STABILIZING SECURITY OF DISTRIBUTED DATA AMONG MULTIPLE USERS
Abstract
Social networks comprise a significant feature permitting consumer prearranged in assemblage and raise concerns concerning the fortification about confidentiality. Several schemes of access control have been introduced to maintain specifications of fine-grained authorization intended for online social networks. Numerous networks are represented in communities and are developed within the characteristic organizational structures that are supposed to support the normal flow of work. In model of multiparty admission, online social network are depicted through an association system, a gathering of consumer data. Representation of multiparty access is put together for confining interior description of the needs of mutual approval which were not up to the point by surviving systems of access control as well as models for social networks. An admittance organizing method within multi-user surroundings similar to online social networking have to permit numerous managers, towards identifying admittance managing strategy.
Keywords
References
J. Choi, W. De Neve, K. Plataniotis, and Y. Ro. Collaborative face recognition for improved face annotation in personal photo collections shared on online social networks. Multimedia, IEEE Transactions on, 13(1):14–28, 2011.
A. Squicciarini, S. Sundareswaran, D. Lin, and J. Wede. A3p: adaptive policy prediction for shared images over popular content sharing sites. In Proceedings of the 22nd ACM conference on Hypertext and hypermedia, pages 261–270. ACM, 2011.
A. Besmer and H. Richter Lipford. Moving beyond untagging: Photo privacy in a tagged world. In Proceedings of the 28th international conference on Human factors in computing systems, pages 1563– 1572. ACM, 2010.
B. Qureshi, G. Min, and D. Kouvatsos. Collusion detection and prevention with fire+ trust and reputation model. In Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on, pages 2548–2555. IEEE, 2010.
B. Carminati and E. Ferrari. Collaborative access control in online social networks. In Proceedings of the 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), pages 231–240. IEEE, 2011.
L. Jin, H. Takabi, and J. Joshi. Towards active detection of identity clone attacks on online social networks. In Proceedings of the first ACM conference on Data and application security and privacy, pages 27–38. ACM, 2011.
P. Fong, M. Anwar, and Z. Zhao. A privacy preservation model for facebook-style social network systems. In Proceedings of the 14th European conference on Research in computer security, pages 303–320. Springer-Verlag, 2009.
A. Mislove, B. Viswanath, K. Gummadi, and P. Druschel. You are who you know: Inferring user profiles in online social networks. In Proceedings of the third ACM international conference on Web search and data mining, pages 251–260. ACM, 2010.
L. Lam and S. Suen. Application of majority voting to pattern recognition: an analysis of its behavior and performance. Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactionson, 27(5):553–568, 2002.
P. Fong. Relationship-based access control: Protection model and policy language. In Proceedings of the first ACM conference on Data and application security and privacy, pages 191–202. ACM, 2011.
H. Hu, G.-J. Ahn, and J. Jorgensen. Detecting and resolving privacy conflicts for collaborative data sharing in online social networks. In Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC ’11, pages 103–112. ACM, 2011.
A. Squicciarini, F. Paci, and S. Sundareswaran. PriMa: an effective privacy protection mechanism for social networks. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pages 320–323. ACM, 2010.
B. Viswanath, A. Post, K. Gummadi, and A. Mislove. An analysis of social network-based sybil defenses. In ACM SIGCOMM Computer Communication Review, volume 40, pages 363–374. ACM, 2010.
E. Zheleva and L. Getoor. To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. In Proceedings of the 18th international conference on World wide web, pages 531–540. ACM, 2009.
“Multiparty Access Control for Online Social Networks: Model and Mechanisms”, Hongxin Hu, Gail-Joon Ahn, and Jan Jorgensen,2013.
Refbacks
- There are currently no refbacks.
Copyright © 2012 - 2023, All rights reserved.| ijitr.com
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.