SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
www.ijmer.com

International Journal of Modern Engineering Research (IJMER)
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2808-2812
ISSN: 2249-6645

An Access Control Model for Collaborative Management of
Shared Data in OSNS
Ch. Aruna1, G. Minni2
1

M.Tech, Nimra College of Engineering & Technology, Vijayawada, A.P., India.
Asst. Professor, Dept.of CSE, Nimra College of Engineering & Technology, Vijayawada, A.P., India.

2

ABSTRACT: Online social networks (OSNs) have attracted a large amount of users to regularly connect, interact and
share information with each other for various purposes. Users share a tremendous amount of content with other users in
social networks using various services. The recent growth of social network sites such as Twitter, Facebook and MySpace
has created many interesting and challenging security and privacy problems. In OSNs, users manage their profile, interact
with other users, and selforganize into different communities. Users profiles usually include information such as the user’s
name, address, birthdate, contact information, emails, education, interests, photos, music, videos, blogs and many other
attributes The explosive growth of private or sensitive user data that are readily available in OSNs has raised an urgent
expectation for effective access control that can protect these data from unauthorized users in OSNs. This paper presents an
access control model for the protection of shared data associated with multiple users in online social networks.

Keywords: Access control, MController, OSN, Privacy.
I.

INTRODUCTION

Online social networks (OSNs) serve a number of purposes, but three primary roles stand out as common across all
sites. First, OSNs are used to maintain and strengthen existing social ties, or make new social connections. The sites allow
users to “articulate and make visible their online social networks”, thereby “communicating with people who are already a
part of their extended social network” [1]. Second, OSNs are used by each member to upload her own content. Note that the
content shared often varies from site to site, and sometimes is only the user’s profile itself. Third, OSNs are used to find new,
interesting content by filtering, recommending, and organizing the content uploaded by users.
Full participation in OSNs requires users to register a (pseudo) identity with the network, though some sites do
allow browsing public data without explicit sign-on. Users may volunteer information about themselves, for example their
birthday, place of residence, interests, etc., all of which constitutes the user’s profile. The online social network itself is
composed of links between users. Some sites allow users to link to any other user, without consent from the link recipient,
while other sites follow a two-phase procedure that only allows a link to be established when both parties agree. Certain
sites, such as Flickr, have social networks with directed links- meaning a link from A to B does not imply the presence of a
reverse link, whereas others, such as Orkut, have social networks with undirected links. Most sites also enable users to create
special interest groups, which are akin to Usenet [2] newsgroups. Users can post messages to groups (visible to all group
members) and even upload shared content to that group. Certain groups are moderated, and admission to the group is
controlled by a single group administrator, while other groups are open for any member to join. All sites today require
explicit group declaration by the users; users must manually create groups, appoint administrators (if necessary), and declare
which groups they are a member of.
Once an identity is built, users of content sharing sites can upload content onto their account. Many such online
sites enable users to mark content as public (visible to anyone) or private (visible only to their immediate “friends”), and to
tag content with labels. Many sites, such as YouTube, allow users to upload an unlimited amount of video content, while
other sites, such as Flickr, require that users either pay a subscription fee or be subject to an upload limit. All of the content
uploaded by a given user is listed in their user’s profile, allowing other users to browse through the social network to
discover new content. Typically, the content is automatically indexed, and, if publicly available, made accessible though a
textual search. An example is Flickr’s photo search, which allows the users to locate photos by searching based on tags and
comments.

II.

RELATED WORK

Several studies have examined the interface design to support user awareness of the privacy risks and algorithms for
relationship-based access-control scheme. In [3], the authors presented a social-networking-based access-control scheme for
online information sharing by considering identities as key pairs and identifying the social relationship based on social
attestations. Under this approach, a simple access-control list is employed to manage user access. A more sophisticated
mechanism to manage access controls in [4], is rule- based and follows complex policies that are expressed as constraints on
the type, depth, and trust level of existing relationships. This control methods is further extended by making access-control
decisions completely decentralized and collaborative [5].
In [6], the authors introduced a conceptually-similar but more comprehensive trust-based access control model. This
model allows the specification of access rules for online resources, where legitimate users are denoted in terms of the
relationship type, depth, and trust level between users in OSNs. In [7], the authors proposed an access control model that
formalizes and generalizes the access control mechanism implemented in Facebook, admitting arbitrary policy vocabularies
that are based on theoretical graph properties. In [8], the authors described relationship-based access control as one of new
security paradigms that addresses unique requirements of Web 2.0. In [9], the authors provided a solution for collective
www.ijmer.com

2808 | Page
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2808-2812
ISSN: 2249-6645
privacy management in OSNs. Their work considered access control policies of a data content that is co-owned by multiple
users in an OSN, such that each co-owner may separately specify her/his own privacy preference for the shared content.

III.

MULTIPARTY ACCESS CONTROL MODEL FOR OSNS

A. Multi party Access Control Model
A social network can be represented by a relationship network, a set of user groups and a collection of user data
(Figure 1). The relationship network of a social network is a directed labeled graph, where each node denotes a user and each
edge represents a relationship between two users. The label associated with each edge represents the type of the relationship.
Edge direction denotes that the initial node of an edge establishes the relationship and the terminal node of the edge accepts
that relationship. The number and type of supported relationships rely on the specific social network and its purposes. Social
network should allow multiple controllers, who are associated with the shared data, to specify access control policies. In
addition to the owner of data, other controllers, including the stakeholder, contributor and disseminator of data, need to
regulate the access of the shared data as well.

