IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...ijsptm
Ensuring privacy of users of social networks is probably an unsolvable conundrum. At the same time, an informed use of the existing privacy options by the social network participants may alleviate - or even prevent - some of the more drastic privacy-averse incidents. Unfortunately, recent surveys show that an average user is either not aware of these options or does not use them, probably due to their perceived complexity. It is therefore reasonable to believe that tools assisting users with two tasks: 1) understanding their social net behaviour in terms of their privacy settings and broad privacy categories, and 2)recommending reasonable privacy options, will be a valuable tool for everyday privacy practice in a social
network context. This paper presents YourPrivacyProtector, a recommender system that shows how simple machine learning techniques may provide useful assistance in these two tasks to Facebook users. We support our claim with empirical results of application of YourPrivacyProtector to two groups of Facebook
users.
Identification of inference attacks on private Information from Social Networkseditorjournal
Online social networks, like
Facebook, twitter are increasingly utilized by
many people. These networks permit users to
publish details about them and to connect to
their friends. Some of the details revealed
inside these networks are meant to be
keeping private. Yet it is possible to use
learning algorithms and methods on released
data have to predict private information,
which cause inference attacks. This paper
discovers how to launch inference attacks
using released social networking details to
predict private information’s. It then
separate three possible sanitization
algorithms that could be used in various
situations. Then, it investigates the
effectiveness of these techniques and tries to
use methods of collective inference
techniques to determine sensitive attributes
of the user data set. It shows that it can
decline the effectiveness of both the local and
relational classification algorithms by using
the sanitization methods we described.
Implementation of Privacy Policy Specification System for User Uploaded Image...rahulmonikasharma
The regular use of social networking websites and application encompasses the collection and retention of personal and very often sensitive information about users. This information needs to remain private and each social network owns a privacy policy that describes in-depth how user’s information is managed and published. As there is increasing use of images for sharing through social sites, maintaining privacy has become a major problem. In light of these incidents, the need of tools to aid users control access to their shared content is necessary. This problem can be proposed by using an Privacy Policy Specification system to help users compose privacy settings for their shared images. Toward addressing this need, we propose Privacy Policy Specification system to help users to specify privacy settings for their images. Privacy Policy Specification System configure a policy for a group and apply appropriate policies (comment, share, expiry, download) on image for sharing in the group.
Social Networking Sites have become the means of the communication and have
experienced growth in the recent years. As these sites offer services for free of costs are
attracting the people all around the world. Some technologies are emerging in the field of
Internet but still the users are facing the security leakages by unauthorized users. Many of
the Social Sites are managed by the Third Party Domains which keep track of all the user
information along with the access details. Most Online Social Networking (OSN) Sites
provide an “accept all or nothing” mechanism for managing permission from Third Party
Access (TPA) to access user’s private data [3]. The Social Media sites do not provide any
mechanism for privacy on the shared data among the multiple users. Many users share their
personal information without knowing about the cyber thefts and risks associated with it.
From the survey it has been found that the teenagers are least concerned about the
navigating privacy. Privacy associated with the Social media is the very crucial thing.
Different methods are discussed regarding sharing of the personal information and leakage
of this information through different mediums. Different models are also proposed in this
paper regarding the privacy control of third party access of the personal information. An
approach is proposed which allows users to share their access control configuration for TPA
s with their friends who can reuse and rate such configurations [3]
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...ijsptm
Ensuring privacy of users of social networks is probably an unsolvable conundrum. At the same time, an informed use of the existing privacy options by the social network participants may alleviate - or even prevent - some of the more drastic privacy-averse incidents. Unfortunately, recent surveys show that an average user is either not aware of these options or does not use them, probably due to their perceived complexity. It is therefore reasonable to believe that tools assisting users with two tasks: 1) understanding their social net behaviour in terms of their privacy settings and broad privacy categories, and 2)recommending reasonable privacy options, will be a valuable tool for everyday privacy practice in a social
network context. This paper presents YourPrivacyProtector, a recommender system that shows how simple machine learning techniques may provide useful assistance in these two tasks to Facebook users. We support our claim with empirical results of application of YourPrivacyProtector to two groups of Facebook
users.
Identification of inference attacks on private Information from Social Networkseditorjournal
Online social networks, like
Facebook, twitter are increasingly utilized by
many people. These networks permit users to
publish details about them and to connect to
their friends. Some of the details revealed
inside these networks are meant to be
keeping private. Yet it is possible to use
learning algorithms and methods on released
data have to predict private information,
which cause inference attacks. This paper
discovers how to launch inference attacks
using released social networking details to
predict private information’s. It then
separate three possible sanitization
algorithms that could be used in various
situations. Then, it investigates the
effectiveness of these techniques and tries to
use methods of collective inference
techniques to determine sensitive attributes
of the user data set. It shows that it can
decline the effectiveness of both the local and
relational classification algorithms by using
the sanitization methods we described.
Implementation of Privacy Policy Specification System for User Uploaded Image...rahulmonikasharma
The regular use of social networking websites and application encompasses the collection and retention of personal and very often sensitive information about users. This information needs to remain private and each social network owns a privacy policy that describes in-depth how user’s information is managed and published. As there is increasing use of images for sharing through social sites, maintaining privacy has become a major problem. In light of these incidents, the need of tools to aid users control access to their shared content is necessary. This problem can be proposed by using an Privacy Policy Specification system to help users compose privacy settings for their shared images. Toward addressing this need, we propose Privacy Policy Specification system to help users to specify privacy settings for their images. Privacy Policy Specification System configure a policy for a group and apply appropriate policies (comment, share, expiry, download) on image for sharing in the group.
Social Networking Sites have become the means of the communication and have
experienced growth in the recent years. As these sites offer services for free of costs are
attracting the people all around the world. Some technologies are emerging in the field of
Internet but still the users are facing the security leakages by unauthorized users. Many of
the Social Sites are managed by the Third Party Domains which keep track of all the user
information along with the access details. Most Online Social Networking (OSN) Sites
provide an “accept all or nothing” mechanism for managing permission from Third Party
Access (TPA) to access user’s private data [3]. The Social Media sites do not provide any
mechanism for privacy on the shared data among the multiple users. Many users share their
personal information without knowing about the cyber thefts and risks associated with it.
