Author/Authors :
Praveena، K.Rachel نويسنده M.TECH (CSE), School of IT, JNTUH,Hyderabad, India, Praveena, K.Rachel , Bhavani، S.Durga نويسنده Professor in CSE, School of IT,JNTUH, Hyderabad,India , , Babu، K.Suresh نويسنده Assistant Professor in CSE, School of IT, JNTUH, Hyderabad, India, ,
Abstract :
Online Social Networks (OSNs) are essentially designed to facilitate people to share personal
and public information and make social connections with others. These OSNs propose goodlooking
means for digital social communications and information distribution, but also raise a
number of security and privacy issues. Whereas OSNs allow users to control access to shared
data, at the moment they do not provide any mechanism to implement privacy concerns over
data connected with multiple users. The proposed approach is to facilitate the defense of shared
data associated with many users in OSNs. We put together an access control replica to capture
the essence of multiparty agreement requirements, along with a multiparty strategy requirement
scheme and a policy enforcement mechanism. Here present a logical demonstration of our
access control model which allows us to influence the features of presented logic solvers to
execute various analysis tasks on our model. We introduced a proof-of-concept prototype of our
move toward as part of an application in Face book and make available usability study and
system valuation of our method. The survival of OSNs that include person detailed information
creates attractive openings for various applications ranging from advertising to group of people
organization. Security and privacy concerns need to be deal with for creating such applications.
Improving social network access control systems appears as the first step toward addressing the
existing security and privacy concerns related to online social networks. To address some of the
current limitations, we have created an experimental social network using synthetic data which
we then use to test the efficacy of the semantic reasoning based approaches we have previously
suggested.