETRIEVAL Anandraj.LINFORMATION RETRIEVAL Anandraj.L
INFORMATION RETRIEVAL Anandraj.L
 
BenMartine.doc
BenMartine.docBenMartine.doc
BenMartine.doc
 

Recently uploaded

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 

Recently uploaded (20)

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 

MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY

  • 1. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 1, Issue 2, pp: (44-53), Month: October 2014 - March 2015, Available at: www.paperpublications.org Page | 44 Paper Publications MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY C. Narasimham1 , Jacob2 1 II Year M.Tech-CSE, 2 Assoc Prof. of CSE Nova College of Engineering, Jangareddy Gudem, AP, India Abstract: Privacy is one of the friction points that emerge when communications get mediated in Online Social Networks (OSNs). Different communities of computer science researchers have framed the ‘OSN privacy problem’ as one of surveillance, institutional or social privacy. In this article, first we provide an introduction to the surveillance and social privacy perspectives emphasizing the narratives that inform them, as well as their assumptions and goals. This paper mainly addresses visitors events(population) on an users account and updates the account holders log information. And thus the evolutionary aspects of Surveillance are reflected in User's Log, this needs the implementation of Genetic Algorithm. Further, this requires a bridge module between every interaction between the user and social network server. This paper implements mutation aspects through Genetic Algorithm by differing users into Guests and Friends, and identifies and Cross over issues of a guest Clicking Friend of a friend. I. INTRODUCTION The existing work could model and analyze access control requirements with respect to collaborative authorization management of shared data in OSNs. The need of joint management for data sharing, especially photo sharing, in OSNs has been recognized by the recent work provided a solution for collective privacy management in OSNs. Their work considered access control policies of a content that is co-owned by multiple users in an OSN, such that each co-owner may separately specify her/his own privacy preference for the shared content. After careful analysis the system has been identified to have the following stages:  The Social Privacy  The Surveillance  The Institutional Privacy  Privacy As Protection Social Privacy: Social privacy relates to the concerns that users raise and to the harms that they experience when technologically mediated communications disrupt social boundaries. The users are thus “consumers” of these services. They spend time in these (semi-)public spaces in order to socialize with family and friends, get access to information and discussions, and to expand matters of the heart as well as those of belonging. That these activities are made public to „friends‟ or a greater audience is seen as a crucial component of OSNs. In Access Control, solutions that employ methods from user modeling aim to develop “meaningful” privacy settings that are intuitive to use, and that cater to users‟ information management needs. Surveillance Module: With respect to surveillance, the design of PETs starts from the premise that potentially adversarial entities operate or monitor OSNs. These have an interest in getting hold of as much user information as possible, including user-generated
  • 2. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 1, Issue 2, pp: (44-53), Month: October 2014 - March 2015, Available at: www.paperpublications.org Page | 45 Paper Publications content (e.g., posts, pictures, private messages) as well as interaction and behavioral data (e.g., list of friends, pages browsed, „likes‟). Once an adversarial entity has acquired user information, it may use it in unforeseen ways – and possibly to the disadvantage of the individuals associated with the data. Institutional Privacy: The way in which personal control and institutional transparency requirements, as defined through legislation, are implemented has an impact on both surveillance and social privacy problems, and vice versa. institutional privacy studies ways of improving organizational data management practices for compliance, e.g., by developing mechanisms for information flow control and accountability in the back end. The challenges identified in this paper with integrating surveillance and social privacy are also likely to occur in relation to institutional privacy, given fundamental differences in assumptions and research methods. Privacy As Protection: The goal of PETs (“Privacy Enhancing Technologies”) in the context of OSNs is to enable individuals to engage with others, share, access and publish information online, free from surveillance and interference. Ideally, only information that a user explicitly shares is available to his/her intended recipients, while the disclosure of any other information to any other parties is prevented. Furthermore, PETs aim to enhance the ability of a user to publish and access information on OSNs by providing her with means to circumvent censorship. Proposed System: We distinguish three types of privacy problems that researchers in computer science have to tackle. The first approach addresses the “surveillance problem” that arises when the personal information and social interactions of OSN users are leveraged by governments and service providers. The second approach addresses those problems that emerge through the necessary renegotiation of boundaries as social interactions get mediated by OSN services, in short called “social privacy”. The third approach addresses problems related to users losing control and oversight over the collection and processing of their information in OSNs, also known as “institutional privacy”. This paper implements mutation aspects through Genetic Algorithm by differing users into Guests and Friends, and identifies and Cross Over issues of a guest Clicking Friend of a friend. II. DESIGN The system that we propose to describe in using Object Oriented Modeling Diagrams. Use-case Diagram: Fig 1: Use Case Diagram