From the survey it has been found that the teenagers are least concerned about the
navigating privacy. Privacy associated with the Social media is the very crucial thing.
Different methods are discussed regarding sharing of the personal information and leakage
of this information through different mediums. Different models are also proposed in this
paper regarding the privacy control of third party access of the personal information. An
approach is proposed which allows users to share their access control configuration for TPA
s with their friends who can reuse and rate such configurations [3]
An Access Control Model for Collaborative Management of Shared Data in OSNSIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Multi-Mode Conceptual Clustering Algorithm Based Social Group Identification ...inventionjournals
The problem of web search time complexity and accuracy has been visited in many research papers, and the authors discussed many approaches to improve the search performance. Still the approaches does not produce any noticeable improvement and struggles with more time complexity as well. To overcome the issues identified, an efficient multi mode conceptual clustering algorithm has been discussed in this paper, which identifies the similar interested user groups by clustering their search context according to different conceptual queries. Identified user groups are shared with the related conceptual queries and their results to reduce the time complexity. The multi mode conceptual clustering, performs grouping of search queries and users according to number of users and their search pattern. The concept of search is identified by using Natural language processing methods and the web logs produced by the default web search engines. The author designed a dedicated web interface to collect the web log about the user search and the same data has been used to cluster the social groups according to number of conceptual queries. The search results has been shared between the users of identified social groups which reduces the search time complexity and improves the efficiency of web search in better manner
AN INTEGRATED RANKING ALGORITHM FOR EFFICIENT INFORMATION COMPUTING IN SOCIAL...ijwscjournal
Social networks have ensured the expanding disproportion between the face of WWW stored traditionally in search engine repositories and the actual ever changing face of Web. Exponential growth of web users and the ease with which they can upload contents on web highlights the need of content controls on material published on the web. As definition of search is changing, socially-enhanced interactive search methodologies are the need of the hour. Ranking is pivotal for efficient web search as the search performance mainly depends upon the ranking results. In this paper new integrated ranking model based on fused rank of web object based on popularity factor earned over only valid interlinks from multiple social forums is proposed. This model identifies relationships between web objects in separate social networks based on the object inheritance graph. Experimental study indicates the effectiveness of proposed Fusion based ranking algorithm in terms of better search results.
Social network has become so popular with overwhelming high rate of growth, due to this popularity the online social networks is facing the issues of spamming, which has leads to unsubstantial economic loss to this menace of spam and spammers activities. It has leads to uncontrollable dissemination of viruses and malwares, promotional ads, phishing, and scams. spam activities has enter a new dangerous dimension, the spammers have step up their games and tactics online social networks, it consumes large amounts of network bandwidth leading to less revenue and significant economic loss to both private and public sectors. From the previous scholars work on spammer classification taxonomy, various machine learning techniques have been extensively used to detect spam activities and spammers in online social networks. There are various classifier that are learn over content-based features extracted from the user's interactions and profiles to label them as spam/spammers or legitimate. But recently, new network structural bench mark features have been proposed for spammer detection task, but their importance using structural bench mark learning methods has not been extensively evaluated yet. In this research work, we evaluate the the metric performance of some structural bench mark learning methods using scientific and strategic approach based attributes extracted from an interaction network for the task of spammer detection in online social network.
Understanding Cross-site Linking in Online Social Networksyeung2000
Online social networks (OSNs) have attracted billions of users, and play an important role in people's daily life. A user often has accounts on multiple OSN sites. In this paper, we study the emerging "cross-site linking" function, which is supported by many OSNs. Our study is based on Foursquare, a representative location-based social networking (LBSN) service. We conduct a data-driven analysis by using crawled public profiles of almost all (if not all) Foursquare users. Our analysis has shown that the cross-site linking function is widely adopted by Foursquare users, and the users who have enabled this function are more active than other users. We have also found that users who are more concerned with online privacy have a lower probability to enable the cross-site linking function. Besides analyzing crawled Foursquare user profiles, we further explore cross-site linking between Foursquare and other OSN sites, i.e., Facebook and Twitter. The study on "Foursquare-Facebook" linking indicates that users have a high probability to provide consistent information to different OSNs. Meanwhile, "Foursquare-Twitter" linking is used to demonstrate the usefulness of aggregating user-generated content across multiple OSN sites. We present a gender-based analysis of Twitter, which is made accurate by leveraging cross-site links between Foursquare and Twitter.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Abstract: Privacy is one of the friction points that emerge when communications get mediated in Online Social Networks (OSNs). Different communities of computer science researchers have framed the ‘OSN privacy problem’ as one of surveillance, institutional or social privacy. In this article, first we provide an introduction to the surveillance and social privacy perspectives emphasizing the narratives that inform them, as well as their assumptions and goals. This paper mainly addresses visitors events (population) on an users account and updates the account holders log information. And thus the evolutionary aspects of Surveillance are reflected in User's Log, this needs the implementation of Genetic Algorithm. Further, this requires a bridge module between every interaction between the user and social network server. This paper implements mutation aspects through Genetic Algorithm by differing users into Guests and Friends, and identifies and Cross Over issues of a guest Clicking Friend of a friend.
