Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

WelCome

No description
by

Sandip Shirgave

on 25 November 2014

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of WelCome

A Presentation On

A Novel Approach To
Multiparty Access Control for Online Social Networks

By
Sandip S. Shirgave

Under The Guidance Of
Prof. Mr. Pingale S. V.

Roll No:- 20

25-11-2014
Introduction
Literature Review
Problem Definition
Methodology
Data Flow Diagram
UML Diagram
Coding
Conclusion
References

Contents
To enable the protection of shared data associated with multiple users in OSNs with the help of access control mechanism.

Problem Definition
Online social networks (OSNs) such as Facebook ,Google +, and Twitter are inherently designed to enable people to share personal information.

Facebook, one of the social network sites, it having more than 800 million active users and over 30 billion pieces of content (web links, news stories, blog posts, notes, photo albums, etc.) shared each month.

To protect user data, access control has become a central feature of OSNs.

Introduction
WelCome
Everyone
A typical OSN provides each user with a virtual space containing profile information, a list of the user’s friends, and WebPages, such as wall in Facebook, where users and friends can post content and leave messages.


OSNs currently provide simple access control mechanisms allowing users to govern access to information contained in their own spaces, users, unfortunately, have no control over data residing outside their spaces.
Introduction
Introduction
For example, when a user uploads a photo and tags friends who appear in the photo, the tagged friends cannot restrict who can see this photo, even though the tagged friends may have different privacy concerns about the photo.

Because of this limitation we are developing collaborative management for shared data in OSNs, known as MPAC model.

The D-FOAF system [1]is primarily a Friend of a Friend (FOAF) distributed identity management system for OSNs, where relationships are associated with a trust level.

Carminati et al. [2] introduced a conceptually-similar trust-based access control model. In this model authorized users are denoted in terms of the relationship type, depth, and trust level between users in OSNs.

Fong et al. [3] proposed an access control model that formalizes and generalizes the access control mechanism implemented in Facebook, admitting arbitrary policy vocabularies that are based on theoretical graph properties.

Literature Review
Gates [4] described relationship-based access control as one of new security standard that addresses unique requirements of Web 2.0

F. Paci. [5] provided a solution for collective privacy management in OSNs. In this each co-owner may separately specify her/his own privacy preference for the shared content.

Carminati et al. [6] recently introduced a new class of security policies, called collaborative security policies, that basically enhance topology-based access control with respect to a set of collaborative users.

Literature Review
Technology Used
Project Details
MPAC MODEL

An OSN can be represented by a relationship network, a set of user groups, and a collection of user data.


MPAC includes different controllers, owner, contributor, stakeholder, and disseminator.

MPAC Controllers
Owner
: Let d be a data item in the space of a user u in the social network. The user u is called the owner of d.

Contributor
: Let d be a data item published by a user u in someone else’s space in the social network. The user u is called the contributor of d.

Stakeholder
: Let d be a data item in the space of a user in the social network. Let T be the set of tagged users associated with d.

Disseminator
: Let d be a data item shared by a user u from someone else’s space to his/her space in the social network. The user u is called a disseminator of d.

Multiparty Policy Evaluation Process
Three Scenarios Of Sharing
Profile Sharing
In this user shares profile attributes, such as name, birthday, activities, interests, and so on.

Relationship Sharing
In this sharing pattern where a user shares his/her relationship with another user.

Content Sharing
In this sharing pattern where the owner of a content shares the content with other OSN members.

Privacy Conflict
Multiple controllers of the shared data item often have different privacy concerns over the data item, it leads to privacy conflicts.

2 Solutions for resolving multiparty privacy conflicts is

Majority voting for decision making

Strategy-Based Conflict Resolution with Privacy Recommendation

Solution For Privacy Conflicts
Majority voting for decision making
A notable feature of the voting mechanism for conflict resolution is that the decision from each controller is able to have an effect on the final decision.

Strategy-Based Conflict Resolution with the help of priority
The owner’s decision has the highest priority. This strategy achieves the owner control mechanism that most OSNs are currently utilizing for data sharing.


Architecture Of Decision Making
Data Flow Diagram Level 0
UML Diagrams
UML Diagram
Class Diagram
Use Case Diagram
Component Diagram
Deployment Diagram
Sequence Diagram
Activity Diagram

Conclusion
We are developing multiparty access control mechanism for multiple users to share the data in online social network in secure manner.

Class Diagram
Use case diagram
Deployment Diagram
Sequence Diagram
Activity Diagram
Methodology
References
[1]Multiparty Access Control for Online Social Networks, Hongxin Hu, Member, IEEE, Gail-Joon Ahn, Senior Member, IEEE, and Jan Jorgensen, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 25, NO. 7, JULY 2013
[2] S. Kruk, S. Grzonkowski, A. Gzella, T. Woroniecki, and H. Choi.”D-FOAF: Distributed identity management with access rights delegation". The Semantic Web–ASWC 2006, pages 140–154, 2006
[3] B. Carminati, E. Ferrari, and A. Perego. “Rule-based access control for social networks”. In On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, pages 1734–1744. Springer, 2006.
[4] P. Fong, M. Anwar, and Z. Zhao. “A privacy preservation model for facebook-style social network systems”. In Proceedings of the 14th European conference on Research in computer security, pages 303–320. Springer-Verlag, 2009.
[5] E. Carrie. “Access Control Requirements for Web 2.0 Security and Privacy”. In Proc. of Workshop on Web 2.0 Security & Privacy (W2SP). Citeseer, 2007.
[6] F. Paci. “Collective privacy management in social networks”. In Proceedings of the 18th international conference on World wide web, pages 521–530. ACM, 2009.
[7] B. Carminati and E. Ferrari. “Collaborative access control in online social networks”. In Proceedings of the 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), pages 231–240. IEEE, 2011
Coding
Application created but application is not live.
Application is live.( Shows the green symbol )
Basic settings of application.
Application created.
Application created but not connected to local server,you need to host the application into the real server.
Data Flow Diagram Level 1
Full transcript