CFP last date
20 December 2024
Reseach Article

Multiple user Authority Framework for Data Sharing in OSN'S

by Mrunalini Pratap Shitole, Madhuri Patil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 118 - Number 15
Year of Publication: 2015
Authors: Mrunalini Pratap Shitole, Madhuri Patil
10.5120/20819-3423

Mrunalini Pratap Shitole, Madhuri Patil . Multiple user Authority Framework for Data Sharing in OSN'S. International Journal of Computer Applications. 118, 15 ( May 2015), 5-9. DOI=10.5120/20819-3423

@article{ 10.5120/20819-3423,
author = { Mrunalini Pratap Shitole, Madhuri Patil },
title = { Multiple user Authority Framework for Data Sharing in OSN'S },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 118 },
number = { 15 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 5-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume118/number15/20819-3423/ },
doi = { 10.5120/20819-3423 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:01:46.145778+05:30
%A Mrunalini Pratap Shitole
%A Madhuri Patil
%T Multiple user Authority Framework for Data Sharing in OSN'S
%J International Journal of Computer Applications
%@ 0975-8887
%V 118
%N 15
%P 5-9
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Today all the peoples are using the social websites for the interaction and creating profile and many more purposes. In this paper, Focused on the restriction access of information which is handling by social websites. All people knows, Social Network (OSNs) have much more growth in the current year and having the facility for hundreds of millions of internet users. When user use the Social websites that provides the attractive means for communication and the information sharing purpose but it will increase the number of conflict. Because of this issues Online Social Network allow user to restrict access to shared information. They do not provide any mechanism for same security and privacy issues with multiple users which is happened in the Online Social Network. So propose an approach to enable the security of shared information associated with multiple users in Online Social Network. For that purpose, here formulate an control model to get intrinsic nature of multiparty authorization requirement along with the condition and a conditional mechanisms. Here present a logical representation of our control model which performs many analysis tasks on our model. Here also discuss the proof of concept prototype which is the part of an application in face book.