Social Network Analysis (SNA) and its implications for knowledge discovery in...ACMBangalore
Social Network Analysis (SNA) and its implications for knowledge discovery in Informal Networks- Talk by Dr Jai Ganesh, SETLabs, Infosys at Search and Social Platforms tutorial, as part of Compute 2009, ACM Bangalore
The advancement of Information Technology has hastened the ability to disseminate information across the globe. In particular, the recent trends in ‘Social Networking’ have led to a spark in personally sensitive information being published on the World Wide Web. While such socially active websites are creative tools for expressing one’s personality it also entails serious privacy concerns. Thus, Social Networking websites could be termed a double edged sword. It is important for the law to keep abreast of these developments in technology. The purpose of this paper is to demonstrate the limits of extending existing laws to battle privacy intrusions in the Internet especially in the context of social networking. It is suggested that privacy specific legislation is the most appropriate means of protecting online privacy. In doing so it is important to maintain a balance between the competing right of expression, the failure of which may hinder the reaping of benefits offered by Internet technology
Predicting Social Interactions from Different Sources of Location-based Knowl...Michael Steurer
Recent research has shown that digital online geo- location traces are new and valuable sources to predict social interactions between users, e.g. , check-ins via FourSquare or geo-location information in Flickr images. Interestingly, if we look at related work in this area, research studying the extent to which social interactions can be predicted between users by taking more than one location-based knowledge source into account does not exist. To contribute to this field of research, we have collected social interaction data of users in an online social network called My Second Life and three related location-based knowledge sources of these users (monitored locations, shared locations and favored locations), to show the extent to which social interactions between users can be predicted. Using supervised and unsupervised machine learning techniques, we find that on the one hand the same location-based features (e.g. the common regions and common observations) perform well across the three different sources. On the other hand, we find that the shared location information is better suited to predict social interactions between users than monitored or favored location information of the user.
Hybrid fingerprint matching algorithm for high accuracy and reliabilityeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
An Access Control Model for Collaborative Management of Shared Data in OSNSIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Multi-Mode Conceptual Clustering Algorithm Based Social Group Identification ...inventionjournals
The problem of web search time complexity and accuracy has been visited in many research papers, and the authors discussed many approaches to improve the search performance. Still the approaches does not produce any noticeable improvement and struggles with more time complexity as well. To overcome the issues identified, an efficient multi mode conceptual clustering algorithm has been discussed in this paper, which identifies the similar interested user groups by clustering their search context according to different conceptual queries. Identified user groups are shared with the related conceptual queries and their results to reduce the time complexity. The multi mode conceptual clustering, performs grouping of search queries and users according to number of users and their search pattern. The concept of search is identified by using Natural language processing methods and the web logs produced by the default web search engines. The author designed a dedicated web interface to collect the web log about the user search and the same data has been used to cluster the social groups according to number of conceptual queries. The search results has been shared between the users of identified social groups which reduces the search time complexity and improves the efficiency of web search in better manner
AN INTEGRATED RANKING ALGORITHM FOR EFFICIENT INFORMATION COMPUTING IN SOCIAL...ijwscjournal
Social networks have ensured the expanding disproportion between the face of WWW stored traditionally in search engine repositories and the actual ever changing face of Web. Exponential growth of web users and the ease with which they can upload contents on web highlights the need of content controls on material published on the web. As definition of search is changing, socially-enhanced interactive search methodologies are the need of the hour. Ranking is pivotal for efficient web search as the search performance mainly depends upon the ranking results. In this paper new integrated ranking model based on fused rank of web object based on popularity factor earned over only valid interlinks from multiple social forums is proposed. This model identifies relationships between web objects in separate social networks based on the object inheritance graph. Experimental study indicates the effectiveness of proposed Fusion based ranking algorithm in terms of better search results.
Social network has become so popular with overwhelming high rate of growth, due to this popularity the online social networks is facing the issues of spamming, which has leads to unsubstantial economic loss to this menace of spam and spammers activities. It has leads to uncontrollable dissemination of viruses and malwares, promotional ads, phishing, and scams. spam activities has enter a new dangerous dimension, the spammers have step up their games and tactics online social networks, it consumes large amounts of network bandwidth leading to less revenue and significant economic loss to both private and public sectors. From the previous scholars work on spammer classification taxonomy, various machine learning techniques have been extensively used to detect spam activities and spammers in online social networks. There are various classifier that are learn over content-based features extracted from the user's interactions and profiles to label them as spam/spammers or legitimate. But recently, new network structural bench mark features have been proposed for spammer detection task, but their importance using structural bench mark learning methods has not been extensively evaluated yet. In this research work, we evaluate the the metric performance of some structural bench mark learning methods using scientific and strategic approach based attributes extracted from an interaction network for the task of spammer detection in online social network.
Understanding Cross-site Linking in Online Social Networksyeung2000
Online social networks (OSNs) have attracted billions of users, and play an important role in people's daily life. A user often has accounts on multiple OSN sites. In this paper, we study the emerging "cross-site linking" function, which is supported by many OSNs. Our study is based on Foursquare, a representative location-based social networking (LBSN) service. We conduct a data-driven analysis by using crawled public profiles of almost all (if not all) Foursquare users. Our analysis has shown that the cross-site linking function is widely adopted by Foursquare users, and the users who have enabled this function are more active than other users. We have also found that users who are more concerned with online privacy have a lower probability to enable the cross-site linking function. Besides analyzing crawled Foursquare user profiles, we further explore cross-site linking between Foursquare and other OSN sites, i.e., Facebook and Twitter. The study on "Foursquare-Facebook" linking indicates that users have a high probability to provide consistent information to different OSNs. Meanwhile, "Foursquare-Twitter" linking is used to demonstrate the usefulness of aggregating user-generated content across multiple OSN sites. We present a gender-based analysis of Twitter, which is made accurate by leveraging cross-site links between Foursquare and Twitter.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Abstract: Privacy is one of the friction points that emerge when communications get mediated in Online Social Networks (OSNs). Different communities of computer science researchers have framed the ‘OSN privacy problem’ as one of surveillance, institutional or social privacy. In this article, first we provide an introduction to the surveillance and social privacy perspectives emphasizing the narratives that inform them, as well as their assumptions and goals. This paper mainly addresses visitors events (population) on an users account and updates the account holders log information. And thus the evolutionary aspects of Surveillance are reflected in User's Log, this needs the implementation of Genetic Algorithm. Further, this requires a bridge module between every interaction between the user and social network server. This paper implements mutation aspects through Genetic Algorithm by differing users into Guests and Friends, and identifies and Cross Over issues of a guest Clicking Friend of a friend.
