SlideShare a Scribd company logo
MULTIPARTY ACCESS CONTROL
FOR ONLINE SOCIAL NETWORKS
Under the Guidance of
Mrs. Suriya Begum
PROBLEM STATEMENT
 OSNs allow users to restrict access to shared
data, they currently do not provide any
mechanism to enforce privacy concerns over
data associated with multiple users.
 OSNs raises a number of security and privacy
issues.
 Now a days OSNs doesn’t provide multiparty
access control mechanisms for shared data.
 Currently OSNs doesn’t allow collaborative
management of data sharing.
ABSTRACT
 Online social networks (OSNs) have experienced tremendous
growth in recent years and become a de facto portal for
hundreds of millions of Internet users.
 While OSNs allow users to restrict access to shared data,
they currently do not provide any mechanism to enforce
privacy concerns over data associated with multiple users.
 To this end, we propose an approach to enable the
protection of shared data associated with multiple users in
OSNs.
 We formulate an access control model to capture the
essence of multiparty authorization requirements, along
with a multiparty policy specification scheme and a policy
enforcement mechanism.
SOCIAL NETWORKS
 Social Networking has become very popular during
the past few years, but it can still be very difficult to
understand for someone new to social networking.
 Once signed onto a social network, having answered a
few basic profile questions, it is easy to sit back and
wonder what you are supposed to do next.
 Social networking is based on a certain structure that
allow people to both express their individuality and
meet people with similar interests.
 There will be several options available on social
network sites such as Profile, Friends, Groups.
EXISTING SYSTEMS
These are the existing systems with their drawbacks.
 Yahoo- Doesn’t have profile sharing.
 Orkut- Unstable due to change of versions.
 Facebook- Timeline doesn’t reach properly to
the users.
 Twitter- Fake profiles of celebrities are more.
LIST OF EXISTING SYSTEMS
PROPOSED SYSTEM
 Our prototype application enables multiple
associated users to specify their authorization
policies and privacy preferences to co-control a
shared data item.
 A multiparty access control model was
formulated, along with a multiparty policy
specification scheme and corresponding policy
evaluation mechanism.
 The proposed system shows a novel solution for
collaborative management of shared data in
OSNs.
 A flexible access control mechanism in a multi-
user environment like OSNs should allow
multiple controllers, who are associated with the
shared data, to specify access control policies.
 In addition to the owner of data, other
controllers, including the contributor, stakeholder
and disseminator of data, regulate the access of
shared data.
PROPOSED SYSTEM(CONTD.)
MODULES
 Owner module
 Contributor module
 Stakeholder module
 Disseminator module
 MPAC module
OWNER MODULE
 In Owner module let d be a data item in the space m
of a user u in the social network.
 The user u is called the owner of d.
 The user u is called the contributor of d. We
specifically analyze three scenarios—profile sharing,
relationship sharing and content sharing—to
understand the risks posted by the lack of
collaborative control in OSNs.
 In this the owner and the disseminator can specify
access control policies to restrict the sharing of profile
attributes.
CONTRIBUTOR MODULE
 In Contributor module let d be a data item
published by a user u in someone else’s space in
the social network.
 The contributor publishes content to other’s
space and the content may also have multiple
stakeholders (e.g., tagged users).
 The memory space for the user will be allotted
according to user request for content sharing. A
shared content is published by a contributor.
STAKEHOLDER MODULE
 In Stakeholder module let d be a data item in the
space of a user in the social network. Let T be the
set of tagged users associated with d.
 A user u is called a stakeholder of d, if u 2 T who
has a relationship with another user called
stakeholder, shares the relationship with an
accessor.
 In this scenario, authorization requirements from
both the owner and the stakeholder should be
considered.
DISSEMINATOR MODULE
 In Disseminator module let d be a data item
shared by a user u from someone else’s space to
his/her space in the social network.
 The user u is called a disseminator of d. A
content sharing pattern where the sharing starts
with an originator.
 All access control policies defined by associated
users should be enforced to regulate access of
the content in disseminator’s space.
MPAC MODULE
 MPAC is used to prove if our proposed access control
model is valid. To enable a collaborative authorization
management of data sharing in OSNs.
 Our policy specification scheme is built upon the
proposed MPAC model. Accessor Specification:
Accessors are a set of users who are granted to access
the shared data.
 Accessors can be represented with a set of user
names, asset of relationship names or a set of group
names in OSNs.
ARCHITECTURE
Multiparty Social Network Representation
SYSTEM REQUIREMENT SPECIFICATION
Operating system Windows XP
Technology J2EE(Java Enterprise
Edition)
Database MySql5.0
Front end GUI HTML, JavaScript, JSP
Database Tool SQLyog
Web Server Apache Tomcat 6.0.35
Software Requirements
SYSTEM REQUIREMENT SPECIFICATION
Processor - Intel Pentium and above
Speed - 1.1GHz
RAM - 1GB
Hard Disk - 5GB
Hardware Requirements
DFD’S(OWNER MODULE)
Login
Upload Image
Find Friends
Share Images
View Friend List
AllowPivacy Setting
Sending Request
End Process
Check
Unauthorized User
YES NO
USE CASE DIAGRAM
Login
User
Find Friends
Send Request
Upload Images
Share Images
Allow Privacy Settings
View Friend List
SEQUENCE DIAGRAM
User Login Find Friends Send Request Upload Images Share Images View FriendsList
Enter UserId And Password
TESTING LOGIN PAGE
EXECUTION
EXECUTION
EXECUTION
EXECUTION
EXECUTION
EXECUTION
EXECUTION
CONCLUSION
 Muliparty access control for online social network has
proposed a novel solution for collaborative
management of shared data in OSNs.
 A multiparty access control model was formulated,
along with a multiparty policy specification scheme
and corresponding policy evaluation mechanism.
 We had evaluated the effectiveness of MPAC conflict
resolution approach based on the tradeoff of privacy
risk and sharing loss
CONCLUSION
 Muliparty access control for online social network has
proposed a novel solution for collaborative
management of shared data in OSNs.
 A multiparty access control model was formulated,
along with a multiparty policy specification scheme
and corresponding policy evaluation mechanism.
 We had evaluated the effectiveness of MPAC conflict
resolution approach based on the tradeoff of privacy
risk and sharing loss
THANK YOU!!!

