SlideShare a Scribd company logo
www.ijmer.com

International Journal of Modern Engineering Research (IJMER)
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2808-2812
ISSN: 2249-6645

An Access Control Model for Collaborative Management of
Shared Data in OSNS
Ch. Aruna1, G. Minni2
1

M.Tech, Nimra College of Engineering & Technology, Vijayawada, A.P., India.
Asst. Professor, Dept.of CSE, Nimra College of Engineering & Technology, Vijayawada, A.P., India.

2

ABSTRACT: Online social networks (OSNs) have attracted a large amount of users to regularly connect, interact and
share information with each other for various purposes. Users share a tremendous amount of content with other users in
social networks using various services. The recent growth of social network sites such as Twitter, Facebook and MySpace
has created many interesting and challenging security and privacy problems. In OSNs, users manage their profile, interact
with other users, and selforganize into different communities. Users profiles usually include information such as the user’s
name, address, birthdate, contact information, emails, education, interests, photos, music, videos, blogs and many other
attributes The explosive growth of private or sensitive user data that are readily available in OSNs has raised an urgent
expectation for effective access control that can protect these data from unauthorized users in OSNs. This paper presents an
access control model for the protection of shared data associated with multiple users in online social networks.

Keywords: Access control, MController, OSN, Privacy.
I.

INTRODUCTION

Online social networks (OSNs) serve a number of purposes, but three primary roles stand out as common across all
sites. First, OSNs are used to maintain and strengthen existing social ties, or make new social connections. The sites allow
users to “articulate and make visible their online social networks”, thereby “communicating with people who are already a
part of their extended social network” [1]. Second, OSNs are used by each member to upload her own content. Note that the
content shared often varies from site to site, and sometimes is only the user’s profile itself. Third, OSNs are used to find new,
interesting content by filtering, recommending, and organizing the content uploaded by users.
Full participation in OSNs requires users to register a (pseudo) identity with the network, though some sites do
allow browsing public data without explicit sign-on. Users may volunteer information about themselves, for example their
birthday, place of residence, interests, etc., all of which constitutes the user’s profile. The online social network itself is
composed of links between users. Some sites allow users to link to any other user, without consent from the link recipient,
while other sites follow a two-phase procedure that only allows a link to be established when both parties agree. Certain
sites, such as Flickr, have social networks with directed links- meaning a link from A to B does not imply the presence of a
reverse link, whereas others, such as Orkut, have social networks with undirected links. Most sites also enable users to create
special interest groups, which are akin to Usenet [2] newsgroups. Users can post messages to groups (visible to all group
members) and even upload shared content to that group. Certain groups are moderated, and admission to the group is
controlled by a single group administrator, while other groups are open for any member to join. All sites today require
explicit group declaration by the users; users must manually create groups, appoint administrators (if necessary), and declare
which groups they are a member of.
Once an identity is built, users of content sharing sites can upload content onto their account. Many such online
sites enable users to mark content as public (visible to anyone) or private (visible only to their immediate “friends”), and to
tag content with labels. Many sites, such as YouTube, allow users to upload an unlimited amount of video content, while
other sites, such as Flickr, require that users either pay a subscription fee or be subject to an upload limit. All of the content
uploaded by a given user is listed in their user’s profile, allowing other users to browse through the social network to
discover new content. Typically, the content is automatically indexed, and, if publicly available, made accessible though a
textual search. An example is Flickr’s photo search, which allows the users to locate photos by searching based on tags and
comments.

II.

RELATED WORK

Several studies have examined the interface design to support user awareness of the privacy risks and algorithms for
relationship-based access-control scheme. In [3], the authors presented a social-networking-based access-control scheme for
online information sharing by considering identities as key pairs and identifying the social relationship based on social
attestations. Under this approach, a simple access-control list is employed to manage user access. A more sophisticated
mechanism to manage access controls in [4], is rule- based and follows complex policies that are expressed as constraints on
the type, depth, and trust level of existing relationships. This control methods is further extended by making access-control
decisions completely decentralized and collaborative [5].
In [6], the authors introduced a conceptually-similar but more comprehensive trust-based access control model. This
model allows the specification of access rules for online resources, where legitimate users are denoted in terms of the
relationship type, depth, and trust level between users in OSNs. In [7], the authors proposed an access control model that
formalizes and generalizes the access control mechanism implemented in Facebook, admitting arbitrary policy vocabularies
that are based on theoretical graph properties. In [8], the authors described relationship-based access control as one of new
security paradigms that addresses unique requirements of Web 2.0. In [9], the authors provided a solution for collective
www.ijmer.com

2808 | Page
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2808-2812
ISSN: 2249-6645
privacy management in OSNs. Their work considered access control policies of a data content that is co-owned by multiple
users in an OSN, such that each co-owner may separately specify her/his own privacy preference for the shared content.

III.

MULTIPARTY ACCESS CONTROL MODEL FOR OSNS

A. Multi party Access Control Model
A social network can be represented by a relationship network, a set of user groups and a collection of user data
(Figure 1). The relationship network of a social network is a directed labeled graph, where each node denotes a user and each
edge represents a relationship between two users. The label associated with each edge represents the type of the relationship.
Edge direction denotes that the initial node of an edge establishes the relationship and the terminal node of the edge accepts
that relationship. The number and type of supported relationships rely on the specific social network and its purposes. Social
network should allow multiple controllers, who are associated with the shared data, to specify access control policies. In
addition to the owner of data, other controllers, including the stakeholder, contributor and disseminator of data, need to
regulate the access of the shared data as well.