Social Network Analysis (SNA) and its implications for knowledge discovery in...ACMBangalore
Social Network Analysis (SNA) and its implications for knowledge discovery in Informal Networks- Talk by Dr Jai Ganesh, SETLabs, Infosys at Search and Social Platforms tutorial, as part of Compute 2009, ACM Bangalore
The advancement of Information Technology has hastened the ability to disseminate information across the globe. In particular, the recent trends in ‘Social Networking’ have led to a spark in personally sensitive information being published on the World Wide Web. While such socially active websites are creative tools for expressing one’s personality it also entails serious privacy concerns. Thus, Social Networking websites could be termed a double edged sword. It is important for the law to keep abreast of these developments in technology. The purpose of this paper is to demonstrate the limits of extending existing laws to battle privacy intrusions in the Internet especially in the context of social networking. It is suggested that privacy specific legislation is the most appropriate means of protecting online privacy. In doing so it is important to maintain a balance between the competing right of expression, the failure of which may hinder the reaping of benefits offered by Internet technology
Predicting Social Interactions from Different Sources of Location-based Knowl...Michael Steurer
Recent research has shown that digital online geo- location traces are new and valuable sources to predict social interactions between users, e.g. , check-ins via FourSquare or geo-location information in Flickr images. Interestingly, if we look at related work in this area, research studying the extent to which social interactions can be predicted between users by taking more than one location-based knowledge source into account does not exist. To contribute to this field of research, we have collected social interaction data of users in an online social network called My Second Life and three related location-based knowledge sources of these users (monitored locations, shared locations and favored locations), to show the extent to which social interactions between users can be predicted. Using supervised and unsupervised machine learning techniques, we find that on the one hand the same location-based features (e.g. the common regions and common observations) perform well across the three different sources. On the other hand, we find that the shared location information is better suited to predict social interactions between users than monitored or favored location information of the user.
Hybrid fingerprint matching algorithm for high accuracy and reliabilityeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Effect of depth to thickness ratio and length to depth ratio on hollow sectio...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Stegnography of high embedding efficiency by using an extended matrix encodin...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Editor IJCATR
Bayesian theory and association rule mining methods are artificial intelligence techniques that have been used in various computing fields, especially in machine learning. Internet has been considered as an easy ground for vices like radicalization because of its diverse nature and ease of information access. These vices could be managed using recommender systems methods which are used to deliver users’ preference data based on their previous interests and in relation with the community around the user. The recommender systems are divided into two broad categories, i.e. collaborative systems which considers users which share the same preferences as the user in question and content-based recommender systems tends to recommend websites similar to those already liked by the user. Recent research and information from security organs indicate that, online radicalization has been growing at an alarming rate. The paper reviews in depth what has been carried out in recommender systems and looks at how these methods could be combined to from a strong system to monitor and manage online menace as a result of radicalization. The relationship between different websites and the trend from continuous access of these websites forms the basis for probabilistic reasoning in understanding the users’ behavior. Association rule mining method has been widely used in recommender systems in profiling and generating users’ preferences. To add probabilistic reasoning considering internet magnitude and more so in social media, Bayesian theory is incorporated. Combination of this two techniques provides better analysis of the results thereby adding reliability and knowledge to the results.
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Editor IJCATR
Bayesian theory and association rule mining methods are artificial intelligence techniques that have been used in various
computing fields, especially in machine learning. Internet has been considered as an easy ground for vices like radicalization because
of its diverse nature and ease of information access. These vices could be managed using recommender systems methods which are
used to deliver users’ preference data based on their previous interests and in relation with the community around the user. The
recommender systems are divided into two broad categories, i.e. collaborative systems which considers users which share the same
preferences as the user in question and content-based recommender systems tends to recommend websites similar to those already
liked by the user. Recent research and information from security organs indicate that, online radicalization has been growing at an
alarming rate. The paper reviews in depth what has been carried out in recommender systems and looks at how these methods could be
combined to from a strong system to monitor and manage online menace as a result of radicalization. The relationship between
different websites and the trend from continuous access of these websites forms the basis for probabilistic reasoning in understanding
the users’ behavior. Association rule mining method has been widely used in recommender systems in profiling and generating users’
preferences. To add probabilistic reasoning considering internet magnitude and more so in social media, Bayesian theory is
incorporated. Combination of this two techniques provides better analysis of the results thereby adding reliability and knowledge to the
results.
Collusion-resistant multiparty data sharing in social networksIJECEIAES
The number of users on online social networks (OSNs) has grown tremendously over the past few years, with sites like Facebook amassing over a billion users. With the popularity of OSNs, the increase in privacy risk from the large volume of sensitive and private data is inevitable. While there are many features for access control for an individual user, most OSNs still need concrete mechanisms to preserve the privacy of data shared between multiple users. The proposed method uses metrics such as identity leakage (IL) and strength of interaction (SoI) to fine-tune the scenarios that use privacy risk and sharing loss to identify and resolve conflicts. In addition to conflict resolution, bot detection is also done to mitigate collusion attacks. The final decision to share the data item is then ascertained based on whether it passes the threshold condition for the above metrics.
Policy resolution of shared data in online social networks IJECEIAES
Online social networks have practically a go-to source for information divulging, social exchanges and finding new friends. The popularity of such sites is so profound that they are widely used by people belonging to different age groups and various regions. Widespread use of such sites has given rise to privacy and security issues. This paper proposes a set of rules to be incorporated to safeguard the privacy policies of related users while sharing information and other forms of media online. The proposed access control network takes into account the content sensitivity and confidence level of the accessor to resolve the conflicting privacy policies of the co-owners.