  • 3. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 1, Issue 2, pp: (44-53), Month: October 2014 - March 2015, Available at: www.paperpublications.org Page | 46 Paper Publications Class Diagram: Fig 2: Class Diagram Sequence Diagram: Fig 3: Sequence Diagram
  • 4. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 1, Issue 2, pp: (44-53), Month: October 2014 - March 2015, Available at: www.paperpublications.org Page | 47 Paper Publications Activity Diagram: Fig 4: Activity Chart Component Diagram: Fig 5: Component Diagram
  • 5. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 1, Issue 2, pp: (44-53), Month: October 2014 - March 2015, Available at: www.paperpublications.org Page | 48 Paper Publications Deployment Diagram: Fig: 6. Deployment Diagram III. IMPLEMENTATION This module collects vistors events (population) on an users account and updates the account holders log information. And Thus the evolutionary aspects of Surveillance are reflected in User's Log. Thus Completing GA's implementation public static void saveActions (String actioned, String actioner, String action, String actionertype, String sensitiveaction) throws ClassNotFoundException, SQLException { if(actioned.trim().equals(actioner.trim())) { return; } DataBase dbfunc = new DataBase(); dbfunc.createConnection(); String query = "insert into actionsmonitor(`actioned`,`actioner`,`action`,`actionon`,`actionertype`,`sensitiveaction`) values('" + actioned.trim() + "','" + actioner + "','" + action + "',now(),'" + actionertype + "','" + sensitiveaction + "')"; System.out.println(query); dbfunc.updateRecord(query); dbfunc.closeConnection(); } This happens to be a bridge module between every interaction between the user and social network server. This module implements mutational aspects of GA by differing users into Guests and Friends. This module implements and identifies Cross Over Activities of a guest Clicking Friend of a friend of a friend. public class Surveillance extends HttpServlet { * Processes requests for both HTTP * <code>GET</code> and * <code>POST</code> methods. * @param request servlet request * @param response servlet response
  • 6. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 1, Issue 2, pp: (44-53), Month: October 2014 - March 2015, Available at: www.paperpublications.org Page | 49 Paper Publications * @throws ServletException if a servlet-specific error occurs * @throws IOException if an I/O error occurs */ protected void processRequest(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException { response.setContentType("text/html;charset=UTF-8"); PrintWriter out = response.getWriter(); try { HttpSession session = request.getSession(false); String store = (String) session.getAttribute("id"); String email = (String) session.getAttribute("email"); String name = (String) session.getAttribute("name"); String option = request.getParameter("option"); if (option.trim().equals("2")) { String friendMail = request.getParameter("friendMail"); Globals.saveActions(friendMail, email, "ViewedProfile", "GUEST", "YES"); String page = "viewProfile.jsp?option=2&friendMail=" + friendMail; response.sendRedirect(page); } if (option.trim().equals("3")) { String friendMail = request.getParameter("friendMail"); Globals.saveActions(friendMail, email, "ViewedProfile", "FRIEND", "NO"); String page = "viewProfile.jsp?option=1&friendMail=" + friendMail; response.sendRedirect(page); } // 4 users's page if (option.trim().equals("4")) { String friendMail = request.getParameter("friendMail"); Globals.saveActions(friendMail, email, "AccountAccess", "FRIEND", "NO"); String page = "template.jsp?option=1&friendMail=" + friendMail; response.sendRedirect(page); } // 5 users's wall if (option.trim().equals("5")) { String friendMail = request.getParameter("friendMail");
  • 7. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 1, Issue 2, pp: (44-53), Month: October 2014 - March 2015, Available at: www.paperpublications.org Page | 50 Paper Publications Globals.saveActions(friendMail, email, "WallAccess", "FRIEND", "NO"); String page = "template.jsp?option=2&friendMail=" + friendMail; response.sendRedirect(page); } // 6 users's photos if (option.trim().equals("6")) { String friendMail = request.getParameter("friendMail"); Globals.saveActions(friendMail, email, "ImageAccess", "FRIEND", "NO"); String page = "template.jsp?option=3&friendMail=" + friendMail; response.sendRedirect(page); } // 7 users's videos if (option.trim().equals("7")) { String friendMail = request.getParameter("friendMail"); Globals.saveActions(friendMail, email, "VideoAccess", "FRIEND", "NO"); String page = "template.jsp?option=4&friendMail=" + friendMail; response.sendRedirect(page); } // 8 users's friends if (option.trim().equals("8")) { String friendMail = request.getParameter("friendMail"); Globals.saveActions(friendMail, email, "FriendAccess", "FRIEND", "NO"); String page = "template.jsp?option=5&friendMail=" + friendMail; response.sendRedirect(page); } // 9 chain users's page if (option.trim().equals("9")) { String source = request.getParameter("source"); String friendMail = request.getParameter("friendMail"); Globals.saveActions(friendMail, email, "FriendAccess:Source("+source+") and Friend("+friendMail+")", "FRIEND", "NO"); String page = "template.jsp?option=1&friendMail=" + friendMail; response.sendRedirect(page); } } catch (ClassNotFoundException ex) {