Figure 1: An Example of Multiparty Social Network Representation
B. MPAC Policy specification
To enable a collaborative authorization management of data sharing in OSNs, it is essential for multiparty access
control policies to be in place to regulate access over shared data, representing authorization requirements from multiple
associated users. Our policy specification scheme is built upon the proposed MPAC model.
Accessor Specification: Accessors are a set of users who are granted to access the shared data. Accessors can be represented
with a set of user names, a set of relationship names or a set of group names in OSNs.
Data Specification: In OSNs, user data is composed of three types of information, user profile, user relationship and user
content. To facilitate effective privacy conflict resolution for multiparty access control, we introduce sensitivity levels for
data specification, which are assigned by the controllers to the shared data items. A user’s judgment of the sensitivity level of
the data is not binary (private/public), but multi-dimensional with varying degrees of sensitivity.
Access Control Policy: To summarize the above-mentioned policy elements, we introduce the definition of a multiparty
access control policy as follows:
A multiparty access control policy is a 5-tuple P =< controller; ctype; accessor; data; effect >, where
 controller  U is a user who can regulate the access
 of data;
 ctype  CT is the type of the controller;
 accessor is a set of users to whom the authorization
 is granted, representing with an access specification.
 data is represented with a data specification and
 effect  {permit; deny} is the authorization effect of the policy.
C. Multiparty Policy Evaluation
Two steps are performed to evaluate an access request over multi- party access control policies. The first one checks
the access request against the policy specified by each controller and yields a decision for the controller. The accessor
element in a policy decides whether that policy is applicable to a request. If the user who sends the request belongs to the
user set derived from the accessor of the policy, the policy is applicable and the evaluation process returns a response with
the decision (either permit or deny) indicated by the effect element in the policy. Otherwise, the response yields deny
decision if the policy is not applicable to that request. In the second one, decisions from all controllers responding to the
access request are aggregated to make a final decision for the access request. Figure 2 illustrates the evaluation process of
multi- party access control policies.

www.ijmer.com

2809 | Page
www.ijmer.com

International Journal of Modern Engineering Research (IJMER)
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2808-2812
ISSN: 2249-6645

Figure 2: Multiparty Policy Evaluation Process

IV.

IMPLEMENTATION OF MCONTROLLER

In our proposed work, we present an application called “MController” for supporting collaborative management of
shared data. It enables multiple associated users to specify their access control policies and privacy preferences to co-control
a shared data item. Consider the social network “Facebook”. Facebook server accepts inputs from the users, and then
forwards them to the application server. The application server is responsible for the input processing and the collaborative
management of the shared data. Information related to the user data such as friend lists, user identifiers, user groups, and user
contents are stored in the MySQL database. Once the user installs MController in his/her Facebook space, MController can
access user’s basic information and contents. In particular, MController can retrieve and list all the uploaded photos, which
are owned or uploaded by the user, or where the user was tagged. Then, the user can select any photo to specify his/hery
preference. If the user is not the owner of the selected photo, then he/she only edit the privacy setting and sensitivity setting
of the photo. Otherwise, if the user is an owner of the photo, then he/she can further configure the conflict resolution
mechanism for the shared photo.
The core component of MController is the decision making module, which processes access requests and then
returns responses (either permit or deny) for the requests. Figure 3 depicts the system architecture of the decision making
module in MController. To evaluate an access request, the control policies of each controller of the targeted content are
enforced first to generate a decision for the Mcontroller. Then, the decisions of all of the controllers are aggregated to yield a
final decision as the response to that request. During the process of decision making, policy conflicts are resolved when
evaluating the controllers’ policies by adopting a strategy chain pre-defined by the controllers.

Figure 3: System Architecture of Decision Making in MController

www.ijmer.com

2810 | Page
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2808-2812
ISSN: 2249-6645
In addition, multi- party privacy conflicts are also resolved based on the configured conflict resolution method when
aggregating the decisions of controllers. If the owner of the content chooses the automatic conflict resolution, then the
aggregated sensitivity value is utilized as a threshold for making a decision. Otherwise, multi- party privacy conflicts are
resolved by applying the strategy selected by the owner, and the aggregated sensitivity score is considered as the
recommendation for that strategy selection. Regarding access requests to the disseminated contents, the final decision is
made by combining the disseminator’s decision and the original controllers’ decision through a deny-overrides combination
mechanism.

V.

SYSTEM USABILITY AND PERFORMANCE EVALUATION

A. Participants and Procedure
MController is a functional proof-of-concept implementation of collaborative privacy management. To measure the
practicality and usability of our mechanism, we conducted a survey study (n=35) to explore the factors surrounding users’
desires for privacy and discover how we might improve those implemented in MController. Specifically, we were interested
in users’ perspectives on the current Facebook privacy system and their desires for more control over photos they do not
own. Users were given the opportunity to share our application and play with their friends. While this is not a random
sampling, recruiting using the natural dissemination features of Facebook arguably gives an accurate profile of the
ecosystem. Before Using MController. Prior to using MController, users were asked a few questions about their usage of
Facebook to determine the user’s perceived usability of the current Facebook privacy controls. Since we were interested in
the maximum average perception of Facebook, we looked at the upper bound of the confidence interval. An average user
asserts at most 25% positively about the likability and control of Facebook’s privacy management mechanism, and at most
44% on Facebook’s simplicity as shown in Table 1. This demonstrates an average negative opinion of the Facebook’s
privacy controls that users currently must use.
TABLE 1
Usability Evaluation for Facebook and MController Privacy Controls
Facebook
Metric

Linkability
Simplicity
Control

Average

0.20
0.38
0.20

Upper
bound on
95%
confidence
interval
0.25
0.44
0.25

MController
Lower
bound on
Average 95%
confidence
interval
0.83
0.80
0.72
0.64
0.83
0.80

After Using MController, users were then asked to perform a few tasks in MController. Since we were interested in
the average minimum opinion of MController, we looked at the lower bound of the confidence interval. An average user
asserts at least 80% positively about the likability and control, and at least 67% positively on MController’s simplicity as
shown in Table 1. This demonstrates an average positive opinion of the controls and ideas presented to users in MController.
B. Performance Evaluation
To evaluate the performance of the policy evaluation mechanism in MController, we changed the number of the
controllers of a shared photo from 1 to 20, and assigned each controller with the average number of friends, 130, which is
claimed by Facebook statistics. Also, we considered two cases for our evaluation. In the first case, each controller allows
“friends” to access the shared photo. In the second case, controllers specify “friends of friends” as the accessors instead of
“friends”. In our experiments, we performed 1,000 independent trials and measured the performance of each trial. Since the
system performance depends on other There are O(n) MySQL calls and data fetching operations and O(1) for additional
operations. Moreover, we could observe there was no significant overhead when we run MController in Facebook.