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...Ijripublishers Ijri
With the growing quantity of pictures users distribute from node to node social networks, retaining confidentiality has turn out to be a foremost predicament, as declared by a latest wave of made known occurrences wherever users unintentionally shared individual profile. In radiance of these occurrences made necessitate of tools to assist users organize access to their distributed data is evident. In the direction of speak to this requirement, we suggest an Adaptive Privacy Policy forecast (A3P) scheme to facilitate users compile confidentiality settings for their pictures. We observe the responsibility of communal context, picture content, and metadata as possible sign of users’ confidentiality preference. We recommend a two-level structure which according to the user’s obtainable times past on the site, establishs the most excellent obtainable confidentiality policy for the user’s pictures being uploaded. Our solution relies on an image classification framework for image categories which may be associated with similar policies, and on a policy prediction algorithm to automatically generate a policy for each newly uploaded image, also according to users’ social features. Over time, the generated policies will follow the evolution of users’ privacy attitude. We provide the results of our extensive evaluation over 5,000 policies, which demonstrate the effectiveness of our system, with prediction accuracies over 90 percent.
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyCSCJournals
Social networks can offer many services to the users for sharing activities events and their ideas. Many attacks can happened to the social networking websites due to trust that have been given by the users. Cyber threats are discussed in this paper. We study the types of cyber threats, classify them and give some suggestions to protect social networking websites of variety of attacks. Moreover, we gave some antithreats strategies with future trends.
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...ijtsrd
Online Social Networks OSNs are providing a diversity of application for human users to network through families, friends and even strangers. One of such application, friend search engine, allows the universal public to inquiry individual client friend lists and has been gaining popularity recently. Proper design, this application may incorrectly disclose client private relationship information. Existing work has a privacy perpetuation clarification that can effectively boost OSNs' sociability while protecting users' friendship privacy against attacks launched by individual malicious requestors. In this project proposed an advanced collusion attack, where a victim user's friendship privacy can be compromise from side to side a series of cautiously designed queries coordinately launched by multiple malicious requestors. The result of the proposed collusion attack is validate through synthetic and real world social network data sets. The project on the advanced collusion attacks will help us design a more vigorous and securer friend search engine on OSNs in the near future. R. Brintha | H. Parveen Bagum "Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Search Engine" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4 , June 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31687.pdf Paper Url :https://www.ijtsrd.com/computer-science/world-wide-web/31687/retrieving-hidden-friends-a-collusion-privacy-attack-against-online-friend-search-engine/r-brintha
The Implementation of Social Media for Educational Objectivestheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Theoretical work submitted to the Journal should be original in its motivation or modeling structure. Empirical analysis should be based on a theoretical framework and should be capable of replication. It is expected that all materials required for replication (including computer programs and data sets) should be available upon request to the authors.
The International Journal of Engineering & Science would take much care in making your article published without much delay with your kind cooperation
Abstract: Privacy is one of the friction points that emerge when communications get mediated in Online Social Networks (OSNs). Different communities of computer science researchers have framed the ‘OSN privacy problem’ as one of surveillance, institutional or social privacy. In this article, first we provide an introduction to the surveillance and social privacy perspectives emphasizing the narratives that inform them, as well as their assumptions and goals. This paper mainly addresses visitors events (population) on an users account and updates the account holders log information. And thus the evolutionary aspects of Surveillance are reflected in User's Log, this needs the implementation of Genetic Algorithm. Further, this requires a bridge module between every interaction between the user and social network server. This paper implements mutation aspects through Genetic Algorithm by differing users into Guests and Friends, and identifies and Cross Over issues of a guest Clicking Friend of a friend.Title: MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
Author: C. Narasimham, Jacob
International Journal of Recent Research in Mathematics Computer Science and Information Technology
ISSN: 2350-1022
Paper Publications
PRIVACY PRESERVATION IN SOCIAL MEDIA BY IMAGE PROCESSINGAM Publications
Photo sharing is a captivating feature which popularizes Online Gregarious Networks (OSNs). Lamentably, it may leak users’ privacy if they are sanctioned to post, comment, and tag a photo liberatingly. In this paper, we endeavor to address this issue and study the scenario when a utilizer shares a photo containing individuals other than him/her (termed co-photo for short). To obviate possible privacy leakage of a photo, we design a mechanism to enable each individual in a photo be cognizant of the posting activity and participate in the decision making on the photo posting. For this purport, we require an efficient facial apperception (FR) system that can apperceive everyone in the photo. However, more authoritatively mandating privacy setting may limit the number of the photos publicly available to train the FR system. To deal with this dilemma, our mechanism endeavors to utilize users’ private photos to design a personalized FR system concretely trained to differentiate possible photo co-owners without leaking their privacy. We additionally develop a distributed consensus predicated method to reduce the computational intricacy and for fend the private training set. We show that our system is superior to other possible approaches in terms of apperception ratio and efficiency. Our mechanism is implemented as a proof of concept Android application on Facebook’s platform.
Current trends of opinion mining and sentiment analysis in social networkseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Similar to Authorization mechanism for multiparty data sharing in social network (20)
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Final project report on grocery store management system..pdf
Authorization mechanism for multiparty data sharing in social network
1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 311
AUTHORIZATIONMECHANISM FORMULTIPARTYDATASHARINGIN
SOCIALNETWORK
Ashwajit Ramteke1
, Girish Talmale2
1
M.Tech Scholar, Department of Computer Science and Engineering, G. H. Raisoni College of Engineering, Nagpur,
Maharashtra, India
2
Assistant Professor, Department of Computer Science and Engineering, G. H. Raisoni College of Engineering, Nagpur,
Maharashtra, India
Abstract
In recent year, most popular websites are social media, it has tremendous growth take in consideration as a fast network to connect a
people and thus it’s give idea of overload of millions of internet user. These social network offer to carry out desirable means for
digital social inter connection and information involvement, but also come again a number of security and privacy problems. Right to
use manage mechanism is provide to restrict shared data, they currently do not provide any mechanism to minimize problem of
multiuser shared data. To this end, we carry out an approach to allow the protection of shared data accompanying with multiple users
in social network. We gives a stand to user to share their data in protected manner. We also discuss a proof-of-concept prototype of
methodology as part of a framework on social network and provide usability study and system evaluation of our method.