More Related Content

What's hot

Universal Description, Discovery and Integration (UDDI) by ANIKET CHOUDHURY
Universal Description, Discovery and Integration (UDDI) by ANIKET CHOUDHURYUniversal Description, Discovery and Integration (UDDI) by ANIKET CHOUDHURY
Universal Description, Discovery and Integration (UDDI) by ANIKET CHOUDHURY
अनिकेत चौधरी
 
Thick client application security assessment
Thick client  application security assessmentThick client  application security assessment
Thick client application security assessment
Sanjay Kumar (Seeking options outside India)
 
Windows Sistemlerde Yetkili Hesapları İzleyerek Yanal Hareketleri Yakalama
Windows Sistemlerde Yetkili Hesapları İzleyerek Yanal Hareketleri YakalamaWindows Sistemlerde Yetkili Hesapları İzleyerek Yanal Hareketleri Yakalama
Windows Sistemlerde Yetkili Hesapları İzleyerek Yanal Hareketleri Yakalama
BGA Cyber Security
 
Ajansız log toplama
Ajansız log toplamaAjansız log toplama
Ajansız log toplama
Ertugrul Akbas
 
Tour guidance srs (Software Requirements Specification)
Tour guidance  srs (Software Requirements Specification)Tour guidance  srs (Software Requirements Specification)
Tour guidance srs (Software Requirements Specification)
Akalanaka Liyanage
 
Webinar: SOC Ekipleri için MITRE ATT&CK Kullanım Senaryoları
Webinar: SOC Ekipleri için MITRE ATT&CK Kullanım SenaryolarıWebinar: SOC Ekipleri için MITRE ATT&CK Kullanım Senaryoları
Webinar: SOC Ekipleri için MITRE ATT&CK Kullanım Senaryoları
BGA Cyber Security
 