VI.

CONCLUSION

Although social networks attempt to improve security and privacy, they have not achieved the complete or ideal
access control mechanisms that users actually demand. In current social networks, individual users can choose different
preferences, causing privacy conflicts in shared information that multiple users co- own. In this paper, we have proposed an
optimal solution for collaborative management of shared data in OSNs. A multi- party access control model was formulated,
along with a multi- party policy specification scheme and corresponding policy evaluation method. In addition, we have
introduced an approach for representing and reasoning about our proposed method. A proof-of-concept implementation of
our solution called “MController” has been discussed as well, followed by the usability study and system evaluation of our
proposed method.

www.ijmer.com

2811 | Page
www.ijmer.com

International Journal of Modern Engineering Research (IJMER)
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2808-2812
ISSN: 2249-6645

REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]

Danah boyd and Nicole B. Ellison. Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated
Communication, 13(1), 2007.
Bryan Pfaffenberger. The USENET Book: Finding, Using, and Surviving News- groups on the Internet. Addison Wesley, New
York, NY, USA, 2004.
Kiran K. Gollu, Stefan Saroiu, & Alec Wolman. (2007, October). A Social Networking-Based Access Control Scheme for Personal
Content Proc. 21st ACM Symposium on Operating Systems Principles (SOSP ’07), Stevenson,Washington. (WIP)
Carminati, B., Ferrari, E., & Perego, A. (2006, October). Rule-based access control for social networks. Paper presented at the On
the Move to Meaningful Internet SystemsWorkshops.
Carminati, B., & Ferrari, E. (2008, October). Privacy-aware collaborative access control in Web-based social networks. Paper
presented at the 22nd annual IFIPWorking Group 11.3Working Conference on Data and Applications Security, London, UK.
B. Carminati, E. Ferrari, and A. Perego. Rule-based access control for social networks. In On the Move to Meaningful Internet
Systems 2006: OTM 2006 Workshops, pages 1734–1744. Springer, 2006.
P. Fong, M. Anwar, and Z. Zhao. A privacy preservation model for facebook-style social network systems. In Proceedings of the
14th European conference on Research in computer security, pages 303–320. Springer-Verlag, 2009.
E. Carrie. Access Control Requirements for Web 2.0 Security and Privacy. In Proc. of Workshop on Web 2.0 Security & Privacy
(W2SP). Citeseer, 2007.
A. Squicciarini, M. Shehab, and F. Paci. Collective privacy management in social networks. In Proceedings of the 18th
international conference on World wide web, pages 521–530. ACM, 2009.

www.ijmer.com

2812 | Page

More Related Content

What's hot

Kt3518501858
Kt3518501858Kt3518501858
Kt3518501858
IJERA Editor
 
Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...
Anil Dhami
 
Mdia5003 assignment4 metadata
Mdia5003 assignment4 metadataMdia5003 assignment4 metadata
Mdia5003 assignment4 metadata
vivianhgray
 
Social Messaging Solution Matrix
Social Messaging Solution MatrixSocial Messaging Solution Matrix
Social Messaging Solution Matrix
N:Sight Research GmbH
 
Social Tagging Of Multimedia Content A Model
Social Tagging Of Multimedia Content A ModelSocial Tagging Of Multimedia Content A Model
Social Tagging Of Multimedia Content A Model
IJMER
 
Next generation web
Next generation webNext generation web
Next generation web
Dr. Ayman Ghabayen
 
Conor Hayes - Topics, tags and trends in the blogosphere
Conor Hayes - Topics, tags and trends in the blogosphereConor Hayes - Topics, tags and trends in the blogosphere
Conor Hayes - Topics, tags and trends in the blogosphere
DERIGalway
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
CSCJournals
 
Privacy Management and the Social Web
Privacy Management and the Social Web Privacy Management and the Social Web
Privacy Management and the Social Web
Jan Schmidt
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
Zac Darcy
 
Spammer taxonomy using scientific approach
Spammer taxonomy using scientific approachSpammer taxonomy using scientific approach
Spammer taxonomy using scientific approach
Kamoru Abiodun Balogun(Bsc,MIT,CCNA,OCA,PhD inview UPM)
 
Measuring privacy in online social
Measuring privacy in online socialMeasuring privacy in online social
Measuring privacy in online social
ijsptm
 
Blogosphere
BlogosphereBlogosphere
Blogosphere
sunilbandla
 
Jill Freyne - Collecting community wisdom: integrating social search and soci...
Jill Freyne - Collecting community wisdom: integrating social search and soci...Jill Freyne - Collecting community wisdom: integrating social search and soci...
Jill Freyne - Collecting community wisdom: integrating social search and soci...
DERIGalway
 
Paper24
Paper24Paper24
Content tagging and recommender systems
Content tagging and recommender systemsContent tagging and recommender systems
Content tagging and recommender systems
mettadata
 
Social Information & Browsing March 6
Social Information & Browsing   March 6Social Information & Browsing   March 6
Social Information & Browsing March 6
sritikumar
 
Characterization of facebook users
Characterization of facebook usersCharacterization of facebook users
Characterization of facebook users
Debesh Majumdar
 

What's hot (18)

Kt3518501858
Kt3518501858Kt3518501858
Kt3518501858
 
Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...
 