Keywords: Social network, multiple user access control, Security mode, Specification and management, Data Sharing.
-----------------------------------------------------------------------***-----------------------------------------------------------------------
1. INTRODUCTION
In recent year, the peoples are come close together due to the
fastest internet facility. The communication channel has play
an important role to make lesser distance between the people.
Networks of the internet are rapidly spread in world wide.
Social networking site has more popularity than any other
side, out of 100 % people, near about 60% people are login at
a time with social media. For some social networking sites like
Facebook, twitter given that real names and other private
information is encouraged by the site (onto a page known as a
„Profile„).because these sites are more trusted sites.. These
information are most of contain of user basic identity of the
user. Some sites also take into consideration to allow the user
for their likes and dislikes such as interests, hobbies, favorite‟s
books or films, and even relationship status. Thus, this is not
secure to expose their identity in anywhere in the untrusted
web media. On the basis of literature survey on social media,
we consider two social site that have more similarity identity
in between their personal information and photos which is
overlapping the identity of same user [9]. In recent year, study
has been done on the survey of social media, we analyses near
about 250-300 profile of random user , It was found that 85%
profile having their real identity , and 60% profile giving their
genuine photograph for identification of user via face
recognition system[9][10]. Most of the user had not modify
their basic information (the default setting originally agreed
friends, friends of friends, and non-friends of the similar
network to have full view of a user„s profile). The natural
human being can block the profile of the other user if he don‟t
want, and would therefore come into the picture not to be
usually used for a wide number of people. So that user can‟t
be determine which security feature that they want to use.
Facebook was disapproved due to the perceived tolerance
regarding privacy in the default setting for users. Data sharing
on social network is more flexible .but main important thing is
that data is going to be in secure manner. there is no of feature
in social media for users to partaking messages, invitations,
photos, open dais applications and other applications are often
the platform for others to gain access to a user's private
information. A typical online social web access is give
platform for each user to give up their data over the virtual
space enclosing user shared photos, wall post, user's friend.
With the use of this feature, user not only can upload their
photos but also tag the other photos in virtual space of ONSs.
The photo tagging is the important feature in social media that
contain link of each user which are appear in the photo. For
the security of user data, existing system gives indirect
security environment for each user [6]. In this paper, we create
one framework that gives direct security environment for each
user to protect data from such existing issue. We begin by
examining how the lack of multiple random user management
for data sharing in OSNs throughout the security problem can
undermine the protection of user data [2]. The project work
find out challenge, In particular, we have to know the
conceptual study of two fundamental. First, we want to deep
theoretical study of social media like Facebook, twitter and
find out the challenges with respect to user pattern recognition.
Second, we want to over simplify the social media access
2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 312
control mechanism, by analysing the user pattern behaviour as
the same network. At the end of these we have to initiate one
paradigm which can generalise all user problem and give the
user friendly platform to the user [4]. The model can be
instantiated into a Facebook is family of social network, each
with a recognizably different access control mechanism, so
that Facebook is one can be best generalise model to show our
derive implementation over social network.
2. RELATED WORK
Access control for OSNs is still a relatively new research area.
Several access control manage models for OSNs have been
presented. Early access control manage solutions for OSNs
presented trust-based right to use manage encouraged by the
developments of trust and reputation computation in OSNs.
Social networking is research area for social people who are
really in search of what is new.
S. Kruk, S. Grzonkowski introduced a technique is D_FOAF
system. In recent growth of world, each person has sole
identity feature including their basic information working area
.Some credential information is also share via social services.
But such information is more dangerous to exploit in any
where‟s we have not secure identity based management
system. In this identity base management system, solution is
based upon the social services. Structure of the social network
are having access right. So access rights have some identity
base management system which is explain in this paper.
Author recommended that how sensitive information can
protect from malicious user and right to use manage over
OSNs. Finally, the FOAF Real system that implements
presented solutions and utilizes FOAF metadata to allow
exchange of the profile information with other systems. But it
really works on the basis only on the identity base
management system. After this analysis of identity base
management, Carminati et al. gives general working of rule
base system .In this system, user of having unique identity
having large number of data on web pages. Most of the user
want to save their identity information on web pages and other
user can access their information without any privacy concern.
Author presented a right to use manage model for WBSNs
(web-based social networks), where policies are expressed as
constraints on the type, depth, and trust level of alive
relationships [3]. The method for rule access control manage
model which allows the specification of access rules for online
resources. The random number of tasks to be carried out to
enforce right to use manage are shared among three
distinguished actors—namely, the owner of the requested
resource, the subject which requested it, and the social
network management system. B. Carminati, E. Ferrari, and A.
Perego, were gives the method of semi decentralized
mechanism for sharing data contain on social network [3].
Author modify a flexible right to use manage model and a
related enforcement mechanism for controlled sharing of
information in WBSNs. The model and mechanism allows the
specification of access rules for online wealth, where official
users are denoted in terms of the relationship type, depth, and
trust level alive between nodes in the network [3]. Fong et al.
proposed an access manage that formalizes and generalizes
the access control mechanism executed in Facebook,
admitting arbitrary policy vocabularies that are based on
theoretical graph properties [5].Gates described relationship-
based access control manage (ReBAC) as one of new security
paradigms that addresses unique requirements of Web 2.0 [6].
Fong recently formulated this paradigm called a ReBAC
model that bases authorization conclusions on the
relationships between the resource owner and the resource
accessor in an OSN [7]. From the above discussion, main
focus to formulate a representative ReBAC model to capture
the strength of the pattern, that is, agreement decisions are
based on the association between the resource owner and the
resource accessor in a social network maintained by the safety
system [4]. In the above discussion, we examines all the
possible mechanism and formulate one model and mechanism
that is known as access control model for multiple user in
OSNs.