Intermediate code generation
Intermediate code generationIntermediate code generation
Intermediate code generation
Dr.DHANALAKSHMI SENTHILKUMAR
 
Log Korelasyon/SIEM Kural Örnekleri ve Korelasyon Motoru Performans Verileri
Log Korelasyon/SIEM Kural Örnekleri ve Korelasyon Motoru Performans VerileriLog Korelasyon/SIEM Kural Örnekleri ve Korelasyon Motoru Performans Verileri
Log Korelasyon/SIEM Kural Örnekleri ve Korelasyon Motoru Performans Verileri
Ertugrul Akbas
 
Software requirement specification
Software requirement specificationSoftware requirement specification
Software requirement specification
Ravi Yasas
 
Kali linux
Kali linuxKali linux
Kali linux
BGA Cyber Security
 
Mitre ATT&CK Kullanarak Etkin Saldırı Tespiti
Mitre ATT&CK Kullanarak Etkin Saldırı TespitiMitre ATT&CK Kullanarak Etkin Saldırı Tespiti
Mitre ATT&CK Kullanarak Etkin Saldırı Tespiti
BGA Cyber Security
 
DNS Protokolüne Yönelik Güncel Saldırı Teknikleri & Çözüm Önerileri
DNS Protokolüne Yönelik Güncel Saldırı Teknikleri & Çözüm ÖnerileriDNS Protokolüne Yönelik Güncel Saldırı Teknikleri & Çözüm Önerileri
DNS Protokolüne Yönelik Güncel Saldırı Teknikleri & Çözüm Önerileri
BGA Cyber Security
 
Log yönetimi ve siem
Log yönetimi ve siemLog yönetimi ve siem
Log yönetimi ve siem
Ertugrul Akbas
 
CrowdCasts Monthly: Mitigating Pass the Hash
CrowdCasts Monthly: Mitigating Pass the HashCrowdCasts Monthly: Mitigating Pass the Hash
CrowdCasts Monthly: Mitigating Pass the Hash
CrowdStrike
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
Vishal Kumar
 
9780840024220 ppt ch09
9780840024220 ppt ch099780840024220 ppt ch09
9780840024220 ppt ch09
Kristin Harrison
 
DNS güvenliği
DNS güvenliğiDNS güvenliği
DNS güvenliği
Alper Başaran
 
FAKE NEWS DETECTION PPT
FAKE NEWS DETECTION PPT FAKE NEWS DETECTION PPT
FAKE NEWS DETECTION PPT
VaishaliSrigadhi
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Altacit Global
 
Adli Bilişim ve Adli Bilişim Araçları
Adli Bilişim ve Adli Bilişim AraçlarıAdli Bilişim ve Adli Bilişim Araçları
Adli Bilişim ve Adli Bilişim Araçları
Ahmet Gürel
 

What's hot (20)

Universal Description, Discovery and Integration (UDDI) by ANIKET CHOUDHURY
Universal Description, Discovery and Integration (UDDI) by ANIKET CHOUDHURYUniversal Description, Discovery and Integration (UDDI) by ANIKET CHOUDHURY
Universal Description, Discovery and Integration (UDDI) by ANIKET CHOUDHURY
 
Thick client application security assessment
Thick client  application security assessmentThick client  application security assessment
Thick client application security assessment
 
Windows Sistemlerde Yetkili Hesapları İzleyerek Yanal Hareketleri Yakalama
Windows Sistemlerde Yetkili Hesapları İzleyerek Yanal Hareketleri YakalamaWindows Sistemlerde Yetkili Hesapları İzleyerek Yanal Hareketleri Yakalama
Windows Sistemlerde Yetkili Hesapları İzleyerek Yanal Hareketleri Yakalama
 
Ajansız log toplama
Ajansız log toplamaAjansız log toplama
Ajansız log toplama
 
Tour guidance srs (Software Requirements Specification)
Tour guidance  srs (Software Requirements Specification)Tour guidance  srs (Software Requirements Specification)
Tour guidance srs (Software Requirements Specification)
 
