View
2
Download
0
Category
Preview:
Citation preview
http://www.iaeme.com/IJCIET/index.asp 725 editor@iaeme.com
International Journal of Civil Engineering and Technology (IJCIET) Volume 8, Issue 9, September 2017, pp. 725–732, Article ID: IJCIET_08_09_081
Available online at http://http://www.iaeme.com/ijciet/issues.asp?JType=IJCIET&VType=8&IType=9
ISSN Print: 0976-6308 and ISSN Online: 0976-6316
© IAEME Publication Scopus Indexed
ENHANCED PRIVACY SETTINGS IN ONLINE
CONTENT SHARING WEBSITES USING KEY
DISTRIBUTION CENTER (KDC)
Ganesan R, Hemalatha D
Assistant Professor, Department of Computer Science & Engineering,
Vel Tech University, Avadi, Chennai, Tamil Nadu, India
Justin Joseph
Associate Professor, Cardinal Cleemis School of Management Studies,
Trivandrum, Kerala, India
ABSTRACT
The growth of Social media eruptive among the people. Progressively developed
social sites like Facebook, Google+, LinkedIn, Flickr etc allows the users to create,
view and share the post. Privacy is an essential facet required in Online Social Media.
The users upload their photos of interest to the social sites that expect to gain public
interest for social motive. The uncovered personal information lead to many slipping
process like identity creeping, privacy breaching, stealing, morphing etc. which are
considered as the privacy violations. In this paper, a comparative study about the
necessity of the privacy in Online Social Networks is inspected. Commenced by the
importance of the Social media among the users and their characteristic behavior
towards the network which is followed by the privacy techniques coined by many
researchers and finally the enhanced techniques to improvise the privacy are studied.
At last, an overview of the merits and demerits of the privacy techniques for the user’s
uploaded image are presented. Result of this work can be utilized to develop a new
system which will help the user to provide privacy to the sensitive information and
control it from getting stolen from any mobile devices.
Keywords: Privacy, Breaching, Online Social Network, Social media, Sensitive
information, Mobile devices
Cite this Article: Ganesan R, Hemalatha D and Justin Joseph, Enhanced Privacy
Settings in Online Content Sharing Websites Using Key Distribution Center (Kdc),
International Journal of Civil Engineering and Technology, 8(9), 2017, pp. 725–732.
http://www.iaeme.com/IJCIET/issues.asp?JType=IJCIET&VType=8&IType=9
Ganesan R, Hemalatha D and Justin Joseph
http://www.iaeme.com/IJCIET/index.asp 726 editor@iaeme.com
1. INTRODUCTION
With the improvements in the Online Social Network, the number of social media users have
been increased. It insist the user to create new contact, tag the old friends, share the common
opinion etc. among the people in the groups. It serves as a communication media among the
users. Increased features in the social websites makes the users more active. As a result, the
users share their sensitive informations and images to their circles. With the lack of
knowledge about the privacy setting provided by the social network, the users share their
informations and images among the peoples in the group. It results in dangerous
consequences faced by the social users like identity creeping, identity stealing, privacy
breaching, morphing etc. In spite of these risks, many privacy mechanisms that are coined by
different systems are very poor.
A user’s profile consists of informations like residential address, common area of interest,
educational details, organizational details etc. As a part of social networking, tagging and
linking concepts are introduced. An image uploaded by the user is tagged by a friend to
different members in the group to gain public interest. But this concept gets complicated in
developing environment as the users are not aware about the consequences of such concept.
Instead of preventing peoples from this dangerous trap, social medias like Facebook, twitter,
google+ attracts people to come into it.
Online social network is still in developing stage. Increasing Entries of users, expect some
additional functionalities from the social networks. It is not sure that the social networks are
secured portal for both personal and commercial interactions among the users. But the peoples
trust those social networks as a safest mode of interaction and upload their personal
informations and images to get shared among others. This results in many slipping processes
and make users to meet unavoidable problems.
