8
http://www.iaeme.com/IJCIET/index.asp 725 [email protected] International Journal of Civil Engineering and Technology (IJCIET) Volume 8, Issue 9, September 2017, pp. 725–732, Article ID: IJCIET_08_09_081 Available online at http://http://www.iaeme.com/ijciet/issues.asp?JType=IJCIET&VType=8&IType=9 ISSN Print: 0976-6308 and ISSN Online: 0976-6316 © IAEME Publication Scopus Indexed ENHANCED PRIVACY SETTINGS IN ONLINE CONTENT SHARING WEBSITES USING KEY DISTRIBUTION CENTER (KDC) Ganesan R, Hemalatha D Assistant Professor, Department of Computer Science & Engineering, Vel Tech University, Avadi, Chennai, Tamil Nadu, India Justin Joseph Associate Professor, Cardinal Cleemis School of Management Studies, Trivandrum, Kerala, India ABSTRACT The growth of Social media eruptive among the people. Progressively developed social sites like Facebook, Google+, LinkedIn, Flickr etc allows the users to create, view and share the post. Privacy is an essential facet required in Online Social Media. The users upload their photos of interest to the social sites that expect to gain public interest for social motive. The uncovered personal information lead to many slipping process like identity creeping, privacy breaching, stealing, morphing etc. which are considered as the privacy violations. In this paper, a comparative study about the necessity of the privacy in Online Social Networks is inspected. Commenced by the importance of the Social media among the users and their characteristic behavior towards the network which is followed by the privacy techniques coined by many researchers and finally the enhanced techniques to improvise the privacy are studied. At last, an overview of the merits and demerits of the privacy techniques for the user’s uploaded image are presented. Result of this work can be utilized to develop a new system which will help the user to provide privacy to the sensitive information and control it from getting stolen from any mobile devices. Keywords: Privacy, Breaching, Online Social Network, Social media, Sensitive information, Mobile devices Cite this Article: Ganesan R, Hemalatha D and Justin Joseph, Enhanced Privacy Settings in Online Content Sharing Websites Using Key Distribution Center (Kdc), International Journal of Civil Engineering and Technology, 8(9), 2017, pp. 725–732. http://www.iaeme.com/IJCIET/issues.asp?JType=IJCIET&VType=8&IType=9

ENHANCED PRIVACY SETTINGS IN ONLINE CONTENT SHARING … · 2017. 9. 23. · CONTENT SHARING WEBSITES USING KEY DISTRIBUTION CENTER (KDC) Ganesan R, Hemalatha D Assistant Professor,

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: ENHANCED PRIVACY SETTINGS IN ONLINE CONTENT SHARING … · 2017. 9. 23. · CONTENT SHARING WEBSITES USING KEY DISTRIBUTION CENTER (KDC) Ganesan R, Hemalatha D Assistant Professor,

http://www.iaeme.com/IJCIET/index.asp 725 [email protected]

International Journal of Civil Engineering and Technology (IJCIET) Volume 8, Issue 9, September 2017, pp. 725–732, Article ID: IJCIET_08_09_081

Available online at http://http://www.iaeme.com/ijciet/issues.asp?JType=IJCIET&VType=8&IType=9

ISSN Print: 0976-6308 and ISSN Online: 0976-6316

© IAEME Publication Scopus Indexed

ENHANCED PRIVACY SETTINGS IN ONLINE

CONTENT SHARING WEBSITES USING KEY

DISTRIBUTION CENTER (KDC)

Ganesan R, Hemalatha D

Assistant Professor, Department of Computer Science & Engineering,

Vel Tech University, Avadi, Chennai, Tamil Nadu, India

Justin Joseph

Associate Professor, Cardinal Cleemis School of Management Studies,

Trivandrum, Kerala, India

ABSTRACT

The growth of Social media eruptive among the people. Progressively developed

social sites like Facebook, Google+, LinkedIn, Flickr etc allows the users to create,

view and share the post. Privacy is an essential facet required in Online Social Media.