Webinar: SOC Ekipleri için MITRE ATT&CK Kullanım Senaryoları
Webinar: SOC Ekipleri için MITRE ATT&CK Kullanım SenaryolarıWebinar: SOC Ekipleri için MITRE ATT&CK Kullanım Senaryoları
Webinar: SOC Ekipleri için MITRE ATT&CK Kullanım Senaryoları
 
Intermediate code generation
Intermediate code generationIntermediate code generation
Intermediate code generation
 
Log Korelasyon/SIEM Kural Örnekleri ve Korelasyon Motoru Performans Verileri
Log Korelasyon/SIEM Kural Örnekleri ve Korelasyon Motoru Performans VerileriLog Korelasyon/SIEM Kural Örnekleri ve Korelasyon Motoru Performans Verileri
Log Korelasyon/SIEM Kural Örnekleri ve Korelasyon Motoru Performans Verileri
 
Software requirement specification
Software requirement specificationSoftware requirement specification
Software requirement specification
 
Kali linux
Kali linuxKali linux
Kali linux
 
Mitre ATT&CK Kullanarak Etkin Saldırı Tespiti
Mitre ATT&CK Kullanarak Etkin Saldırı TespitiMitre ATT&CK Kullanarak Etkin Saldırı Tespiti
Mitre ATT&CK Kullanarak Etkin Saldırı Tespiti
 
DNS Protokolüne Yönelik Güncel Saldırı Teknikleri & Çözüm Önerileri
DNS Protokolüne Yönelik Güncel Saldırı Teknikleri & Çözüm ÖnerileriDNS Protokolüne Yönelik Güncel Saldırı Teknikleri & Çözüm Önerileri
DNS Protokolüne Yönelik Güncel Saldırı Teknikleri & Çözüm Önerileri
 
Log yönetimi ve siem
Log yönetimi ve siemLog yönetimi ve siem
Log yönetimi ve siem
 
CrowdCasts Monthly: Mitigating Pass the Hash
CrowdCasts Monthly: Mitigating Pass the HashCrowdCasts Monthly: Mitigating Pass the Hash
CrowdCasts Monthly: Mitigating Pass the Hash
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
 
9780840024220 ppt ch09
9780840024220 ppt ch099780840024220 ppt ch09
9780840024220 ppt ch09
 
DNS güvenliği
DNS güvenliğiDNS güvenliği
DNS güvenliği
 
FAKE NEWS DETECTION PPT
FAKE NEWS DETECTION PPT FAKE NEWS DETECTION PPT
FAKE NEWS DETECTION PPT
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Adli Bilişim ve Adli Bilişim Araçları
Adli Bilişim ve Adli Bilişim AraçlarıAdli Bilişim ve Adli Bilişim Araçları
Adli Bilişim ve Adli Bilişim Araçları
 

Viewers also liked

multiparty access control
multiparty access controlmultiparty access control
multiparty access control
Levin Sibi
 
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIARESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
Nexgen Technology
 
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIARESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
Nexgen Technology
 
Media and Conflict Resolution
Media and Conflict ResolutionMedia and Conflict Resolution
Media and Conflict Resolution
Oneworld Multimedia
 
Privacy Dynamics: Learning Privacy Norms for Social Software
Privacy Dynamics: Learning Privacy Norms for Social SoftwarePrivacy Dynamics: Learning Privacy Norms for Social Software
Privacy Dynamics: Learning Privacy Norms for Social Software
Arosha Bandara
 
COMMUNICATION AND CONFLICT RESOLUTION ON SOCIAL MEDIA - A PRACTICAL ORIENTED ...
COMMUNICATION AND CONFLICT RESOLUTION ON SOCIAL MEDIA - A PRACTICAL ORIENTED ...COMMUNICATION AND CONFLICT RESOLUTION ON SOCIAL MEDIA - A PRACTICAL ORIENTED ...
COMMUNICATION AND CONFLICT RESOLUTION ON SOCIAL MEDIA - A PRACTICAL ORIENTED ...
Komfo
 