The paper work explains about the existing systems suggested by other researchers and
Section III focuses about the proposed system and finally Section IV discusses summary of
findings made in our study work.
Figure 1 Social Media Landscape
2. RELATED WORK
In this section, we present a keen idea about the importance of privacy in Online Social
Networks, Users behavior towards the network and techniques coined by different researching
in order to prevent privacy issues in those Online Social Networks.
Enhanced Privacy Settings in Online Content Sharing Websites Using Key Distribution Center (Kdc)
http://www.iaeme.com/IJCIET/index.asp 727 editor@iaeme.com
2.1. USER INTERACTIONS IN SOCIAL NETWORKS
The paper addresses the questions:
1) Are social connections substantial pointers of genuine client collaboration?
2) If not, at that point how might we measure these components to fabricate an exact
model for assessing socially-improved applications?
The study uses the interaction graphs to quantify user interactions. This will help to
disseminate the meaning to online social links. It means that the graph contains fewer super
nodes with high degree so that the overall diameter of the network will notably increases. The
examination affirms the suspicion that long range interpersonal communication application
should utilize the genuine pointer of client collaborations in type of social graphs.
Figure 2 Pattern of Social relationship between peoples
2.2. FLOUNDERS WITH PRIVACY SETTING IN AN ONLINE COMMUNITY
OSN community such as Myspace and Facebook are exceedingly popular. These social sites
help the people to develop and maintain the relationship among other peoples by means of
viewing and sharing the personal informations. The amount of the informations shared in the
online social network has been inclined as the features and functionality of those networking
community increased. This paper works on the expansion of the previous research of under-
utilization of the privacy setting, identifying the current behavior of user, the place where the
privacy options fail to meet the need. The result of this work evidence the importance of the
privacy mechanisms and the awareness regarding the privacy to the users.
Figure 3 The Geosocial Universe
2.3. A3P POLICY FOR SHARING IMAGES IN ONLINE SOCIAL NETWORK
The A3P system is coined to meet the problem of unexpected exposure of one’s personal
information who persist in social environment. Versatile Privacy policy prediction framework
intends to give an issue free protection alternative by creating customized arrangement
consequently. It works with two-level in its working environment i) A3P-Core and ii) A3P-
Social.
Ganesan R, Hemalatha D and Justin Joseph
http://www.iaeme.com/IJCIET/index.asp 728 editor@iaeme.com
Figure 4 A3P System Architecture
A3P-Core performs two operations image classification and adaptive policy prediction
while S3P-Social performs modeling of social context and identifying social groups. The
above architecture provides the pictorial representation of the functionality of A3P
architecture.
2.4. PRIVACY - AWARE IMAGE CLASSIFICATION AND SEARCH
This work proposes the techniques of automatic detection of private images in order to
provide a better overview on privacy options provided by the social sites. The work also
enables the privacy-oriented image searching. It encapsulates the classification models for
private searching of images and diversify the query result to provide the better scope of
private and open informations.
Figure 5 Public photos and Private photos
2.5. ACCESS CONTROL MECHANISM FOR ONLINE IMAGES USING
TAGS AND LINKED DATA.
This work proposes a system that helps the user to provide an eloquent and meaningful access
control mechanism for the user’s uploaded images on the sites using both linked data and also
tags. By this concept, the user can create and modify his photo album and import the metadata
of those images from the other sites where the user photos are hosted. In this case, the script
on the server side will collect all the relevant details including user’s profile, access control
policies determining whether the user is allowed to access the uploaded images.
Enhanced Privacy Settings in Online Content Sharing Websites Using Key Distribution Center (Kdc)
http://www.iaeme.com/IJCIET/index.asp 729 editor@iaeme.com
Figure 6 Access Control provided by the Linked Data
Techniques
for privacy Merits Demerits
Design
oriented
privacy suites
Design
policies are
transparent
in nature.