Figure 1: An Example of Multiparty Social Network Representation
B. MPAC Policy specification
To enable a collaborative authorization management of data sharing in OSNs, it is essential for multiparty access
control policies to be in place to regulate access over shared data, representing authorization requirements from multiple
associated users. Our policy specification scheme is built upon the proposed MPAC model.
Accessor Specification: Accessors are a set of users who are granted to access the shared data. Accessors can be represented
with a set of user names, a set of relationship names or a set of group names in OSNs.
Data Specification: In OSNs, user data is composed of three types of information, user profile, user relationship and user
content. To facilitate effective privacy conflict resolution for multiparty access control, we introduce sensitivity levels for
data specification, which are assigned by the controllers to the shared data items. A user’s judgment of the sensitivity level of
the data is not binary (private/public), but multi-dimensional with varying degrees of sensitivity.
Access Control Policy: To summarize the above-mentioned policy elements, we introduce the definition of a multiparty
access control policy as follows:
A multiparty access control policy is a 5-tuple P =< controller; ctype; accessor; data; effect >, where
 controller  U is a user who can regulate the access
 of data;
 ctype  CT is the type of the controller;
 accessor is a set of users to whom the authorization
 is granted, representing with an access specification.
 data is represented with a data specification and
 effect  {permit; deny} is the authorization effect of the policy.
C. Multiparty Policy Evaluation
Two steps are performed to evaluate an access request over multi- party access control policies. The first one checks
the access request against the policy specified by each controller and yields a decision for the controller. The accessor
element in a policy decides whether that policy is applicable to a request. If the user who sends the request belongs to the
user set derived from the accessor of the policy, the policy is applicable and the evaluation process returns a response with
the decision (either permit or deny) indicated by the effect element in the policy. Otherwise, the response yields deny
decision if the policy is not applicable to that request. In the second one, decisions from all controllers responding to the
access request are aggregated to make a final decision for the access request. Figure 2 illustrates the evaluation process of
multi- party access control policies.

www.ijmer.com

2809 | Page
www.ijmer.com

International Journal of Modern Engineering Research (IJMER)
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2808-2812
ISSN: 2249-6645

Figure 2: Multiparty Policy Evaluation Process

IV.

IMPLEMENTATION OF MCONTROLLER

In our proposed work, we present an application called “MController” for supporting collaborative management of
shared data. It enables multiple associated users to specify their access control policies and privacy preferences to co-control
a shared data item. Consider the social network “Facebook”. Facebook server accepts inputs from the users, and then
forwards them to the application server. The application server is responsible for the input processing and the collaborative
management of the shared data. Information related to the user data such as friend lists, user identifiers, user groups, and user
contents are stored in the MySQL database. Once the user installs MController in his/her Facebook space, MController can
access user’s basic information and contents. In particular, MController can retrieve and list all the uploaded photos, which
are owned or uploaded by the user, or where the user was tagged. Then, the user can select any photo to specify his/hery
preference. If the user is not the owner of the selected photo, then he/she only edit the privacy setting and sensitivity setting
of the photo. Otherwise, if the user is an owner of the photo, then he/she can further configure the conflict resolution
mechanism for the shared photo.
The core component of MController is the decision making module, which processes access requests and then
returns responses (either permit or deny) for the requests. Figure 3 depicts the system architecture of the decision making
module in MController. To evaluate an access request, the control policies of each controller of the targeted content are
enforced first to generate a decision for the Mcontroller. Then, the decisions of all of the controllers are aggregated to yield a
final decision as the response to that request. During the process of decision making, policy conflicts are resolved when
evaluating the controllers’ policies by adopting a strategy chain pre-defined by the controllers.

Figure 3: System Architecture of Decision Making in MController

www.ijmer.com

2810 | Page
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2808-2812
ISSN: 2249-6645
In addition, multi- party privacy conflicts are also resolved based on the configured conflict resolution method when
aggregating the decisions of controllers. If the owner of the content chooses the automatic conflict resolution, then the
aggregated sensitivity value is utilized as a threshold for making a decision. Otherwise, multi- party privacy conflicts are
resolved by applying the strategy selected by the owner, and the aggregated sensitivity score is considered as the
recommendation for that strategy selection. Regarding access requests to the disseminated contents, the final decision is
made by combining the disseminator’s decision and the original controllers’ decision through a deny-overrides combination
mechanism.

V.

SYSTEM USABILITY AND PERFORMANCE EVALUATION

A. Participants and Procedure
MController is a functional proof-of-concept implementation of collaborative privacy management. To measure the
practicality and usability of our mechanism, we conducted a survey study (n=35) to explore the factors surrounding users’
desires for privacy and discover how we might improve those implemented in MController. Specifically, we were interested
in users’ perspectives on the current Facebook privacy system and their desires for more control over photos they do not
own. Users were given the opportunity to share our application and play with their friends. While this is not a random
sampling, recruiting using the natural dissemination features of Facebook arguably gives an accurate profile of the
ecosystem. Before Using MController. Prior to using MController, users were asked a few questions about their usage of
Facebook to determine the user’s perceived usability of the current Facebook privacy controls. Since we were interested in
the maximum average perception of Facebook, we looked at the upper bound of the confidence interval. An average user
asserts at most 25% positively about the likability and control of Facebook’s privacy management mechanism, and at most
44% on Facebook’s simplicity as shown in Table 1. This demonstrates an average negative opinion of the Facebook’s
privacy controls that users currently must use.
TABLE 1
Usability Evaluation for Facebook and MController Privacy Controls
Facebook
Metric

Linkability
Simplicity
Control

Average

0.20
0.38
0.20

Upper
bound on
95%
confidence
interval
0.25
0.44
0.25

MController
Lower
bound on
Average 95%
confidence
interval
0.83
0.80
0.72
0.64
0.83
0.80