Social Network
Social NetworkSocial Network
Social Network
Suraj Thapaliya
 
Media and Conflict Transformation
Media and Conflict TransformationMedia and Conflict Transformation
Media and Conflict Transformation
Sanjana Hattotuwa
 
Emerging trends in robotics using neural network
Emerging trends in robotics using neural networkEmerging trends in robotics using neural network
Emerging trends in robotics using neural network
Deva Johnson
 
Microsoft access
Microsoft accessMicrosoft access
Microsoft access
CafeImantado
 
Microsoft access
Microsoft accessMicrosoft access
Conflict in Media and Media in Conflict
Conflict in Media and Media in ConflictConflict in Media and Media in Conflict
Conflict in Media and Media in Conflict
Михайло Дяків
 
Rfid based road toll tax
Rfid based road toll taxRfid based road toll tax
Rfid based road toll tax
angel300692
 
Access point
Access pointAccess point
Access point
Danniel Cesmas
 
Configuracion de un access point
Configuracion de un access pointConfiguracion de un access point
Configuracion de un access point
Jeffry Amador
 
Biotransformation in Plant Tissue Culture and Animal Cell Culture
Biotransformation in Plant Tissue Culture and Animal Cell CultureBiotransformation in Plant Tissue Culture and Animal Cell Culture
Biotransformation in Plant Tissue Culture and Animal Cell Culture
Khushbkht R. Khan
 
Emerging trend robotics using neural network
Emerging trend robotics using neural networkEmerging trend robotics using neural network
Emerging trend robotics using neural network
Deva Johnson
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
Sreeda Perikamana
 
Reed and sigma type comparators
Reed and sigma type comparatorsReed and sigma type comparators
Reed and sigma type comparators
Harshit Mishra
 
Configuracion del access point wireless
Configuracion del access point wirelessConfiguracion del access point wireless
Configuracion del access point wireless
karla1108
 

Viewers also liked (20)

multiparty access control
multiparty access controlmultiparty access control
multiparty access control
 
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIARESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
 
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIARESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
 
Media and Conflict Resolution
Media and Conflict ResolutionMedia and Conflict Resolution
Media and Conflict Resolution
 
Privacy Dynamics: Learning Privacy Norms for Social Software
Privacy Dynamics: Learning Privacy Norms for Social SoftwarePrivacy Dynamics: Learning Privacy Norms for Social Software
Privacy Dynamics: Learning Privacy Norms for Social Software
 
COMMUNICATION AND CONFLICT RESOLUTION ON SOCIAL MEDIA - A PRACTICAL ORIENTED ...
COMMUNICATION AND CONFLICT RESOLUTION ON SOCIAL MEDIA - A PRACTICAL ORIENTED ...COMMUNICATION AND CONFLICT RESOLUTION ON SOCIAL MEDIA - A PRACTICAL ORIENTED ...
COMMUNICATION AND CONFLICT RESOLUTION ON SOCIAL MEDIA - A PRACTICAL ORIENTED ...
 
Social Network
Social NetworkSocial Network
Social Network
 
Media and Conflict Transformation
Media and Conflict TransformationMedia and Conflict Transformation
Media and Conflict Transformation
 
Emerging trends in robotics using neural network
Emerging trends in robotics using neural networkEmerging trends in robotics using neural network
Emerging trends in robotics using neural network
 
Microsoft access
Microsoft accessMicrosoft access
Microsoft access
 
Microsoft access
Microsoft accessMicrosoft access
Microsoft access
 
Conflict in Media and Media in Conflict
Conflict in Media and Media in ConflictConflict in Media and Media in Conflict
Conflict in Media and Media in Conflict
 
Rfid based road toll tax
Rfid based road toll taxRfid based road toll tax
Rfid based road toll tax
 
Access point
Access pointAccess point
Access point
 
Configuracion de un access point
Configuracion de un access pointConfiguracion de un access point
Configuracion de un access point
 
Biotransformation in Plant Tissue Culture and Animal Cell Culture
Biotransformation in Plant Tissue Culture and Animal Cell CultureBiotransformation in Plant Tissue Culture and Animal Cell Culture
Biotransformation in Plant Tissue Culture and Animal Cell Culture
 
Emerging trend robotics using neural network
Emerging trend robotics using neural networkEmerging trend robotics using neural network
Emerging trend robotics using neural network
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
Reed and sigma type comparators
Reed and sigma type comparatorsReed and sigma type comparators
Reed and sigma type comparators
 
Configuracion del access point wireless
Configuracion del access point wirelessConfiguracion del access point wireless
Configuracion del access point wireless
 

Similar to Multiparty Access Control For Online Social Networks : Model and Mechanisms.