Difficult to
understand by
normal users
Study on
social circles
Flexible for
finding
association
among the
users.
Unable to
process for
higher number
of users.
Compression
schemes for
images
Simple to
use
Overhead in
computational
process
Privacy
protector
tools
Transparent
process
Highly
difficult to
understand
Tagging
concepts
Transparent
process
Inefficient
handling of
large set of
users.
Linked data
to the tags
and keywords
Link with
multiple sites
Limited set of
connecting the
linked data
Image
classification
and search
for privacy
schemes
Performs
direct search
for protected
data
High
complexity
Table 1 Relational study of merits and demerits of privacy analysis
2.6. A NEW GROUP KEY TRANSFER PROTOCOL
The work focuses on mutually trusted Key Distribution by using KDC (Key Distribution
Center) to generate and distribution the credentials i.e. session key to all the members of the
community secretly. In this policy, the key is transmitted at once to all the members but only
the authorized user can recover the actual key with the available details. The main advantage
is that even when the master key is leaked, the attacker will not be able to find the session
Ganesan R, Hemalatha D and Justin Joseph
http://www.iaeme.com/IJCIET/index.asp 730 editor@iaeme.com
key. This is done for group key transfer using hash function along with Advanced Encryption
Standard (AES) in order to provide confidentiality.
Figure 7 Session Key Exchange using AES
2.7. SYMMETRIC KEY DISTRIBUTION IN DYNAMIC MULTICAST
NETWORK
Multicast refers to the process of sending data to several number of users across computer
network at the same time. All the receivers of this data will definitely share a session key.
Dynamic change in the session key will ensure the secrecy both forward and backward. There
are some complexities like communication of keys, storage etc. which are examined in this
work. By examining the reason for these complexities, the study proposes a new multicast key
distribution scheme which reduces the computational complexity to the extent by reducing the
load on each group. The main advantage of this paper is that it uses the MDS (Maximum
Distance Separable) code instead of using traditional encryption algorithms
Figure 8 Encryption & Decryption using symmetric key
3. PROPOSED WORK
The main contribution for the existing A3P architecture for providing different levels of
privacy access to the uploaded images is an experience based informal community plan. The
system can be utilized for a wide number of utilizations, for example, a drop-in swap for an
up close and personal key dispersion benefit for future secure correspondence.
Enhanced Privacy Settings in Online Content Sharing Websites Using Key Distribution Center (Kdc)
http://www.iaeme.com/IJCIET/index.asp 731 editor@iaeme.com
Figure 9 System Architecture
Key Distribution Center (KDC) is a part of cryptosystem intended to reduce the risk
inherent in exchanging keys. The algorithm used by our center is AES (Advanced Encryption
Standard) which is a symmetric encryption algorithm that uses similar key for both encryption
and decryption of the data. AES is planned to be efficient in both hardware and software
environment. It supports a block length of 128 bits and key length of 128, 192 and 256 bits.
The KDC operating with AES produces a key based on the server. The client receives the key
and submits it to the appropriate server which verifies the submitted key and grant access to
user submitting it.
Figure 10 Operation of KDC
4. SUMMARY
In this present modern world, a large amount of data which is considered as private is being
shared in the social networks. Those data include personal information and images that are
shared by millions of users.
For preventing malevolent activities, a well-organized privacy system is required. In this
paper, a relative study is made on the privacy setting in Online Social Networks. In specific to
the study, we examined the enhanced privacy setting for the user uploaded images. For this
work, we sum up that the importance of privacy is yet to be proliferated. Hence it is put
forward that the privacy in the Online Social Networks for the user uploaded information
need to be enhanced. The seclusion in social sites should board their users with different
layers of privacy settings for their uploaded images regardless of time and location
Ganesan R, Hemalatha D and Justin Joseph
http://www.iaeme.com/IJCIET/index.asp 732 editor@iaeme.com
REFERENCES
[1] Acquisti .A and Gross .R, Imagined communities: Awareness, information sharing, and
privacy on the facebook, in Proc. 6th Int. Conf. Privacy Enhancing Technol. Workshop,
2006, pp. 36–58.