  • 8. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 1, Issue 2, pp: (44-53), Month: October 2014 - March 2015, Available at: www.paperpublications.org Page | 51 Paper Publications Logger.getLogger(Surveillance.class.getName()).log(Level.SEVERE, null, ex); } catch (SQLException ex) { Logger.getLogger(Surveillance.class.getName()).log(Level.SEVERE, null, ex); } finally { out.close(); }} // <editor-fold defaultstate="collapsed" desc="HttpServlet methods. Click on the + sign on the left to edit the code."> /** * Handles the HTTP * <code>GET</code> method. * @param request servlet request * @param response servlet response * @throws ServletException if a servlet-specific error occurs * @throws IOException if an I/O error occurs */ @Override protected void doGet(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException { processRequest(request, response); } * Handles the HTTP * <code>POST</code> method. * * @param request servlet request * @param response servlet response * @throws ServletException if a servlet-specific error occurs * @throws IOException if an I/O error occurs */ @Override protected void doPost(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException { processRequest(request, response); } * Returns a short description of the servlet. * @return a String containing servlet description
  • 9. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 1, Issue 2, pp: (44-53), Month: October 2014 - March 2015, Available at: www.paperpublications.org Page | 52 Paper Publications @Override public String getServletInfo() { return "Short description"; }// </editor-fold> } IV. RESULTS Profile Created Successfully osn@gmail.com Email: narasimham_c@yahoo.com Event Name : Profile Creation Date : 28-10-2014 16:22:54 IP Address : 0:0:0:0:0:0:0:1 ...Thank You...Please Visit Us For Social Networking.. New Image Upload User Id : gvravindranath@gmail.com Event Name : User (gvravindranath@gmail.com) Uploaded New Image:Jellyfish.jpg Activity : New Image Upload Activity On : 2014-10-28 16:19:47.0 Sent On : 28-10-2014 16:20:44 ...Thank You...Please Visit Us... Profile Picture Up dation User Id : gvravindranath@gmail.com Event Name : User(gvravindranath@gmail.com) Updated Their Profile Pic Activity : Profile Picture Updation Activity On : 2014-10-28 16:18:40.0 Sent On : 28-10-2014 16:19:35 ...Thank You...Please Visit Us... New Profile Update osn@gmail.com User Id : gvravindranath@gmail.com Event Name : User (gvravindranath@gmail.com) Uploaded New Image: Koala.jpg Activity : New Image Upload Activity On : 2014-10-28 16:19:47.0 Sent On : 28-10-2014 16:20:35
  • 10. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 1, Issue 2, pp: (44-53), Month: October 2014 - March 2015, Available at: www.paperpublications.org Page | 53 Paper Publications ...Thank You...Please Visit Us... User Id : gvravindranath@gmail.com Event Name : User (gvravindranath@gmail.com) updated Their Profile Activity : New Profile Update Activity On : 2014-10-28 16:17:20.0 Sent On : 28-10-2014 16:17:35 ...Thank You...Please Visit Us... V. CONCLUSION Privacy is one of the friction points in Online Social Networks (OSNs). In this article, we conclude that the surveillance and social privacy perspectives have been emphasized. And, addressed the visitors events on an users account and updated with the account holders log information. This paper described the implementation of a bridge process between every interaction between the user and social network server. Further, implemented mutational aspects of Genetic Algorithm by differing users into Guests and Friends, and identified Cross Over Activities of a guest Clicking Friend of a friend of a friend. REFERENCES [1] Seda Gurses, Claudia Diaz “Two Tales of Privacy in Online Social Networks” IEEE Security and Privacy Vol: PP No 99, 2013. [2] J. Anderson, C. Diaz, J. Bonneau, and F. Stajano. Privacy-Enabling Social Networking over Untrusted Networks. InACM Workshop on Online Social Networks (WOSN), pages 1–6. ACM, 2009. [3] F. Beato, M. Kohlweiss, and K. Wouters. Scramble! your social network data. In Privacy Enhancing Technologies Symposium, PETS 2011, volume 6794 of LNCS, pages 211–225. Springer, 2011. [4] E. De Cristofaro, C. Soriente, G. Tsudik, and A. Williams. Humming-bird: Privacy at the time of twitter, IEEE Symposium on Security and Privacy, pages 285–299. IEEE Computer Society, 2012. [5] .A. Cutillo, R. Molva, and T. Strufe. Safebook: A privacy-preserving online social network leveraging on real-life trust. Communications Magazine, 47(12):94–101, 2009. [6] James Grimmelmann. Saving Facebook. Iowa Law Review, 94:1137– 1206, 2009. [7] Kevin D. Haggerty and Richard V. Ericson. The Surveillant Assemblage. British Journal of Sociology, 51(4):605 – 622, 2000. [8] Evgeny Morozov. Face book and Twitter are just places revolutionaries go. The Guardian, 11. March 2011. [9] Deirdre K. Mulligan and Jennifer King. Bridging the gap between privacy and design. Journal of Constitutional Law, 14 (4):989 – 1034, 2012.