After Using MController, users were then asked to perform a few tasks in MController. Since we were interested in
the average minimum opinion of MController, we looked at the lower bound of the confidence interval. An average user
asserts at least 80% positively about the likability and control, and at least 67% positively on MController’s simplicity as
shown in Table 1. This demonstrates an average positive opinion of the controls and ideas presented to users in MController.
B. Performance Evaluation
To evaluate the performance of the policy evaluation mechanism in MController, we changed the number of the
controllers of a shared photo from 1 to 20, and assigned each controller with the average number of friends, 130, which is
claimed by Facebook statistics. Also, we considered two cases for our evaluation. In the first case, each controller allows
“friends” to access the shared photo. In the second case, controllers specify “friends of friends” as the accessors instead of
“friends”. In our experiments, we performed 1,000 independent trials and measured the performance of each trial. Since the
system performance depends on other There are O(n) MySQL calls and data fetching operations and O(1) for additional
operations. Moreover, we could observe there was no significant overhead when we run MController in Facebook.

VI.

CONCLUSION

Although social networks attempt to improve security and privacy, they have not achieved the complete or ideal
access control mechanisms that users actually demand. In current social networks, individual users can choose different
preferences, causing privacy conflicts in shared information that multiple users co- own. In this paper, we have proposed an
optimal solution for collaborative management of shared data in OSNs. A multi- party access control model was formulated,
along with a multi- party policy specification scheme and corresponding policy evaluation method. In addition, we have
introduced an approach for representing and reasoning about our proposed method. A proof-of-concept implementation of
our solution called “MController” has been discussed as well, followed by the usability study and system evaluation of our
proposed method.

www.ijmer.com

2811 | Page
www.ijmer.com

International Journal of Modern Engineering Research (IJMER)
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2808-2812
ISSN: 2249-6645

REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]

Danah boyd and Nicole B. Ellison. Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated
Communication, 13(1), 2007.
Bryan Pfaffenberger. The USENET Book: Finding, Using, and Surviving News- groups on the Internet. Addison Wesley, New
York, NY, USA, 2004.
Kiran K. Gollu, Stefan Saroiu, & Alec Wolman. (2007, October). A Social Networking-Based Access Control Scheme for Personal
Content Proc. 21st ACM Symposium on Operating Systems Principles (SOSP ’07), Stevenson,Washington. (WIP)
Carminati, B., Ferrari, E., & Perego, A. (2006, October). Rule-based access control for social networks. Paper presented at the On
the Move to Meaningful Internet SystemsWorkshops.
Carminati, B., & Ferrari, E. (2008, October). Privacy-aware collaborative access control in Web-based social networks. Paper
presented at the 22nd annual IFIPWorking Group 11.3Working Conference on Data and Applications Security, London, UK.
B. Carminati, E. Ferrari, and A. Perego. Rule-based access control for social networks. In On the Move to Meaningful Internet
Systems 2006: OTM 2006 Workshops, pages 1734–1744. Springer, 2006.
P. Fong, M. Anwar, and Z. Zhao. A privacy preservation model for facebook-style social network systems. In Proceedings of the
14th European conference on Research in computer security, pages 303–320. Springer-Verlag, 2009.
E. Carrie. Access Control Requirements for Web 2.0 Security and Privacy. In Proc. of Workshop on Web 2.0 Security & Privacy
(W2SP). Citeseer, 2007.
A. Squicciarini, M. Shehab, and F. Paci. Collective privacy management in social networks. In Proceedings of the 18th
international conference on World wide web, pages 521–530. ACM, 2009.

www.ijmer.com

2812 | Page

Weitere ähnliche Inhalte

Was ist angesagt?

Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Anil Dhami
 
Mdia5003 assignment4 metadata
Mdia5003 assignment4 metadataMdia5003 assignment4 metadata
Mdia5003 assignment4 metadatavivianhgray
 
Social Tagging Of Multimedia Content A Model
Social Tagging Of Multimedia Content A ModelSocial Tagging Of Multimedia Content A Model
Social Tagging Of Multimedia Content A ModelIJMER
 
Conor Hayes - Topics, tags and trends in the blogosphere
Conor Hayes - Topics, tags and trends in the blogosphereConor Hayes - Topics, tags and trends in the blogosphere
Conor Hayes - Topics, tags and trends in the blogosphereDERIGalway
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyCSCJournals
 
Privacy Management and the Social Web
Privacy Management and the Social Web Privacy Management and the Social Web
Privacy Management and the Social Web Jan Schmidt
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSZac Darcy
 
Measuring privacy in online social
Measuring privacy in online socialMeasuring privacy in online social
Measuring privacy in online socialijsptm
 
Jill Freyne - Collecting community wisdom: integrating social search and soci...
Jill Freyne - Collecting community wisdom: integrating social search and soci...Jill Freyne - Collecting community wisdom: integrating social search and soci...
Jill Freyne - Collecting community wisdom: integrating social search and soci...DERIGalway
 
Content tagging and recommender systems
Content tagging and recommender systemsContent tagging and recommender systems
Content tagging and recommender systemsmettadata
 
Social Information & Browsing March 6
Social Information & Browsing   March 6Social Information & Browsing   March 6
Social Information & Browsing March 6sritikumar
 
Characterization of facebook users
Characterization of facebook usersCharacterization of facebook users
Characterization of facebook usersDebesh Majumdar
 

Was ist angesagt? (18)

Kt3518501858
Kt3518501858Kt3518501858
Kt3518501858
 
Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...
 