Mdia5003 assignment4 metadata
Mdia5003 assignment4 metadataMdia5003 assignment4 metadata
Mdia5003 assignment4 metadata
 
Social Messaging Solution Matrix
Social Messaging Solution MatrixSocial Messaging Solution Matrix
Social Messaging Solution Matrix
 
Social Tagging Of Multimedia Content A Model
Social Tagging Of Multimedia Content A ModelSocial Tagging Of Multimedia Content A Model
Social Tagging Of Multimedia Content A Model
 
Next generation web
Next generation webNext generation web
Next generation web
 
Conor Hayes - Topics, tags and trends in the blogosphere
Conor Hayes - Topics, tags and trends in the blogosphereConor Hayes - Topics, tags and trends in the blogosphere
Conor Hayes - Topics, tags and trends in the blogosphere
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
 
Privacy Management and the Social Web
Privacy Management and the Social Web Privacy Management and the Social Web
Privacy Management and the Social Web
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
 
Spammer taxonomy using scientific approach
Spammer taxonomy using scientific approachSpammer taxonomy using scientific approach
Spammer taxonomy using scientific approach
 
Measuring privacy in online social
Measuring privacy in online socialMeasuring privacy in online social
Measuring privacy in online social
 
Blogosphere
BlogosphereBlogosphere
Blogosphere
 
Jill Freyne - Collecting community wisdom: integrating social search and soci...
Jill Freyne - Collecting community wisdom: integrating social search and soci...Jill Freyne - Collecting community wisdom: integrating social search and soci...
Jill Freyne - Collecting community wisdom: integrating social search and soci...
 
Paper24
Paper24Paper24
Paper24
 
Content tagging and recommender systems
Content tagging and recommender systemsContent tagging and recommender systems
Content tagging and recommender systems
 
Social Information & Browsing March 6
Social Information & Browsing   March 6Social Information & Browsing   March 6
Social Information & Browsing March 6
 
Characterization of facebook users
Characterization of facebook usersCharacterization of facebook users
Characterization of facebook users
 

Viewers also liked

Water damage NYC
Water damage NYCWater damage NYC
Water damage NYC
Rancyna James
 
Ijmer 46051622
Ijmer 46051622Ijmer 46051622
Ijmer 46051622
IJMER
 
Bk32816820
Bk32816820Bk32816820
Bk32816820
IJMER
 
Eb3212531255
Eb3212531255Eb3212531255
Eb3212531255
IJMER
 
Bj31204211
Bj31204211Bj31204211
Bj31204211
IJMER
 
Am318385
Am318385Am318385
Am318385
IJMER
 
Finite Element Analysys of Heat Exchanger
Finite Element Analysys of Heat ExchangerFinite Element Analysys of Heat Exchanger
Finite Element Analysys of Heat Exchanger
IJMER
 
PROGRAMA VIII ENCUENTRO DE CONSERVATORIOS
PROGRAMA VIII ENCUENTRO DE CONSERVATORIOSPROGRAMA VIII ENCUENTRO DE CONSERVATORIOS
PROGRAMA VIII ENCUENTRO DE CONSERVATORIOS
Ricardo Vega Gonzalez
 
An Experimental Analysis of Performance, Combustion and Emission Characteris...
An Experimental Analysis of Performance, Combustion and  Emission Characteris...An Experimental Analysis of Performance, Combustion and  Emission Characteris...
An Experimental Analysis of Performance, Combustion and Emission Characteris...
IJMER
 
Impact and Dynamics of Centralization in Transportation Cost of Cement Bag’s ...
Impact and Dynamics of Centralization in Transportation Cost of Cement Bag’s ...Impact and Dynamics of Centralization in Transportation Cost of Cement Bag’s ...
Impact and Dynamics of Centralization in Transportation Cost of Cement Bag’s ...
IJMER
 
E04012533
E04012533E04012533
E04012533
IJMER
 
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sBlack Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
IJMER
 
Accelerometer and EOG Based Wireless Gesture Controlled Robotic Arm
Accelerometer and EOG Based Wireless Gesture Controlled Robotic ArmAccelerometer and EOG Based Wireless Gesture Controlled Robotic Arm
Accelerometer and EOG Based Wireless Gesture Controlled Robotic Arm
IJMER
 
Swarm Intelligence: An Application of Ant Colony Optimization
Swarm Intelligence: An Application of Ant Colony OptimizationSwarm Intelligence: An Application of Ant Colony Optimization
Swarm Intelligence: An Application of Ant Colony Optimization
IJMER
 
Digital Citizenship Webquest
Digital Citizenship WebquestDigital Citizenship Webquest
Digital Citizenship Webquest
mdonel
 
Smiling fish
Smiling fishSmiling fish
Smiling fish
zdd19890823
 
Analysis of MOS Capacitor Loaded Annular Ring MICROSTRIP Antenna
Analysis of MOS Capacitor Loaded Annular Ring MICROSTRIP  AntennaAnalysis of MOS Capacitor Loaded Annular Ring MICROSTRIP  Antenna
Analysis of MOS Capacitor Loaded Annular Ring MICROSTRIP Antenna
IJMER
 
Db3210821087
Db3210821087Db3210821087
Db3210821087
IJMER
 
Bu31284290
Bu31284290Bu31284290
Bu31284290
IJMER
 
Τα δικαιώματα του παιδιού
Τα δικαιώματα του παιδιούΤα δικαιώματα του παιδιού
Τα δικαιώματα του παιδιού
Popi Kaza
 

Viewers also liked (20)