The users upload their photos of interest to the social sites that expect to gain public

interest for social motive. The uncovered personal information lead to many slipping

process like identity creeping, privacy breaching, stealing, morphing etc. which are

considered as the privacy violations. In this paper, a comparative study about the

necessity of the privacy in Online Social Networks is inspected. Commenced by the

importance of the Social media among the users and their characteristic behavior

towards the network which is followed by the privacy techniques coined by many

researchers and finally the enhanced techniques to improvise the privacy are studied.

At last, an overview of the merits and demerits of the privacy techniques for the user’s

uploaded image are presented. Result of this work can be utilized to develop a new

system which will help the user to provide privacy to the sensitive information and

control it from getting stolen from any mobile devices.

Keywords: Privacy, Breaching, Online Social Network, Social media, Sensitive

information, Mobile devices

Cite this Article: Ganesan R, Hemalatha D and Justin Joseph, Enhanced Privacy

Settings in Online Content Sharing Websites Using Key Distribution Center (Kdc),

International Journal of Civil Engineering and Technology, 8(9), 2017, pp. 725–732.

http://www.iaeme.com/IJCIET/issues.asp?JType=IJCIET&VType=8&IType=9

Page 2: ENHANCED PRIVACY SETTINGS IN ONLINE CONTENT SHARING … · 2017. 9. 23. · CONTENT SHARING WEBSITES USING KEY DISTRIBUTION CENTER (KDC) Ganesan R, Hemalatha D Assistant Professor,

Ganesan R, Hemalatha D and Justin Joseph

http://www.iaeme.com/IJCIET/index.asp 726 [email protected]

1. INTRODUCTION

With the improvements in the Online Social Network, the number of social media users have

been increased. It insist the user to create new contact, tag the old friends, share the common

opinion etc. among the people in the groups. It serves as a communication media among the

users. Increased features in the social websites makes the users more active. As a result, the

users share their sensitive informations and images to their circles. With the lack of

knowledge about the privacy setting provided by the social network, the users share their

informations and images among the peoples in the group. It results in dangerous

consequences faced by the social users like identity creeping, identity stealing, privacy

breaching, morphing etc. In spite of these risks, many privacy mechanisms that are coined by

different systems are very poor.

A user’s profile consists of informations like residential address, common area of interest,

educational details, organizational details etc. As a part of social networking, tagging and

linking concepts are introduced. An image uploaded by the user is tagged by a friend to

different members in the group to gain public interest. But this concept gets complicated in

developing environment as the users are not aware about the consequences of such concept.

Instead of preventing peoples from this dangerous trap, social medias like Facebook, twitter,

google+ attracts people to come into it.

Online social network is still in developing stage. Increasing Entries of users, expect some

additional functionalities from the social networks. It is not sure that the social networks are

secured portal for both personal and commercial interactions among the users. But the peoples

trust those social networks as a safest mode of interaction and upload their personal

informations and images to get shared among others. This results in many slipping processes

and make users to meet unavoidable problems.

The paper work explains about the existing systems suggested by other researchers and

Section III focuses about the proposed system and finally Section IV discusses summary of

findings made in our study work.

Figure 1 Social Media Landscape

2. RELATED WORK

In this section, we present a keen idea about the importance of privacy in Online Social

Networks, Users behavior towards the network and techniques coined by different researching

in order to prevent privacy issues in those Online Social Networks.

Page 3: ENHANCED PRIVACY SETTINGS IN ONLINE CONTENT SHARING … · 2017. 9. 23. · CONTENT SHARING WEBSITES USING KEY DISTRIBUTION CENTER (KDC) Ganesan R, Hemalatha D Assistant Professor,

Enhanced Privacy Settings in Online Content Sharing Websites Using Key Distribution Center (Kdc)

http://www.iaeme.com/IJCIET/index.asp 727 [email protected]

2.1. USER INTERACTIONS IN SOCIAL NETWORKS

The paper addresses the questions:

1) Are social connections substantial pointers of genuine client collaboration?