Mdia5003 assignment4 metadata
Mdia5003 assignment4 metadataMdia5003 assignment4 metadata
Mdia5003 assignment4 metadata
 
Social Messaging Solution Matrix
Social Messaging Solution MatrixSocial Messaging Solution Matrix
Social Messaging Solution Matrix
 
Social Tagging Of Multimedia Content A Model
Social Tagging Of Multimedia Content A ModelSocial Tagging Of Multimedia Content A Model
Social Tagging Of Multimedia Content A Model
 
Next generation web
Next generation webNext generation web
Next generation web
 
Conor Hayes - Topics, tags and trends in the blogosphere
Conor Hayes - Topics, tags and trends in the blogosphereConor Hayes - Topics, tags and trends in the blogosphere
Conor Hayes - Topics, tags and trends in the blogosphere
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
 
Privacy Management and the Social Web
Privacy Management and the Social Web Privacy Management and the Social Web
Privacy Management and the Social Web
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
 
Spammer taxonomy using scientific approach
Spammer taxonomy using scientific approachSpammer taxonomy using scientific approach
Spammer taxonomy using scientific approach
 
Measuring privacy in online social
Measuring privacy in online socialMeasuring privacy in online social
Measuring privacy in online social
 
Blogosphere
BlogosphereBlogosphere
Blogosphere
 
Jill Freyne - Collecting community wisdom: integrating social search and soci...
Jill Freyne - Collecting community wisdom: integrating social search and soci...Jill Freyne - Collecting community wisdom: integrating social search and soci...
Jill Freyne - Collecting community wisdom: integrating social search and soci...
 
Paper24
Paper24Paper24
Paper24
 
Content tagging and recommender systems
Content tagging and recommender systemsContent tagging and recommender systems
Content tagging and recommender systems
 
Social Information & Browsing March 6
Social Information & Browsing   March 6Social Information & Browsing   March 6
Social Information & Browsing March 6
 
Characterization of facebook users
Characterization of facebook usersCharacterization of facebook users
Characterization of facebook users
 

Andere mochten auch

Ijmer 46051622
Ijmer 46051622Ijmer 46051622
Ijmer 46051622IJMER
 
Bk32816820
Bk32816820Bk32816820
Bk32816820IJMER
 
Eb3212531255
Eb3212531255Eb3212531255
Eb3212531255IJMER
 
Bj31204211
Bj31204211Bj31204211
Bj31204211IJMER
 
Am318385
Am318385Am318385
Am318385IJMER
 
Finite Element Analysys of Heat Exchanger
Finite Element Analysys of Heat ExchangerFinite Element Analysys of Heat Exchanger
Finite Element Analysys of Heat ExchangerIJMER
 
PROGRAMA VIII ENCUENTRO DE CONSERVATORIOS
PROGRAMA VIII ENCUENTRO DE CONSERVATORIOSPROGRAMA VIII ENCUENTRO DE CONSERVATORIOS
PROGRAMA VIII ENCUENTRO DE CONSERVATORIOSRicardo Vega Gonzalez
 
An Experimental Analysis of Performance, Combustion and Emission Characteris...
An Experimental Analysis of Performance, Combustion and  Emission Characteris...An Experimental Analysis of Performance, Combustion and  Emission Characteris...
An Experimental Analysis of Performance, Combustion and Emission Characteris...IJMER
 
Impact and Dynamics of Centralization in Transportation Cost of Cement Bag’s ...
Impact and Dynamics of Centralization in Transportation Cost of Cement Bag’s ...Impact and Dynamics of Centralization in Transportation Cost of Cement Bag’s ...
Impact and Dynamics of Centralization in Transportation Cost of Cement Bag’s ...IJMER
 
E04012533
E04012533E04012533
E04012533IJMER
 
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sBlack Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sIJMER
 
Accelerometer and EOG Based Wireless Gesture Controlled Robotic Arm
Accelerometer and EOG Based Wireless Gesture Controlled Robotic ArmAccelerometer and EOG Based Wireless Gesture Controlled Robotic Arm
Accelerometer and EOG Based Wireless Gesture Controlled Robotic ArmIJMER
 
Swarm Intelligence: An Application of Ant Colony Optimization
Swarm Intelligence: An Application of Ant Colony OptimizationSwarm Intelligence: An Application of Ant Colony Optimization
Swarm Intelligence: An Application of Ant Colony OptimizationIJMER
 
Digital Citizenship Webquest
Digital Citizenship WebquestDigital Citizenship Webquest
Digital Citizenship Webquestmdonel
 
Analysis of MOS Capacitor Loaded Annular Ring MICROSTRIP Antenna
Analysis of MOS Capacitor Loaded Annular Ring MICROSTRIP  AntennaAnalysis of MOS Capacitor Loaded Annular Ring MICROSTRIP  Antenna
Analysis of MOS Capacitor Loaded Annular Ring MICROSTRIP AntennaIJMER
 
Db3210821087
Db3210821087Db3210821087
Db3210821087IJMER
 
Bu31284290
Bu31284290Bu31284290
Bu31284290IJMER
 
Τα δικαιώματα του παιδιού
Τα δικαιώματα του παιδιούΤα δικαιώματα του παιδιού
Τα δικαιώματα του παιδιούPopi Kaza
 

Andere mochten auch (20)