Water damage NYC
Water damage NYCWater damage NYC
Water damage NYC
 
Ijmer 46051622
Ijmer 46051622Ijmer 46051622
Ijmer 46051622
 
Bk32816820
Bk32816820Bk32816820
Bk32816820
 
Eb3212531255
Eb3212531255Eb3212531255
Eb3212531255
 
Bj31204211
Bj31204211Bj31204211
Bj31204211
 
Am318385
Am318385Am318385
Am318385
 
Finite Element Analysys of Heat Exchanger
Finite Element Analysys of Heat ExchangerFinite Element Analysys of Heat Exchanger
Finite Element Analysys of Heat Exchanger
 
PROGRAMA VIII ENCUENTRO DE CONSERVATORIOS
PROGRAMA VIII ENCUENTRO DE CONSERVATORIOSPROGRAMA VIII ENCUENTRO DE CONSERVATORIOS
PROGRAMA VIII ENCUENTRO DE CONSERVATORIOS
 
An Experimental Analysis of Performance, Combustion and Emission Characteris...
An Experimental Analysis of Performance, Combustion and  Emission Characteris...An Experimental Analysis of Performance, Combustion and  Emission Characteris...
An Experimental Analysis of Performance, Combustion and Emission Characteris...
 
Impact and Dynamics of Centralization in Transportation Cost of Cement Bag’s ...
Impact and Dynamics of Centralization in Transportation Cost of Cement Bag’s ...Impact and Dynamics of Centralization in Transportation Cost of Cement Bag’s ...
Impact and Dynamics of Centralization in Transportation Cost of Cement Bag’s ...
 
E04012533
E04012533E04012533
E04012533
 
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sBlack Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
 
Accelerometer and EOG Based Wireless Gesture Controlled Robotic Arm
Accelerometer and EOG Based Wireless Gesture Controlled Robotic ArmAccelerometer and EOG Based Wireless Gesture Controlled Robotic Arm
Accelerometer and EOG Based Wireless Gesture Controlled Robotic Arm
 
Swarm Intelligence: An Application of Ant Colony Optimization
Swarm Intelligence: An Application of Ant Colony OptimizationSwarm Intelligence: An Application of Ant Colony Optimization
Swarm Intelligence: An Application of Ant Colony Optimization
 
Digital Citizenship Webquest
Digital Citizenship WebquestDigital Citizenship Webquest
Digital Citizenship Webquest
 
Smiling fish
Smiling fishSmiling fish
Smiling fish
 
Analysis of MOS Capacitor Loaded Annular Ring MICROSTRIP Antenna
Analysis of MOS Capacitor Loaded Annular Ring MICROSTRIP  AntennaAnalysis of MOS Capacitor Loaded Annular Ring MICROSTRIP  Antenna
Analysis of MOS Capacitor Loaded Annular Ring MICROSTRIP Antenna
 
Db3210821087
Db3210821087Db3210821087
Db3210821087
 
Bu31284290
Bu31284290Bu31284290
Bu31284290
 
Τα δικαιώματα του παιδιού
Τα δικαιώματα του παιδιούΤα δικαιώματα του παιδιού
Τα δικαιώματα του παιδιού
 

Similar to An Access Control Model for Collaborative Management of Shared Data in OSNS

Intelligent access control policies for Social network site
Intelligent access control policies for Social network siteIntelligent access control policies for Social network site
Intelligent access control policies for Social network site
ijcsit
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Editor IJCATR
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Editor IJCATR
 
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
IRJET Journal
 
Ijcatr04041017
Ijcatr04041017Ijcatr04041017
Ijcatr04041017
Editor IJCATR
 
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Privacy Management of Multi User Environment in Online Social Networks (OSNs)Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
IOSR Journals
 
Privacy Protection Using Formal Logics in Onlne Social Networks
Privacy Protection Using   Formal Logics in Onlne Social NetworksPrivacy Protection Using   Formal Logics in Onlne Social Networks
Privacy Protection Using Formal Logics in Onlne Social Networks
IRJET Journal
 
Implementation of Privacy Policy Specification System for User Uploaded Image...
Implementation of Privacy Policy Specification System for User Uploaded Image...Implementation of Privacy Policy Specification System for User Uploaded Image...
Implementation of Privacy Policy Specification System for User Uploaded Image...
rahulmonikasharma
 
A Survey on Multi-party Privacy Disputes in Social Networks
A Survey on Multi-party Privacy Disputes in Social NetworksA Survey on Multi-party Privacy Disputes in Social Networks
A Survey on Multi-party Privacy Disputes in Social Networks
IRJET Journal
 
Collusion-resistant multiparty data sharing in social networks
Collusion-resistant multiparty data sharing in social networksCollusion-resistant multiparty data sharing in social networks
Collusion-resistant multiparty data sharing in social networks
IJECEIAES
 
Detecting and Providing Solutions to Privacy Issues in Social Media
Detecting and Providing Solutions to Privacy Issues in Social MediaDetecting and Providing Solutions to Privacy Issues in Social Media
Detecting and Providing Solutions to Privacy Issues in Social Media
IRJET Journal
 
Detecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social NetworksDetecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social Networks
IRJET Journal
 
Scalable Access Control For Privacy-Aware Media Sharing.pdf
Scalable Access Control For Privacy-Aware Media Sharing.pdfScalable Access Control For Privacy-Aware Media Sharing.pdf
Scalable Access Control For Privacy-Aware Media Sharing.pdf
Xevol1
 
Social Networking Websites and Image Privacy
Social Networking Websites and Image PrivacySocial Networking Websites and Image Privacy
Social Networking Websites and Image Privacy
IOSR Journals
 
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijripublishers Ijri
 
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...
cscpconf
 
An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...
An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...
An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...
Rick Vogel
 
Introduction of Social Computing-Unit 1.pptx
Introduction of Social Computing-Unit 1.pptxIntroduction of Social Computing-Unit 1.pptx
Introduction of Social Computing-Unit 1.pptx
chavanprasad17092001
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Kiran K.V.S.
 