3. MULTI USER ACCESS CONTROL
SPECIFICATION
From base of survey of recent work, we have study the
paradigm of about security challenges in social network. So
that, when the number of user access their user page and wants
to secure their content on profile like post ,comment, image
content sharing and so on , that they have some feature of
access control mechanism [8]. In this project, we show some
feature or characteristics, using this one can secure our
predefine mechanism in social network. The module begin
with their working feature as follows.
3.1 Accessor
If the user X create an account with their basic information.
Now he is accessor of that account. He can access his
information, sending friend request, view request, upload
image and so on. Accessor have the rights to send the image to
another user via request option [12]. Every user in social
network is the accessor of particular account. Each
information and credential info are also can be access by user
on the trust of owner.
3.2 Owner
We simplify the idea of owner like, if user X wants to upload
an image in his account so that user X is owner of the image.
Similarly concept of text, if user X want post any blog or
comment, thus the respective user is owner of that blog or
comment or text [14]. The photo containing the number of
user that are tag to it, it means that all the notification are
directly shown on the wall of tag user.
3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 313
3.3 Stakeholder
If the any user posting an image on wall and tag some friend
.so that user is the owner of that image. And the other friends
are the stakeholder of that image. Any user friend can add the
tag in the any photo and can remove the tag in any photo but
only when granting the permission of owner of that photo [14]
[15]. Owner of the photo have the all the rights to which is
right to share and formulate each user activity track to analyse
the pattern behaviour of the each user.
Fig-1: Multiple stakeholders can shared a content.
3.4 Contributor
If any user wants to post a text or upload the image on same
wall or friend‟s wall, so that user who are posting content is
the contributor of that image, text or content. Contributor have
the rights to post the image on particular user wall ,hence only
respective user friend can see that post via notification to the
user [12]. Contributor play an important role in posting wall‟s
content.
Fig-2: A shared content is published by a contributor
3.6 Disseminator
With the help of this generalization, any user can upload the
image or post the content or text in someone else space
.Another owner friend can share this image or post in his space
with authority of the owner of that image or post.so that this
user called as disseminator of that content [15].
Fig-3: A desseminator Shared other‟s content published by a
contributor
3.7 User Data
The user data is the collection of the datasets containing
information regarding profile of user friend, relationship list
and content sets. User data in OSNs can be organized as a
hierarchical structure, whose leaves represent the instances of
data, and whose in-between nodes represent categorizations of
data, user data, is classified into three types, profile,
relationship and content [12]. The content is further divided
into multiple categories, such as photo, video, note, event,
status, etc.
4. DECISION MAKING SCHEME FOR
MULTIPARTY
Voting scheme is popular concept for decision making in
social media. Encouraged by such a decision-making
mechanism, we recommend a voting scheme to achieve an
effective multiple user conflict determination for social
network. An important feature of the voting mechanism for
conflict resolution is that the decision from each controller is
able to have an effect on the final decision [2]. Our voting
scheme contains two voting mechanisms:
1). Decision Voting
2). Sensitivity Voting.
4.1 Decision Voting
A decision voting (DV) scheme is based on policy evaluation
of social network, where evaluation (E) calculate of the basis
of policy [1],
DV= {0 if evaluation (E) =Deny
DV= {1 if evaluation (E) =Permit
4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 314
Consider that all controllers are equally significant, an
aggregated decision value DV(agg) (choosing a range of 0.00
to 1.00) from multiple controllers with the owner DV(ow), the
contributor DV(cb), and stakeholders DV(st) is calculated with
following equation [1]:
DV (agg) = (DV (ow) + DV (cb) + ∑ DV (st)) × 1/m
i=ss
Where SS is the stakeholder set of the shared data item, and m
is the number of controllers of the shared data item. Controller
of shared data have some significant 1) a different trust level
over the data owner and 2) a different Status value in terms of
co-operative control. Thus, a simplify decision voting scheme
needs to introduce weights, which can be computed by
aggregating trust levels and character values, on different
controllers. Different weights of controllers are essentially
represented by different importance degrees on the aggregated
decision.
4.2 Sensitivity Voting
Sensitivity level (SL) assign to each controller to the shared
data item to reflect her/his privacy concern. Sensitivity score is
more useful to calculate sensitivity level of each user. Voting
decision is made on the basis of user sensitivity score. A
sensitivity score (SC) (in the range from 0.00 to 1.00) for the
data item can be computed based on following equation [8]:
Sc = (SL (ow) + SL (cb) + ∑ SL (st)) × 1/m
i=ss
Note that we can also use a global sensitivity voting scheme
like DV (agg) to compute the Sc.
5. SECURITY ENVIRONMENT IN SOCIAL
NETWORKS
On the basis of survey of social networking, we get some basic
reason to short out the problem which are face by current
social network. Here we discuss the propose method that we
can easily implement in the platform of social network and
secure user pattern behaviour that is recorded in
communication between two user .The methods are likewise
5.1 Secure Massaging
In existing social network like a Facebook. Facebook is most
popular social networking where the number of random user
are online at the same time. Multiple user send a massage to
one another who are in their friend list. When one user send
“hello” to another user, first it received to trusted third party
like Abine. But it‟s more harmful to our private massaging
[17]. If we send any credential information to another user,
any malicious user can attack on it and our information is
leaks. Hence we create one secure chatting where massage
directly goes to sender to receiver via admin of network only.
And our content is secure [14].
5.2 Doc File Attachment
In the recent survey of social network like Facebook, Twitter,
the number of images, content can upload, shared from the one
user to another user .but we can‟t send file in this format like
txt, doc, ppt, hmtl, etc. we provide platform of each user that
he can share and download the file easily [11].
5.3 Automatic Tag
If user post some text, content, or image and want to tag all
friends automatically, then there is no provision in recent
social network [16]. The number of account holder in social
network wants to highlight the content in their friend wall.
Hence we provide automatic tag for image in which that image
directly tag with all friends wall and the each user can see the
wall content which are tag by their friend.
5.4 Time Control
If the user wants to post some content, upload an image and
posting some blog but for some particular time period, each
user set time stamp for content. When user set expiry date and
time for the post.it refers only 24hrs clock time .and post
content, content can automatically remove from friend‟s wall.