Water damage NYC
Water damage NYCWater damage NYC
Water damage NYC
 
Ijmer 46051622
Ijmer 46051622Ijmer 46051622
Ijmer 46051622
 
Bk32816820
Bk32816820Bk32816820
Bk32816820
 
Eb3212531255
Eb3212531255Eb3212531255
Eb3212531255
 
Bj31204211
Bj31204211Bj31204211
Bj31204211
 
Am318385
Am318385Am318385
Am318385
 
Finite Element Analysys of Heat Exchanger
Finite Element Analysys of Heat ExchangerFinite Element Analysys of Heat Exchanger
Finite Element Analysys of Heat Exchanger
 
PROGRAMA VIII ENCUENTRO DE CONSERVATORIOS
PROGRAMA VIII ENCUENTRO DE CONSERVATORIOSPROGRAMA VIII ENCUENTRO DE CONSERVATORIOS
PROGRAMA VIII ENCUENTRO DE CONSERVATORIOS
 
An Experimental Analysis of Performance, Combustion and Emission Characteris...
An Experimental Analysis of Performance, Combustion and  Emission Characteris...An Experimental Analysis of Performance, Combustion and  Emission Characteris...
An Experimental Analysis of Performance, Combustion and Emission Characteris...
 
Impact and Dynamics of Centralization in Transportation Cost of Cement Bag’s ...
Impact and Dynamics of Centralization in Transportation Cost of Cement Bag’s ...Impact and Dynamics of Centralization in Transportation Cost of Cement Bag’s ...
Impact and Dynamics of Centralization in Transportation Cost of Cement Bag’s ...
 
E04012533
E04012533E04012533
E04012533
 
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sBlack Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
 
Accelerometer and EOG Based Wireless Gesture Controlled Robotic Arm
Accelerometer and EOG Based Wireless Gesture Controlled Robotic ArmAccelerometer and EOG Based Wireless Gesture Controlled Robotic Arm
Accelerometer and EOG Based Wireless Gesture Controlled Robotic Arm
 
Swarm Intelligence: An Application of Ant Colony Optimization
Swarm Intelligence: An Application of Ant Colony OptimizationSwarm Intelligence: An Application of Ant Colony Optimization
Swarm Intelligence: An Application of Ant Colony Optimization
 
Digital Citizenship Webquest
Digital Citizenship WebquestDigital Citizenship Webquest
Digital Citizenship Webquest
 
Smiling fish
Smiling fishSmiling fish
Smiling fish
 
Analysis of MOS Capacitor Loaded Annular Ring MICROSTRIP Antenna
Analysis of MOS Capacitor Loaded Annular Ring MICROSTRIP  AntennaAnalysis of MOS Capacitor Loaded Annular Ring MICROSTRIP  Antenna
Analysis of MOS Capacitor Loaded Annular Ring MICROSTRIP Antenna
 
Db3210821087
Db3210821087Db3210821087
Db3210821087
 
Bu31284290
Bu31284290Bu31284290
Bu31284290
 
Τα δικαιώματα του παιδιού
Τα δικαιώματα του παιδιούΤα δικαιώματα του παιδιού
Τα δικαιώματα του παιδιού
 

Ähnlich wie An Access Control Model for Collaborative Management of Shared Data in OSNs

Intelligent access control policies for Social network site
Intelligent access control policies for Social network siteIntelligent access control policies for Social network site
Intelligent access control policies for Social network siteijcsit
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Editor IJCATR
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Editor IJCATR
 
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesIRJET Journal
 
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Privacy Management of Multi User Environment in Online Social Networks (OSNs)Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Privacy Management of Multi User Environment in Online Social Networks (OSNs)IOSR Journals
 
Privacy Protection Using Formal Logics in Onlne Social Networks
Privacy Protection Using   Formal Logics in Onlne Social NetworksPrivacy Protection Using   Formal Logics in Onlne Social Networks
Privacy Protection Using Formal Logics in Onlne Social NetworksIRJET Journal
 
Implementation of Privacy Policy Specification System for User Uploaded Image...
Implementation of Privacy Policy Specification System for User Uploaded Image...Implementation of Privacy Policy Specification System for User Uploaded Image...
Implementation of Privacy Policy Specification System for User Uploaded Image...rahulmonikasharma
 
A Survey on Multi-party Privacy Disputes in Social Networks
A Survey on Multi-party Privacy Disputes in Social NetworksA Survey on Multi-party Privacy Disputes in Social Networks
A Survey on Multi-party Privacy Disputes in Social NetworksIRJET Journal
 
Detecting and Providing Solutions to Privacy Issues in Social Media
Detecting and Providing Solutions to Privacy Issues in Social MediaDetecting and Providing Solutions to Privacy Issues in Social Media
Detecting and Providing Solutions to Privacy Issues in Social MediaIRJET Journal
 
Detecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social NetworksDetecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social NetworksIRJET Journal
 
Scalable Access Control For Privacy-Aware Media Sharing.pdf
Scalable Access Control For Privacy-Aware Media Sharing.pdfScalable Access Control For Privacy-Aware Media Sharing.pdf
Scalable Access Control For Privacy-Aware Media Sharing.pdfXevol1
 
Social Networking Websites and Image Privacy
Social Networking Websites and Image PrivacySocial Networking Websites and Image Privacy
Social Networking Websites and Image PrivacyIOSR Journals
 
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...Ijripublishers Ijri
 
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...cscpconf
 
An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...
An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...
An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...Rick Vogel
 
Introduction of Social Computing-Unit 1.pptx
Introduction of Social Computing-Unit 1.pptxIntroduction of Social Computing-Unit 1.pptx
Introduction of Social Computing-Unit 1.pptxchavanprasad17092001
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.Kiran K.V.S.
 