Similar to An Access Control Model for Collaborative Management of Shared Data in OSNS (20)

Intelligent access control policies for Social network site
Intelligent access control policies for Social network siteIntelligent access control policies for Social network site
Intelligent access control policies for Social network site
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
 
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
 
Ijcatr04041017
Ijcatr04041017Ijcatr04041017
Ijcatr04041017
 
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Privacy Management of Multi User Environment in Online Social Networks (OSNs)Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
 
Privacy Protection Using Formal Logics in Onlne Social Networks
Privacy Protection Using   Formal Logics in Onlne Social NetworksPrivacy Protection Using   Formal Logics in Onlne Social Networks
Privacy Protection Using Formal Logics in Onlne Social Networks
 
Implementation of Privacy Policy Specification System for User Uploaded Image...
Implementation of Privacy Policy Specification System for User Uploaded Image...Implementation of Privacy Policy Specification System for User Uploaded Image...
Implementation of Privacy Policy Specification System for User Uploaded Image...
 
A Survey on Multi-party Privacy Disputes in Social Networks
A Survey on Multi-party Privacy Disputes in Social NetworksA Survey on Multi-party Privacy Disputes in Social Networks
A Survey on Multi-party Privacy Disputes in Social Networks
 
Collusion-resistant multiparty data sharing in social networks
Collusion-resistant multiparty data sharing in social networksCollusion-resistant multiparty data sharing in social networks
Collusion-resistant multiparty data sharing in social networks
 
Detecting and Providing Solutions to Privacy Issues in Social Media
Detecting and Providing Solutions to Privacy Issues in Social MediaDetecting and Providing Solutions to Privacy Issues in Social Media
Detecting and Providing Solutions to Privacy Issues in Social Media
 
Detecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social NetworksDetecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social Networks
 
Scalable Access Control For Privacy-Aware Media Sharing.pdf
Scalable Access Control For Privacy-Aware Media Sharing.pdfScalable Access Control For Privacy-Aware Media Sharing.pdf
Scalable Access Control For Privacy-Aware Media Sharing.pdf
 
Social Networking Websites and Image Privacy
Social Networking Websites and Image PrivacySocial Networking Websites and Image Privacy
Social Networking Websites and Image Privacy
 
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
 
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...
 
An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...
An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...
An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...
 
Introduction of Social Computing-Unit 1.pptx
Introduction of Social Computing-Unit 1.pptxIntroduction of Social Computing-Unit 1.pptx
Introduction of Social Computing-Unit 1.pptx
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.
 

More from IJMER

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
IJMER
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
IJMER
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
IJMER
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
IJMER
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
IJMER
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
IJMER
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
IJMER
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
IJMER
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
IJMER
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
IJMER
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
IJMER
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
IJMER
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
IJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
IJMER
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
IJMER
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
IJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
IJMER
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
IJMER
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
IJMER
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
IJMER
 

More from IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 

Recently uploaded

Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
Edge AI and Vision Alliance
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 

Recently uploaded (20)

Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
Artificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic WarfareArtificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic Warfare
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 