Multiparty access control for online social networks model and mechanisms
Multiparty access control for online social networks model and mechanismsMultiparty access control for online social networks model and mechanisms
Multiparty access control for online social networks model and mechanisms
JPINFOTECH JAYAPRAKASH
 
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
IRJET Journal
 
A Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking WebsitesA Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking Websites
IRJET Journal
 
An Access Control Model for Collaborative Management of Shared Data in OSNS
An Access Control Model for Collaborative Management of Shared Data in OSNSAn Access Control Model for Collaborative Management of Shared Data in OSNS
An Access Control Model for Collaborative Management of Shared Data in OSNS
IJMER
 
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Privacy Management of Multi User Environment in Online Social Networks (OSNs)Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
IOSR Journals
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
IEEEFINALYEARSTUDENTPROJECT
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
IEEEFINALSEMSTUDENTPROJECTS
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
IEEEGLOBALSOFTSTUDENTPROJECTS
 
Privacy Protection Using Formal Logics in Onlne Social Networks
Privacy Protection Using   Formal Logics in Onlne Social NetworksPrivacy Protection Using   Formal Logics in Onlne Social Networks
Privacy Protection Using Formal Logics in Onlne Social Networks
IRJET Journal
 
Intelligent access control policies for Social network site
Intelligent access control policies for Social network siteIntelligent access control policies for Social network site
Intelligent access control policies for Social network site
ijcsit
 
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social NetworksMy Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
IRJET Journal
 
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkAuthorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social network
eSAT Publishing House
 
Ijcatr04041017
Ijcatr04041017Ijcatr04041017
Ijcatr04041017
Editor IJCATR
 
Scalable Access Control For Privacy-Aware Media Sharing.pdf
Scalable Access Control For Privacy-Aware Media Sharing.pdfScalable Access Control For Privacy-Aware Media Sharing.pdf
Scalable Access Control For Privacy-Aware Media Sharing.pdf
Xevol1
 
tweet segmentation
tweet segmentation tweet segmentation
tweet segmentation
prashanttarone
 
Project
Project Project
Project
SaiRoyals10
 
Oruta privacy preserving public auditing for shared data in the cloud1
Oruta privacy preserving public auditing for shared data in the cloud1Oruta privacy preserving public auditing for shared data in the cloud1
Oruta privacy preserving public auditing for shared data in the cloud1
Shakas Technologies
 
Implementation of Privacy Policy Specification System for User Uploaded Image...
Implementation of Privacy Policy Specification System for User Uploaded Image...Implementation of Privacy Policy Specification System for User Uploaded Image...
Implementation of Privacy Policy Specification System for User Uploaded Image...
rahulmonikasharma
 
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijripublishers Ijri
 
Detecting and Providing Solutions to Privacy Issues in Social Media
Detecting and Providing Solutions to Privacy Issues in Social MediaDetecting and Providing Solutions to Privacy Issues in Social Media
Detecting and Providing Solutions to Privacy Issues in Social Media
IRJET Journal
 

Similar to Multiparty Access Control For Online Social Networks : Model and Mechanisms. (20)

Multiparty access control for online social networks model and mechanisms
Multiparty access control for online social networks model and mechanismsMultiparty access control for online social networks model and mechanisms
Multiparty access control for online social networks model and mechanisms
 
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
 
A Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking WebsitesA Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking Websites
 
An Access Control Model for Collaborative Management of Shared Data in OSNS
An Access Control Model for Collaborative Management of Shared Data in OSNSAn Access Control Model for Collaborative Management of Shared Data in OSNS
An Access Control Model for Collaborative Management of Shared Data in OSNS
 