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...csandit
 

Ähnlich wie An Access Control Model for Collaborative Management of Shared Data in OSNs (20)

Intelligent access control policies for Social network site
Intelligent access control policies for Social network siteIntelligent access control policies for Social network site
Intelligent access control policies for Social network site
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
 
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
 
Ijcatr04041017
Ijcatr04041017Ijcatr04041017
Ijcatr04041017
 
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Privacy Management of Multi User Environment in Online Social Networks (OSNs)Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
 
Privacy Protection Using Formal Logics in Onlne Social Networks
Privacy Protection Using   Formal Logics in Onlne Social NetworksPrivacy Protection Using   Formal Logics in Onlne Social Networks
Privacy Protection Using Formal Logics in Onlne Social Networks
 
Implementation of Privacy Policy Specification System for User Uploaded Image...
Implementation of Privacy Policy Specification System for User Uploaded Image...Implementation of Privacy Policy Specification System for User Uploaded Image...
Implementation of Privacy Policy Specification System for User Uploaded Image...
 
A Survey on Multi-party Privacy Disputes in Social Networks
A Survey on Multi-party Privacy Disputes in Social NetworksA Survey on Multi-party Privacy Disputes in Social Networks
A Survey on Multi-party Privacy Disputes in Social Networks
 
Detecting and Providing Solutions to Privacy Issues in Social Media
Detecting and Providing Solutions to Privacy Issues in Social MediaDetecting and Providing Solutions to Privacy Issues in Social Media
Detecting and Providing Solutions to Privacy Issues in Social Media
 
Detecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social NetworksDetecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social Networks
 
Scalable Access Control For Privacy-Aware Media Sharing.pdf
Scalable Access Control For Privacy-Aware Media Sharing.pdfScalable Access Control For Privacy-Aware Media Sharing.pdf
Scalable Access Control For Privacy-Aware Media Sharing.pdf
 
Social Networking Websites and Image Privacy
Social Networking Websites and Image PrivacySocial Networking Websites and Image Privacy
Social Networking Websites and Image Privacy
 
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
 
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...
 
An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...
An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...
An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...
 
Introduction of Social Computing-Unit 1.pptx
Introduction of Social Computing-Unit 1.pptxIntroduction of Social Computing-Unit 1.pptx
Introduction of Social Computing-Unit 1.pptx
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.
 
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...
 

Mehr von IJMER

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless BicycleIJMER
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningIJMER
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessIJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And AuditIJMER
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLIJMER
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyIJMER
 

Mehr von IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 

Kürzlich hochgeladen

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Kürzlich hochgeladen (20)