This provision is only for securing credential information or
any private blog in their user space.
6. IMPLEMENTATION AND EVALUATION
To inaugurate the probability of access control model and
mechanism, we implemented Social network-based model. It
is implemented on another platform like Authorization
framework model for supporting co-operative Supervision of
shared data. In this project, introduce multiple user
authorization framework platform. Framework exhibit the
security issue which are currently handle this issue by social
network. And the security is major problem which is
overcome by our model .we create one registration platform
for identification of human being not robot. Then he can
upload one profile photo and provide some basic information
for further process. In this project, we execute total five
module. They are as accessor, owner, contributor, stakeholder,
and disseminator [8]. It gives fine strength of user friendly
platform to make very easier to user. Multi-User access
control framework model is deployed as an autonomous
platform of any social network, which is hosted in an Apache
Tomcat application server supporting Java as front end and
MySQL database as a backend. Multi-User authorization
framework model is based on the I Frame external approach,
adopting the Facebook REST-based APIs and supporting
Facebook Mark-up Language (FBML), where Facebook
server acts as an intermediary between users and the
application server. Social network can accept the input from
5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 315
the user and forward to the application model. The application
model server is responsible for the input process recognition
and cumulative management [1].
Fig-4: Control for User Authentication
In the above figure shows that, user first create an account
with basic information. Then login in it with user id and
password. Login user identity and password are case sensitive
.using the each information while login, are save at backend
i.e. MySQL. And run on apache tomcat server.
Fig-5: Framework for Access Control on Sharing an Image
In above figure, user can upload an image to his wall and after
uploading an image we set some policy and look up to privacy
concern that our image is secure from other user. Our policy
management and privacy for each image is changing the total
security management of the content as compare to existing
system because we giving the centralise platform for each user
that can sender and receiver are also used to it.
Fig-6: Policy Management and Privacy Setting for Image.
When the user register with basic information, it save the
information to database MySQL. Every pattern behaviour and
performance management of user is represent the activity of
the live user so that data regarding user is store in database and
pattern should be keep with them on every activity log of the
user [4]. The new user can send the request to the existing
user, existing user can view the request for approval. User can
upload the image on wall and set the timestamp to each post
content. And whenever any user friends wants to share that
content on wall ,the request goes to owner of the content on
the wall.
7. CONCLUSIONS AND FUTURE WORK
In this paper, we propose exclusive access control model for
facility of collective management of share data in social
network. We have given the analysis on multiple user on share
data that can secure the identity information from the
malicious user. We have describe here multiple user access
control model on the basis of proof of concept of social
network that can give secure user friendly platform to the
each user and they keep their social data very private on the
network. Our future work, the supervise automated face
recognition model for recognize the face from photo where the
photo containing image of tag user .It is use when tag remove
from photo but content remain in photo , the automated face
recognize the face from photo is more effective.
REFERENCES
[1]. Hongxin Hu, Gail-Joon Ahn and Jan Jorgensen.
“Multiparty Access Control for Online Social Networks:
Model and Mechanisms", IEEE transactions on knowledge
and data engineering, vol. 25, no. 7, July 2013
[2]. S. Kruk, S. Grzonkowski, A. Gzella, T. Woroniecki, and
H. Choi, “D-FOAF: Distributed Identity Management with
Access Rights Delegation,” Proc. Asian Semantic Web Conf.
(ASWC), pp. 140-154, 2006.
[3]. B. Carminati, E. Ferrari, and A. Perego, “Rule-Based
Access Control for Social Networks,” Proc. Int‟l Conf. On the
Move to Meaningful Internet Systems, pp. 1734-1744, 2006.
[4]. B. Carminati, E. Ferrari, and A. Perego, “Enforcing
Access Control in Web-Based Social Networks,” ACM Trans.
6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 316
Information and System Security, vol. 13, no. 1, pp. 1-38,
2009.
[5]. P. Fong, M. Anwar, and Z. Zhao, “A Privacy Preservation
Model for Facebook-Style Social Network Systems,” Proc.
14th European Conf. Research in Computer Security, pp. 303-
320, 2009.
[6]. E. Carrie, “Access Control Requirements for Web 2.0
Security and Privacy,” Proc. Workshop Web 2.0 Security &
Privacy (W2SP), 2007.
[7]. P. Fong, “Relationship-Based Access Control: Protection
Model and Policy Language,” Proc. First ACM Conf. Data
and Application Security and Privacy, pp. 191-202, 2011.
[8]. H. Hu and G. Ahn, “Multiparty Authorization Framework
for Data Sharing in Online Social Networks,” Proc. 25th Ann.
IFIP WG 11.3 Conf. Data and Applications Security and
Privacy, pp. 29-43, 2011.
[9]. H. Hu, G.-J. Ahn, and J. Jorgensen, “Enabling
Collaborative Data Sharing in Google+. Technical
ReportASU-SCIDSE-12-1,
http:// sefcom.asu.edu/MUC/MUC+.pdf, Apr. 2012
[10]. H. Hu, G.-J. Ahn, and K. Kulkarni, “Detecting and
Resolving Firewall Policy Anomalies,” IEEE Trans.
Dependable and Secure Computing, vol. 9, no. 3, pp. 318-331,
May 2012.
[11]. Facebook developer, http://developers.facebook.com/,
2013.
[12]. Facebook Privacy policy,
http://www.facebook.com/policy. Php/, 2013.
[13]. Facebook Statistics,
http://www.facebook.com/press/info. Php? Statistics, 2013.
[14]. Google+ Privacy Policy,
http://http://www.google.com/intl/ en/+/policy/, 2013.
[15]. The Google+ Project,
https://plus.google.com, 2013.
[16]. Social Network Techniques,
http://www.alltechbuzz.net/2013/11/tag-all-your-friends-in-
single-click.html
[17]. Chat Encryption,
http://abine.com/facebookFAQ.php/,2013.