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Privacy Management of Multi User Environment in Online Social Networks (OSNs)Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
 
Privacy Protection Using Formal Logics in Onlne Social Networks
Privacy Protection Using   Formal Logics in Onlne Social NetworksPrivacy Protection Using   Formal Logics in Onlne Social Networks
Privacy Protection Using Formal Logics in Onlne Social Networks
 
Intelligent access control policies for Social network site
Intelligent access control policies for Social network siteIntelligent access control policies for Social network site
Intelligent access control policies for Social network site
 
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social NetworksMy Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
 
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkAuthorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social network
 
Ijcatr04041017
Ijcatr04041017Ijcatr04041017
Ijcatr04041017
 
Scalable Access Control For Privacy-Aware Media Sharing.pdf
Scalable Access Control For Privacy-Aware Media Sharing.pdfScalable Access Control For Privacy-Aware Media Sharing.pdf
Scalable Access Control For Privacy-Aware Media Sharing.pdf
 
tweet segmentation
tweet segmentation tweet segmentation
tweet segmentation
 
Project
Project Project
Project
 
Oruta privacy preserving public auditing for shared data in the cloud1
Oruta privacy preserving public auditing for shared data in the cloud1Oruta privacy preserving public auditing for shared data in the cloud1
Oruta privacy preserving public auditing for shared data in the cloud1
 
Implementation of Privacy Policy Specification System for User Uploaded Image...
Implementation of Privacy Policy Specification System for User Uploaded Image...Implementation of Privacy Policy Specification System for User Uploaded Image...
Implementation of Privacy Policy Specification System for User Uploaded Image...
 
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
 
Detecting and Providing Solutions to Privacy Issues in Social Media
Detecting and Providing Solutions to Privacy Issues in Social MediaDetecting and Providing Solutions to Privacy Issues in Social Media
Detecting and Providing Solutions to Privacy Issues in Social Media
 

Recently uploaded

Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
Ratnakar Mikkili
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
nooriasukmaningtyas
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
yokeleetan1
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
PauloRodrigues104553
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
drwaing
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 

Recently uploaded (20)

Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 

Multiparty Access Control For Online Social Networks : Model and Mechanisms.