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

An Access Control Model for Collaborative Management of Shared Data in OSNs

  • 1. www.ijmer.com International Journal of Modern Engineering Research (IJMER) Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2808-2812 ISSN: 2249-6645 An Access Control Model for Collaborative Management of Shared Data in OSNS Ch. Aruna1, G. Minni2 1 M.Tech, Nimra College of Engineering & Technology, Vijayawada, A.P., India. Asst. Professor, Dept.of CSE, Nimra College of Engineering & Technology, Vijayawada, A.P., India. 2 ABSTRACT: Online social networks (OSNs) have attracted a large amount of users to regularly connect, interact and share information with each other for various purposes. Users share a tremendous amount of content with other users in social networks using various services. The recent growth of social network sites such as Twitter, Facebook and MySpace has created many interesting and challenging security and privacy problems. In OSNs, users manage their profile, interact with other users, and selforganize into different communities. Users profiles usually include information such as the user’s name, address, birthdate, contact information, emails, education, interests, photos, music, videos, blogs and many other attributes The explosive growth of private or sensitive user data that are readily available in OSNs has raised an urgent expectation for effective access control that can protect these data from unauthorized users in OSNs. This paper presents an access control model for the protection of shared data associated with multiple users in online social networks. Keywords: Access control, MController, OSN, Privacy. I. INTRODUCTION Online social networks (OSNs) serve a number of purposes, but three primary roles stand out as common across all sites. First, OSNs are used to maintain and strengthen existing social ties, or make new social connections. The sites allow users to “articulate and make visible their online social networks”, thereby “communicating with people who are already a part of their extended social network” [1]. Second, OSNs are used by each member to upload her own content. Note that the content shared often varies from site to site, and sometimes is only the user’s profile itself. Third, OSNs are used to find new, interesting content by filtering, recommending, and organizing the content uploaded by users. Full participation in OSNs requires users to register a (pseudo) identity with the network, though some sites do allow browsing public data without explicit sign-on. Users may volunteer information about themselves, for example their birthday, place of residence, interests, etc., all of which constitutes the user’s profile. The online social network itself is composed of links between users. Some sites allow users to link to any other user, without consent from the link recipient, while other sites follow a two-phase procedure that only allows a link to be established when both parties agree. Certain sites, such as Flickr, have social networks with directed links- meaning a link from A to B does not imply the presence of a reverse link, whereas others, such as Orkut, have social networks with undirected links. Most sites also enable users to create special interest groups, which are akin to Usenet [2] newsgroups. Users can post messages to groups (visible to all group members) and even upload shared content to that group. Certain groups are moderated, and admission to the group is controlled by a single group administrator, while other groups are open for any member to join. All sites today require explicit group declaration by the users; users must manually create groups, appoint administrators (if necessary), and declare which groups they are a member of. Once an identity is built, users of content sharing sites can upload content onto their account. Many such online sites enable users to mark content as public (visible to anyone) or private (visible only to their immediate “friends”), and to tag content with labels. Many sites, such as YouTube, allow users to upload an unlimited amount of video content, while other sites, such as Flickr, require that users either pay a subscription fee or be subject to an upload limit. All of the content uploaded by a given user is listed in their user’s profile, allowing other users to browse through the social network to discover new content. Typically, the content is automatically indexed, and, if publicly available, made accessible though a textual search. An example is Flickr’s photo search, which allows the users to locate photos by searching based on tags and comments. II. RELATED WORK Several studies have examined the interface design to support user awareness of the privacy risks and algorithms for relationship-based access-control scheme. In [3], the authors presented a social-networking-based access-control scheme for online information sharing by considering identities as key pairs and identifying the social relationship based on social attestations. Under this approach, a simple access-control list is employed to manage user access. A more sophisticated mechanism to manage access controls in [4], is rule- based and follows complex policies that are expressed as constraints on the type, depth, and trust level of existing relationships. This control methods is further extended by making access-control decisions completely decentralized and collaborative [5]. In [6], the authors introduced a conceptually-similar but more comprehensive trust-based access control model. This model allows the specification of access rules for online resources, where legitimate users are denoted in terms of the relationship type, depth, and trust level between users in OSNs. In [7], the authors proposed an access control model that formalizes and generalizes the access control mechanism implemented in Facebook, admitting arbitrary policy vocabularies that are based on theoretical graph properties. In [8], the authors described relationship-based access control as one of new security paradigms that addresses unique requirements of Web 2.0. In [9], the authors provided a solution for collective www.ijmer.com 2808 | Page
  • 2. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2808-2812 ISSN: 2249-6645 privacy management in OSNs. Their work considered access control policies of a data content that is co-owned by multiple users in an OSN, such that each co-owner may separately specify her/his own privacy preference for the shared content. III. MULTIPARTY ACCESS CONTROL MODEL FOR OSNS A. Multi party Access Control Model A social network can be represented by a relationship network, a set of user groups and a collection of user data (Figure 1). The relationship network of a social network is a directed labeled graph, where each node denotes a user and each edge represents a relationship between two users. The label associated with each edge represents the type of the relationship. Edge direction denotes that the initial node of an edge establishes the relationship and the terminal node of the edge accepts that relationship. The number and type of supported relationships rely on the specific social network and its purposes. Social network should allow multiple controllers, who are associated with the shared data, to specify access control policies. In addition to the owner of data, other controllers, including the stakeholder, contributor and disseminator of data, need to regulate the access of the shared data as well. Figure 1: An Example of Multiparty Social Network Representation B. MPAC Policy specification To enable a collaborative authorization management of data sharing in OSNs, it is essential for multiparty access control policies to be in place to regulate access over shared data, representing authorization requirements from multiple associated users. Our policy specification scheme is built upon the proposed MPAC model. Accessor Specification: Accessors are a set of users who are granted to access the shared data. Accessors can be represented with a set of user names, a set of relationship names or a set of group names in OSNs. Data Specification: In OSNs, user data is composed of three types of information, user profile, user relationship and user content. To facilitate effective privacy conflict resolution for multiparty access control, we introduce sensitivity levels for data specification, which are assigned by the controllers to the shared data items. A user’s judgment of the sensitivity level of the data is not binary (private/public), but multi-dimensional with varying degrees of sensitivity. Access Control Policy: To summarize the above-mentioned policy elements, we introduce the definition of a multiparty access control policy as follows: A multiparty access control policy is a 5-tuple P =< controller; ctype; accessor; data; effect >, where  controller  U is a user who can regulate the access  of data;  ctype  CT is the type of the controller;  accessor is a set of users to whom the authorization  is granted, representing with an access specification.  data is represented with a data specification and  effect  {permit; deny} is the authorization effect of the policy. C. Multiparty Policy Evaluation Two steps are performed to evaluate an access request over multi- party access control policies. The first one checks the access request against the policy specified by each controller and yields a decision for the controller. The accessor element in a policy decides whether that policy is applicable to a request. If the user who sends the request belongs to the user set derived from the accessor of the policy, the policy is applicable and the evaluation process returns a response with the decision (either permit or deny) indicated by the effect element in the policy. Otherwise, the response yields deny decision if the policy is not applicable to that request. In the second one, decisions from all controllers responding to the access request are aggregated to make a final decision for the access request. Figure 2 illustrates the evaluation process of multi- party access control policies. www.ijmer.com 2809 | Page