An Access Control Model for Collaborative Management of Shared Data in OSNS

  • 1. www.ijmer.com International Journal of Modern Engineering Research (IJMER) Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2808-2812 ISSN: 2249-6645 An Access Control Model for Collaborative Management of Shared Data in OSNS Ch. Aruna1, G. Minni2 1 M.Tech, Nimra College of Engineering & Technology, Vijayawada, A.P., India. Asst. Professor, Dept.of CSE, Nimra College of Engineering & Technology, Vijayawada, A.P., India. 2 ABSTRACT: Online social networks (OSNs) have attracted a large amount of users to regularly connect, interact and share information with each other for various purposes. Users share a tremendous amount of content with other users in social networks using various services. The recent growth of social network sites such as Twitter, Facebook and MySpace has created many interesting and challenging security and privacy problems. In OSNs, users manage their profile, interact with other users, and selforganize into different communities. Users profiles usually include information such as the user’s name, address, birthdate, contact information, emails, education, interests, photos, music, videos, blogs and many other attributes The explosive growth of private or sensitive user data that are readily available in OSNs has raised an urgent expectation for effective access control that can protect these data from unauthorized users in OSNs. This paper presents an access control model for the protection of shared data associated with multiple users in online social networks. Keywords: Access control, MController, OSN, Privacy. I. INTRODUCTION Online social networks (OSNs) serve a number of purposes, but three primary roles stand out as common across all sites. First, OSNs are used to maintain and strengthen existing social ties, or make new social connections. The sites allow users to “articulate and make visible their online social networks”, thereby “communicating with people who are already a part of their extended social network” [1]. Second, OSNs are used by each member to upload her own content. Note that the content shared often varies from site to site, and sometimes is only the user’s profile itself. Third, OSNs are used to find new, interesting content by filtering, recommending, and organizing the content uploaded by users. Full participation in OSNs requires users to register a (pseudo) identity with the network, though some sites do allow browsing public data without explicit sign-on. Users may volunteer information about themselves, for example their birthday, place of residence, interests, etc., all of which constitutes the user’s profile. The online social network itself is composed of links between users. Some sites allow users to link to any other user, without consent from the link recipient, while other sites follow a two-phase procedure that only allows a link to be established when both parties agree. Certain sites, such as Flickr, have social networks with directed links- meaning a link from A to B does not imply the presence of a reverse link, whereas others, such as Orkut, have social networks with undirected links. Most sites also enable users to create special interest groups, which are akin to Usenet [2] newsgroups. Users can post messages to groups (visible to all group members) and even upload shared content to that group. Certain groups are moderated, and admission to the group is controlled by a single group administrator, while other groups are open for any member to join. All sites today require explicit group declaration by the users; users must manually create groups, appoint administrators (if necessary), and declare which groups they are a member of. Once an identity is built, users of content sharing sites can upload content onto their account. Many such online sites enable users to mark content as public (visible to anyone) or private (visible only to their immediate “friends”), and to tag content with labels. Many sites, such as YouTube, allow users to upload an unlimited amount of video content, while other sites, such as Flickr, require that users either pay a subscription fee or be subject to an upload limit. All of the content uploaded by a given user is listed in their user’s profile, allowing other users to browse through the social network to discover new content. Typically, the content is automatically indexed, and, if publicly available, made accessible though a textual search. An example is Flickr’s photo search, which allows the users to locate photos by searching based on tags and comments. II. RELATED WORK Several studies have examined the interface design to support user awareness of the privacy risks and algorithms for relationship-based access-control scheme. In [3], the authors presented a social-networking-based access-control scheme for online information sharing by considering identities as key pairs and identifying the social relationship based on social attestations. Under this approach, a simple access-control list is employed to manage user access. A more sophisticated mechanism to manage access controls in [4], is rule- based and follows complex policies that are expressed as constraints on the type, depth, and trust level of existing relationships. This control methods is further extended by making access-control decisions completely decentralized and collaborative [5]. In [6], the authors introduced a conceptually-similar but more comprehensive trust-based access control model. This model allows the specification of access rules for online resources, where legitimate users are denoted in terms of the relationship type, depth, and trust level between users in OSNs. In [7], the authors proposed an access control model that formalizes and generalizes the access control mechanism implemented in Facebook, admitting arbitrary policy vocabularies that are based on theoretical graph properties. In [8], the authors described relationship-based access control as one of new security paradigms that addresses unique requirements of Web 2.0. In [9], the authors provided a solution for collective www.ijmer.com 2808 | Page
  • 2. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2808-2812 ISSN: 2249-6645 privacy management in OSNs. Their work considered access control policies of a data content that is co-owned by multiple users in an OSN, such that each co-owner may separately specify her/his own privacy preference for the shared content. III. MULTIPARTY ACCESS CONTROL MODEL FOR OSNS A. Multi party Access Control Model A social network can be represented by a relationship network, a set of user groups and a collection of user data (Figure 1). The relationship network of a social network is a directed labeled graph, where each node denotes a user and each edge represents a relationship between two users. The label associated with each edge represents the type of the relationship. Edge direction denotes that the initial node of an edge establishes the relationship and the terminal node of the edge accepts that relationship. The number and type of supported relationships rely on the specific social network and its purposes. Social network should allow multiple controllers, who are associated with the shared data, to specify access control policies. In addition to the owner of data, other controllers, including the stakeholder, contributor and disseminator of data, need to regulate the access of the shared data as well. Figure 1: An Example of Multiparty Social Network Representation B. MPAC Policy specification To enable a collaborative authorization management of data sharing in OSNs, it is essential for multiparty access control policies to be in place to regulate access over shared data, representing authorization requirements from multiple associated users. Our policy specification scheme is built upon the proposed MPAC model. Accessor Specification: Accessors are a set of users who are granted to access the shared data. Accessors can be represented with a set of user names, a set of relationship names or a set of group names in OSNs. Data Specification: In OSNs, user data is composed of three types of information, user profile, user relationship and user content. To facilitate effective privacy conflict resolution for multiparty access control, we introduce sensitivity levels for data specification, which are assigned by the controllers to the shared data items. A user’s judgment of the sensitivity level of the data is not binary (private/public), but multi-dimensional with varying degrees of sensitivity. Access Control Policy: To summarize the above-mentioned policy elements, we introduce the definition of a multiparty access control policy as follows: A multiparty access control policy is a 5-tuple P =< controller; ctype; accessor; data; effect >, where  controller  U is a user who can regulate the access  of data;  ctype  CT is the type of the controller;  accessor is a set of users to whom the authorization  is granted, representing with an access specification.  data is represented with a data specification and  effect  {permit; deny} is the authorization effect of the policy. C. Multiparty Policy Evaluation Two steps are performed to evaluate an access request over multi- party access control policies. The first one checks the access request against the policy specified by each controller and yields a decision for the controller. The accessor element in a policy decides whether that policy is applicable to a request. If the user who sends the request belongs to the user set derived from the accessor of the policy, the policy is applicable and the evaluation process returns a response with the decision (either permit or deny) indicated by the effect element in the policy. Otherwise, the response yields deny decision if the policy is not applicable to that request. In the second one, decisions from all controllers responding to the access request are aggregated to make a final decision for the access request. Figure 2 illustrates the evaluation process of multi- party access control policies. www.ijmer.com 2809 | Page