  • 1. MULTIPARTY ACCESS CONTROL FOR ONLINE SOCIAL NETWORKS Under the Guidance of Mrs. Suriya Begum
  • 2. PROBLEM STATEMENT  OSNs allow users to restrict access to shared data, they currently do not provide any mechanism to enforce privacy concerns over data associated with multiple users.  OSNs raises a number of security and privacy issues.  Now a days OSNs doesn’t provide multiparty access control mechanisms for shared data.  Currently OSNs doesn’t allow collaborative management of data sharing.
  • 3. ABSTRACT  Online social networks (OSNs) have experienced tremendous growth in recent years and become a de facto portal for hundreds of millions of Internet users.  While OSNs allow users to restrict access to shared data, they currently do not provide any mechanism to enforce privacy concerns over data associated with multiple users.  To this end, we propose an approach to enable the protection of shared data associated with multiple users in OSNs.  We formulate an access control model to capture the essence of multiparty authorization requirements, along with a multiparty policy specification scheme and a policy enforcement mechanism.
  • 4. SOCIAL NETWORKS  Social Networking has become very popular during the past few years, but it can still be very difficult to understand for someone new to social networking.  Once signed onto a social network, having answered a few basic profile questions, it is easy to sit back and wonder what you are supposed to do next.  Social networking is based on a certain structure that allow people to both express their individuality and meet people with similar interests.  There will be several options available on social network sites such as Profile, Friends, Groups.
  • 5. EXISTING SYSTEMS These are the existing systems with their drawbacks.  Yahoo- Doesn’t have profile sharing.  Orkut- Unstable due to change of versions.  Facebook- Timeline doesn’t reach properly to the users.  Twitter- Fake profiles of celebrities are more.
  • 7. PROPOSED SYSTEM  Our prototype application enables multiple associated users to specify their authorization policies and privacy preferences to co-control a shared data item.  A multiparty access control model was formulated, along with a multiparty policy specification scheme and corresponding policy evaluation mechanism.  The proposed system shows a novel solution for collaborative management of shared data in OSNs.
  • 8.  A flexible access control mechanism in a multi- user environment like OSNs should allow multiple controllers, who are associated with the shared data, to specify access control policies.  In addition to the owner of data, other controllers, including the contributor, stakeholder and disseminator of data, regulate the access of shared data. PROPOSED SYSTEM(CONTD.)
  • 9. MODULES  Owner module  Contributor module  Stakeholder module  Disseminator module  MPAC module
  • 10. OWNER MODULE  In Owner module let d be a data item in the space m of a user u in the social network.  The user u is called the owner of d.  The user u is called the contributor of d. We specifically analyze three scenarios—profile sharing, relationship sharing and content sharing—to understand the risks posted by the lack of collaborative control in OSNs.  In this the owner and the disseminator can specify access control policies to restrict the sharing of profile attributes.
  • 11. CONTRIBUTOR MODULE  In Contributor module let d be a data item published by a user u in someone else’s space in the social network.  The contributor publishes content to other’s space and the content may also have multiple stakeholders (e.g., tagged users).  The memory space for the user will be allotted according to user request for content sharing. A shared content is published by a contributor.
  • 12. STAKEHOLDER MODULE  In Stakeholder module let d be a data item in the space of a user in the social network. Let T be the set of tagged users associated with d.  A user u is called a stakeholder of d, if u 2 T who has a relationship with another user called stakeholder, shares the relationship with an accessor.  In this scenario, authorization requirements from both the owner and the stakeholder should be considered.
  • 13. DISSEMINATOR MODULE  In Disseminator module let d be a data item shared by a user u from someone else’s space to his/her space in the social network.  The user u is called a disseminator of d. A content sharing pattern where the sharing starts with an originator.  All access control policies defined by associated users should be enforced to regulate access of the content in disseminator’s space.
  • 14. MPAC MODULE  MPAC is used to prove if our proposed access control model is valid. To enable a collaborative authorization management of data sharing in OSNs.  Our policy specification scheme is built upon the proposed MPAC model. Accessor Specification: Accessors are a set of users who are granted to access the shared data.  Accessors can be represented with a set of user names, asset of relationship names or a set of group names in OSNs.
  • 16. SYSTEM REQUIREMENT SPECIFICATION Operating system Windows XP Technology J2EE(Java Enterprise Edition) Database MySql5.0 Front end GUI HTML, JavaScript, JSP Database Tool SQLyog Web Server Apache Tomcat 6.0.35 Software Requirements
  • 17. SYSTEM REQUIREMENT SPECIFICATION Processor - Intel Pentium and above Speed - 1.1GHz RAM - 1GB Hard Disk - 5GB Hardware Requirements
  • 18. DFD’S(OWNER MODULE) Login Upload Image Find Friends Share Images View Friend List AllowPivacy Setting Sending Request End Process Check Unauthorized User YES NO
  • 19. USE CASE DIAGRAM Login User Find Friends Send Request Upload Images Share Images Allow Privacy Settings View Friend List
  • 20. SEQUENCE DIAGRAM User Login Find Friends Send Request Upload Images Share Images View FriendsList Enter UserId And Password
  • 29. CONCLUSION  Muliparty access control for online social network has proposed a novel solution for collaborative management of shared data in OSNs.  A multiparty access control model was formulated, along with a multiparty policy specification scheme and corresponding policy evaluation mechanism.  We had evaluated the effectiveness of MPAC conflict resolution approach based on the tradeoff of privacy risk and sharing loss
  • 30. CONCLUSION  Muliparty access control for online social network has proposed a novel solution for collaborative management of shared data in OSNs.  A multiparty access control model was formulated, along with a multiparty policy specification scheme and corresponding policy evaluation mechanism.  We had evaluated the effectiveness of MPAC conflict resolution approach based on the tradeoff of privacy risk and sharing loss