  • 3. www.ijmer.com International Journal of Modern Engineering Research (IJMER) Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2808-2812 ISSN: 2249-6645 Figure 2: Multiparty Policy Evaluation Process IV. IMPLEMENTATION OF MCONTROLLER In our proposed work, we present an application called “MController” for supporting collaborative management of shared data. It enables multiple associated users to specify their access control policies and privacy preferences to co-control a shared data item. Consider the social network “Facebook”. Facebook server accepts inputs from the users, and then forwards them to the application server. The application server is responsible for the input processing and the collaborative management of the shared data. Information related to the user data such as friend lists, user identifiers, user groups, and user contents are stored in the MySQL database. Once the user installs MController in his/her Facebook space, MController can access user’s basic information and contents. In particular, MController can retrieve and list all the uploaded photos, which are owned or uploaded by the user, or where the user was tagged. Then, the user can select any photo to specify his/hery preference. If the user is not the owner of the selected photo, then he/she only edit the privacy setting and sensitivity setting of the photo. Otherwise, if the user is an owner of the photo, then he/she can further configure the conflict resolution mechanism for the shared photo. The core component of MController is the decision making module, which processes access requests and then returns responses (either permit or deny) for the requests. Figure 3 depicts the system architecture of the decision making module in MController. To evaluate an access request, the control policies of each controller of the targeted content are enforced first to generate a decision for the Mcontroller. Then, the decisions of all of the controllers are aggregated to yield a final decision as the response to that request. During the process of decision making, policy conflicts are resolved when evaluating the controllers’ policies by adopting a strategy chain pre-defined by the controllers. Figure 3: System Architecture of Decision Making in MController www.ijmer.com 2810 | Page
  • 4. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2808-2812 ISSN: 2249-6645 In addition, multi- party privacy conflicts are also resolved based on the configured conflict resolution method when aggregating the decisions of controllers. If the owner of the content chooses the automatic conflict resolution, then the aggregated sensitivity value is utilized as a threshold for making a decision. Otherwise, multi- party privacy conflicts are resolved by applying the strategy selected by the owner, and the aggregated sensitivity score is considered as the recommendation for that strategy selection. Regarding access requests to the disseminated contents, the final decision is made by combining the disseminator’s decision and the original controllers’ decision through a deny-overrides combination mechanism. V. SYSTEM USABILITY AND PERFORMANCE EVALUATION A. Participants and Procedure MController is a functional proof-of-concept implementation of collaborative privacy management. To measure the practicality and usability of our mechanism, we conducted a survey study (n=35) to explore the factors surrounding users’ desires for privacy and discover how we might improve those implemented in MController. Specifically, we were interested in users’ perspectives on the current Facebook privacy system and their desires for more control over photos they do not own. Users were given the opportunity to share our application and play with their friends. While this is not a random sampling, recruiting using the natural dissemination features of Facebook arguably gives an accurate profile of the ecosystem. Before Using MController. Prior to using MController, users were asked a few questions about their usage of Facebook to determine the user’s perceived usability of the current Facebook privacy controls. Since we were interested in the maximum average perception of Facebook, we looked at the upper bound of the confidence interval. An average user asserts at most 25% positively about the likability and control of Facebook’s privacy management mechanism, and at most 44% on Facebook’s simplicity as shown in Table 1. This demonstrates an average negative opinion of the Facebook’s privacy controls that users currently must use. TABLE 1 Usability Evaluation for Facebook and MController Privacy Controls Facebook Metric Linkability Simplicity Control Average 0.20 0.38 0.20 Upper bound on 95% confidence interval 0.25 0.44 0.25 MController Lower bound on Average 95% confidence interval 0.83 0.80 0.72 0.64 0.83 0.80 After Using MController, users were then asked to perform a few tasks in MController. Since we were interested in the average minimum opinion of MController, we looked at the lower bound of the confidence interval. An average user asserts at least 80% positively about the likability and control, and at least 67% positively on MController’s simplicity as shown in Table 1. This demonstrates an average positive opinion of the controls and ideas presented to users in MController. B. Performance Evaluation To evaluate the performance of the policy evaluation mechanism in MController, we changed the number of the controllers of a shared photo from 1 to 20, and assigned each controller with the average number of friends, 130, which is claimed by Facebook statistics. Also, we considered two cases for our evaluation. In the first case, each controller allows “friends” to access the shared photo. In the second case, controllers specify “friends of friends” as the accessors instead of “friends”. In our experiments, we performed 1,000 independent trials and measured the performance of each trial. Since the system performance depends on other There are O(n) MySQL calls and data fetching operations and O(1) for additional operations. Moreover, we could observe there was no significant overhead when we run MController in Facebook. VI. CONCLUSION Although social networks attempt to improve security and privacy, they have not achieved the complete or ideal access control mechanisms that users actually demand. In current social networks, individual users can choose different preferences, causing privacy conflicts in shared information that multiple users co- own. In this paper, we have proposed an optimal solution for collaborative management of shared data in OSNs. A multi- party access control model was formulated, along with a multi- party policy specification scheme and corresponding policy evaluation method. In addition, we have introduced an approach for representing and reasoning about our proposed method. A proof-of-concept implementation of our solution called “MController” has been discussed as well, followed by the usability study and system evaluation of our proposed method. www.ijmer.com 2811 | Page
  • 5. www.ijmer.com International Journal of Modern Engineering Research (IJMER) Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2808-2812 ISSN: 2249-6645 REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] Danah boyd and Nicole B. Ellison. Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(1), 2007. Bryan Pfaffenberger. The USENET Book: Finding, Using, and Surviving News- groups on the Internet. Addison Wesley, New York, NY, USA, 2004. Kiran K. Gollu, Stefan Saroiu, & Alec Wolman. (2007, October). A Social Networking-Based Access Control Scheme for Personal Content Proc. 21st ACM Symposium on Operating Systems Principles (SOSP ’07), Stevenson,Washington. (WIP) Carminati, B., Ferrari, E., & Perego, A. (2006, October). Rule-based access control for social networks. Paper presented at the On the Move to Meaningful Internet SystemsWorkshops. Carminati, B., & Ferrari, E. (2008, October). Privacy-aware collaborative access control in Web-based social networks. Paper presented at the 22nd annual IFIPWorking Group 11.3Working Conference on Data and Applications Security, London, UK. B. Carminati, E. Ferrari, and A. Perego. Rule-based access control for social networks. In On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, pages 1734–1744. Springer, 2006. P. Fong, M. Anwar, and Z. Zhao. A privacy preservation model for facebook-style social network systems. In Proceedings of the 14th European conference on Research in computer security, pages 303–320. Springer-Verlag, 2009. E. Carrie. Access Control Requirements for Web 2.0 Security and Privacy. In Proc. of Workshop on Web 2.0 Security & Privacy (W2SP). Citeseer, 2007. A. Squicciarini, M. Shehab, and F. Paci. Collective privacy management in social networks. In Proceedings of the 18th international conference on World wide web, pages 521–530. ACM, 2009. www.ijmer.com 2812 | Page