[2] Bonneau .J, Anderson .J, and Danezis .G, Prying data out of a social network, in Proc. Int.
Conf. Adv. Soc. Netw. Anal. Mining, 2009, pp.249–254.Jiang .J et al., Understanding
Latent Interactions in Online Social Networks, Proc. IMC, 2010.
[3] Choudhury .M .D, Sundaram .H, Y.-R. Lin, John .A, and Seligmann .D .D, Connecting
content to community in social media via image content, user tags and user
communication, in Proc. IEEE Int. Conf. Multimedia Expo, 2009, pp.1238–1241.
[4] Datta .R, Joshi .D, Li .J and Wang .J, Image retrieval: Ideas, influences, and trends of the
new age, ACM Comput. Surv., vol. 40, no. 2, p. 5, 2008.
[5] Mohit Kumar and Ghrera .S .P, A New Group Key Transfer Protocol using CBU Hash
Function, Indian Journal of Science and Technology, Vol 7(1), 19–24, January 2014
[6] Rajani .J, Rajani .D, A Novel Approach for Secured Symmetric Key Distribution in
Dynamic Multicast Networks, International Journal of Engineering Inventions ISSN:
2278-7461, www.ijeijournal.com Volume 1, Issue 5 (September2012) PP: 33-40
[7] Seshadri .R et. Al, Raghu Trivedi T Generation of key for Session key Distribution Using
Bio-Metrics, International Journal on Computer Science and Engineering Vol. 02, No. 06,
2010, 1992-1995
[8] Soumya K, Shyam Kishore G, Design and Implementation of Rijndael Encryption
Algorithm Based on FPGA, IJCSMC, Vol. 2, Issue. 9, Sep 2013, pg.120-127, 2013.
[9] Silva Torres .R and Falc~ao .A, Content-based image retrieval: Theory and applications ,
Revista de Information Teorica e Aplicada, vol. 2, no. 13, pp. 161–185, 2006.
[10] Squicciarini .A .C, Sundareswaran .S, Lin D and Wede .J, A3p: Adaptive policy
prediction for shared images over popular content sharing sites.
[11] Dr. Md. Tabrez Quasim and Mohammad. Meraj, Big Data Security and Privacy: A Short
Review, International Journal of Mechanical Engineering and Technology, 8(4), 2017, pp.
408-412.
[12] Dr. Koppula Srinivas Rao, Efficient Security and Privacy in Decentralized Authority
using Attribute-Based Encryption. International Journal of Computer Engineering and
Technology, 7(6), 2016, pp. 55–63
[13] Strater .K and Lipford .H, Strategies and struggles with privacy in an online social
networking community, in Proc. Brit. Comput. Soc. Conf. Human-Comput. Interact, 2008,
pp.111–119.
[14] Wilson .C et al., User Interactions in Social Networks and Their Implications, Proc.
EuroSys, 2009.
[15] Yeh .C .H, Ho .Y-C., Barsky .B .A, and Ouhyoung .M, Personalized photograph ranking
and selection system, in Proc. Int. Conf. Multimedia, 2010, pp. 211–220. [Online].
Available: http://doi.acm.org/10.1145/1873951.1873963
[16] Yeung .C .A, Kagal .L, Gibbins .N, and Shadbolt .N, Providing access control to online
photo albums based on tags and linked data, in Proc. Soc. Semantic Web: Where Web 2.0
Meets Web 3.0 at the AAAI Symp., 2009, pp. 9-14.
[17] Zerr .S, Siersdorfer .S, Hare .J, and Demidova .E, Privacy-aware image classification and
search, in Proc. 35th Int. ACM SIGIR Conf. Res. Develop. Inform. Retrieval, 2012, pp.
35–44.
Recommended