References
  1. J. Choi, W. De Neve, K. Plataniotis, and Y. Ro, "Collaborative Face Recognition for Improved Face Annotation in Personal Photo Collections Shared on Online Social Networks," IEEE Trans. Multimedia, vol. 13, no. 1, pp. 14-28, Feb. 2011.
  2. H. Hu, G. -J. Ahn, and J. Jorgensen, "Enabling Collaborative Data Sharing in Google+. ," Technical Report ASU-SCIDSE-12-1, http:// sefcom. asu. edu/mpac/mpac+. pdf, Apr. 2012.
  3. B. Carminati and E. Ferrari, "Collaborative Access Control in On- Line Social Networks," Proc. Seventh Int'l Conf. Collaborative Computing: Networking, Applications and Worksharing (Collaborate- Com), pp. 231-240, 2011.
  4. H. Hu, G. -J. Ahn, and K. Kulkarni, "Detecting and Resolving Firewall Policy Anomalies," IEEE Trans. Dependable and Secure Computing, vol. 9, no. 3, pp. 318-331, May 2012.
  5. N. Li, Q. Wang, W. Qardaji, E. Bertino, P. Rao, J. Lobo, and D. Lin, "Access Control Policy Combining: Theory Meets Practice," Proc. 14th ACM Symp. Access Control Models and Technologies, pp. 135- 144, 2009.
  6. . N. Li, Q. Wang, W. Qardaji, E. Bertino, P. Rao, J. Lobo, and D. Lin, "Access Control Policy Combining: Theory Meets Practice," Proc. 14th ACM Symp. Access Control Models and Technologies, pp. 135- 144, 2009.
  7. H. Hu and G. Ahn, "Multiparty Authorization Framework for Data Sharing in Online Social Networks," Proc. 25th Ann. IFIP WG 11. 3 Conf. Data and Applications Security and Privacy,pp. 29-43, 2011.
  8. H. Hu, G. Ahn, and K. Kulkarni, "Anomaly Discovery and Resolution in Web Access Control Policies," Proc. 16th ACM Symp. Access Control Models and Technologies, pp. 165-174, 2011.
  9. H. Hu, G. -J. Ahn, and J. Jorgensen, "Enabling Collaborative Data Sharing in Google+. ," Technical Report ASU-SCIDSE-12-1, http:// sefcom. asu. edu/mpac/mpac+. pdf, Apr. 2012.
  10. H. Hu, G. -J. Ahn, and J. Jorgensen, "Detecting and Resolving Privacy Conflicts for Collaborative Data Sharing in Online Social Networks," Proc. 27th Ann. Computer Security Applications Conf. , pp. 103-112, 2011.
  11. H. Hu, G. -J. Ahn, and K. Kulkarni, "Detecting and Resolving Firewall Policy Anomalies," IEEE Trans. Dependable and Secure Computing, vol. 9, no. 3, pp. 318-331, May 2012.
  12. L. Jin, H. Takabi, and J. Joshi, "Towards Active Detection of Identity Clone Attacks on Online Social Networks," Proc. First ACMConf. Data and Application Security and Privacy, pp. 27-38, 2011.
  13. A. Squicciarini, M. Shehab, and F. Paci, "Collective Privacy Management in Social Networks," Proc. 18th Int'l Conf. World Wide Web, pp. 521-530, 2009.
  14. A. Squicciarini, S. Sundareswaran, D. Lin, and J. Wede, "A3p: Adaptive Policy Prediction for Shared Images over Popular Content Sharing Sites," Proc. 22nd ACM Conf. Hypertext and Hypermedia, pp. 261-270, 2011.
  15. E. Staab and T. Engel, "Collusion Detection for Grid Computing," Proc. Ninth IEEE/ACM Int'l Symp. Cluster Computing and the Grid, pp. 412-419, 2009.
  16. B. Viswanath, A. Post, K. Gummadi, and A. Mislove, "An Analysis of Social Network-Based Sybil Defenses," ACM SIGCOMM Computer Comm. Rev. , vol. 40, pp. 363-374, 2010.
  17. G. Wondracek, T. Holz, E. Kirda, and C. Kruegel, "A Practical Attack to De-Anonymize Social Network Users," Proc. IEEE Symp. Security and Privacy, pp. 223-238, 2010.
  18. E. Zheleva and L. Getoor, "To Join or Not to Join: The Illusion of Privacy in Social Networks with Mixed Public and Private User Profiles," Proc. 18th Int'l Conf. World Wide Web, pp. 531-540, 2009.
  19. Facebook Privacy Policy, http://www. facebook. com/policy. php/, 2013.
  20. Facebook Statistics, http://www. facebook. com/press/info. php?statistics, 2013.
  21. Google+ Privacy Policy, http://http://www. google. com/intl/ en/+/policy/, 2013.
  22. The Google+ Project, https://plus. google. com, 2013.
  23. G. Ahn and H. Hu, "Towards Realizing a Formal RBAC Model in Real Systems," Proc. 12th ACM Symp. Access Control Models and Technologies, pp. 215-224, 2007.
  24. G. Ahn, H. Hu, J. Lee, and Y. Meng, "Representing and Reasoning about Web Access Control Policies," Proc. IEEE 34th Ann. Computer Software and Applications Conf. (COMPSAC), pp. 137- 146, 2010.
  25. A. Besmer and H. R. Lipford, "Moving beyond Untagging: Photo Privacy in a Tagged World," Proc. 28th Int'l Conf. Human Factors in Computing Systems, pp. 1563-1572, 2010.
  26. L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda, "All Your Contacts Are Belong to Us: Automated Identity theft Attacks on Social Networks," Proc. 18th Int'l Conf. World Wide Web, pp. 551-560, 2009.
  27. B. Carminati and E. Ferrari, "Collaborative Access Control in On-Line Social Networks," Proc. Seventh Int'l Conf. Collaborative Computing: Networking, Applications and Worksharing (Collaborate- Com), pp. 231-240, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

AMF OSNs MPAC AS Mcontroller