  • 3. www.ijmer.com International Journal of Modern Engineering Research (IJMER) Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2808-2812 ISSN: 2249-6645 Figure 2: Multiparty Policy Evaluation Process IV. IMPLEMENTATION OF MCONTROLLER In our proposed work, we present an application called “MController” for supporting collaborative management of shared data. It enables multiple associated users to specify their access control policies and privacy preferences to co-control a shared data item. Consider the social network “Facebook”. Facebook server accepts inputs from the users, and then forwards them to the application server. The application server is responsible for the input processing and the collaborative management of the shared data. Information related to the user data such as friend lists, user identifiers, user groups, and user contents are stored in the MySQL database. Once the user installs MController in his/her Facebook space, MController can access user’s basic information and contents. In particular, MController can retrieve and list all the uploaded photos, which are owned or uploaded by the user, or where the user was tagged. Then, the user can select any photo to specify his/hery preference. If the user is not the owner of the selected photo, then he/she only edit the privacy setting and sensitivity setting of the photo. Otherwise, if the user is an owner of the photo, then he/she can further configure the conflict resolution mechanism for the shared photo. The core component of MController is the decision making module, which processes access requests and then returns responses (either permit or deny) for the requests. Figure 3 depicts the system architecture of the decision making module in MController. To evaluate an access request, the control policies of each controller of the targeted content are enforced first to generate a decision for the Mcontroller. Then, the decisions of all of the controllers are aggregated to yield a final decision as the response to that request. During the process of decision making, policy conflicts are resolved when evaluating the controllers’ policies by adopting a strategy chain pre-defined by the controllers. Figure 3: System Architecture of Decision Making in MController www.ijmer.com 2810 | Page
  • 4. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2808-2812 ISSN: 2249-6645 In addition, multi- party privacy conflicts are also resolved based on the configured conflict resolution method when aggregating the decisions of controllers. If the owner of the content chooses the automatic conflict resolution, then the aggregated sensitivity value is utilized as a threshold for making a decision. Otherwise, multi- party privacy conflicts are resolved by applying the strategy selected by the owner, and the aggregated sensitivity score is considered as the recommendation for that strategy selection. Regarding access requests to the disseminated contents, the final decision is made by combining the disseminator’s decision and the original controllers’ decision through a deny-overrides combination mechanism. V. SYSTEM USABILITY AND PERFORMANCE EVALUATION A. Participants and Procedure MController is a functional proof-of-concept implementation of collaborative privacy management. To measure the practicality and usability of our mechanism, we conducted a survey study (n=35) to explore the factors surrounding users’ desires for privacy and discover how we might improve those implemented in MController. Specifically, we were interested in users’ perspectives on the current Facebook privacy system and their desires for more control over photos they do not own. Users were given the opportunity to share our application and play with their friends. While this is not a random sampling, recruiting using the natural dissemination features of Facebook arguably gives an accurate profile of the ecosystem. Before Using MController. Prior to using MController, users were asked a few questions about their usage of Facebook to determine the user’s perceived usability of the current Facebook privacy controls. Since we were interested in the maximum average perception of Facebook, we looked at the upper bound of the confidence interval. An average user asserts at most 25% positively about the likability and control of Facebook’s privacy management mechanism, and at most 44% on Facebook’s simplicity as shown in Table 1. This demonstrates an average negative opinion of the Facebook’s privacy controls that users currently must use. TABLE 1 Usability Evaluation for Facebook and MController Privacy Controls Facebook Metric Linkability Simplicity Control Average 0.20 0.38 0.20 Upper bound on 95% confidence interval 0.25 0.44 0.25 MController Lower bound on Average 95% confidence interval 0.83 0.80 0.72 0.64 0.83 0.80 After Using MController, users were then asked to perform a few tasks in MController. Since we were interested in the average minimum opinion of MController, we looked at the lower bound of the confidence interval. An average user asserts at least 80% positively about the likability and control, and at least 67% positively on MController’s simplicity as shown in Table 1. This demonstrates an average positive opinion of the controls and ideas presented to users in MController. B. Performance Evaluation To evaluate the performance of the policy evaluation mechanism in MController, we changed the number of the controllers of a shared photo from 1 to 20, and assigned each controller with the average number of friends, 130, which is claimed by Facebook statistics. Also, we considered two cases for our evaluation. In the first case, each controller allows “friends” to access the shared photo. In the second case, controllers specify “friends of friends” as the accessors instead of “friends”. In our experiments, we performed 1,000 independent trials and measured the performance of each trial. Since the system performance depends on other There are O(n) MySQL calls and data fetching operations and O(1) for additional operations. Moreover, we could observe there was no significant overhead when we run MController in Facebook. VI. CONCLUSION Although social networks attempt to improve security and privacy, they have not achieved the complete or ideal access control mechanisms that users actually demand. In current social networks, individual users can choose different preferences, causing privacy conflicts in shared information that multiple users co- own. In this paper, we have proposed an optimal solution for collaborative management of shared data in OSNs. A multi- party access control model was formulated, along with a multi- party policy specification scheme and corresponding policy evaluation method. In addition, we have introduced an approach for representing and reasoning about our proposed method. A proof-of-concept implementation of our solution called “MController” has been discussed as well, followed by the usability study and system evaluation of our proposed method. www.ijmer.com 2811 | Page
  • 5. www.ijmer.com International Journal of Modern Engineering Research (IJMER) Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2808-2812 ISSN: 2249-6645 REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] Danah boyd and Nicole B. Ellison. Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(1), 2007. Bryan Pfaffenberger. The USENET Book: Finding, Using, and Surviving News- groups on the Internet. Addison Wesley, New York, NY, USA, 2004. Kiran K. Gollu, Stefan Saroiu, & Alec Wolman. (2007, October). A Social Networking-Based Access Control Scheme for Personal Content Proc. 21st ACM Symposium on Operating Systems Principles (SOSP ’07), Stevenson,Washington. (WIP) Carminati, B., Ferrari, E., & Perego, A. (2006, October). Rule-based access control for social networks. Paper presented at the On the Move to Meaningful Internet SystemsWorkshops. Carminati, B., & Ferrari, E. (2008, October). Privacy-aware collaborative access control in Web-based social networks. Paper presented at the 22nd annual IFIPWorking Group 11.3Working Conference on Data and Applications Security, London, UK. B. Carminati, E. Ferrari, and A. Perego. Rule-based access control for social networks. In On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, pages 1734–1744. Springer, 2006. P. Fong, M. Anwar, and Z. Zhao. A privacy preservation model for facebook-style social network systems. In Proceedings of the 14th European conference on Research in computer security, pages 303–320. Springer-Verlag, 2009. E. Carrie. Access Control Requirements for Web 2.0 Security and Privacy. In Proc. of Workshop on Web 2.0 Security & Privacy (W2SP). Citeseer, 2007. A. Squicciarini, M. Shehab, and F. Paci. Collective privacy management in social networks. In Proceedings of the 18th international conference on World wide web, pages 521–530. ACM, 2009. www.ijmer.com 2812 | Page