2) If not, at that point how might we measure these components to fabricate an exact

model for assessing socially-improved applications?

The study uses the interaction graphs to quantify user interactions. This will help to

disseminate the meaning to online social links. It means that the graph contains fewer super

nodes with high degree so that the overall diameter of the network will notably increases. The

examination affirms the suspicion that long range interpersonal communication application

should utilize the genuine pointer of client collaborations in type of social graphs.

Figure 2 Pattern of Social relationship between peoples

2.2. FLOUNDERS WITH PRIVACY SETTING IN AN ONLINE COMMUNITY

OSN community such as Myspace and Facebook are exceedingly popular. These social sites

help the people to develop and maintain the relationship among other peoples by means of

viewing and sharing the personal informations. The amount of the informations shared in the

online social network has been inclined as the features and functionality of those networking

community increased. This paper works on the expansion of the previous research of under-

utilization of the privacy setting, identifying the current behavior of user, the place where the

privacy options fail to meet the need. The result of this work evidence the importance of the

privacy mechanisms and the awareness regarding the privacy to the users.

Figure 3 The Geosocial Universe

2.3. A3P POLICY FOR SHARING IMAGES IN ONLINE SOCIAL NETWORK

The A3P system is coined to meet the problem of unexpected exposure of one’s personal

information who persist in social environment. Versatile Privacy policy prediction framework

intends to give an issue free protection alternative by creating customized arrangement

consequently. It works with two-level in its working environment i) A3P-Core and ii) A3P-

Social.

Page 4: ENHANCED PRIVACY SETTINGS IN ONLINE CONTENT SHARING … · 2017. 9. 23. · CONTENT SHARING WEBSITES USING KEY DISTRIBUTION CENTER (KDC) Ganesan R, Hemalatha D Assistant Professor,

Ganesan R, Hemalatha D and Justin Joseph

http://www.iaeme.com/IJCIET/index.asp 728 [email protected]

Figure 4 A3P System Architecture

A3P-Core performs two operations image classification and adaptive policy prediction

while S3P-Social performs modeling of social context and identifying social groups. The

above architecture provides the pictorial representation of the functionality of A3P

architecture.

2.4. PRIVACY - AWARE IMAGE CLASSIFICATION AND SEARCH

This work proposes the techniques of automatic detection of private images in order to

provide a better overview on privacy options provided by the social sites. The work also

enables the privacy-oriented image searching. It encapsulates the classification models for

private searching of images and diversify the query result to provide the better scope of

private and open informations.

Figure 5 Public photos and Private photos

2.5. ACCESS CONTROL MECHANISM FOR ONLINE IMAGES USING

TAGS AND LINKED DATA.

This work proposes a system that helps the user to provide an eloquent and meaningful access

control mechanism for the user’s uploaded images on the sites using both linked data and also

tags. By this concept, the user can create and modify his photo album and import the metadata

of those images from the other sites where the user photos are hosted. In this case, the script

on the server side will collect all the relevant details including user’s profile, access control

policies determining whether the user is allowed to access the uploaded images.

Page 5: ENHANCED PRIVACY SETTINGS IN ONLINE CONTENT SHARING … · 2017. 9. 23. · CONTENT SHARING WEBSITES USING KEY DISTRIBUTION CENTER (KDC) Ganesan R, Hemalatha D Assistant Professor,

Enhanced Privacy Settings in Online Content Sharing Websites Using Key Distribution Center (Kdc)

http://www.iaeme.com/IJCIET/index.asp 729 [email protected]

Figure 6 Access Control provided by the Linked Data

Techniques

for privacy Merits Demerits

Design

oriented

privacy suites

Design

policies are

transparent

in nature.

Difficult to

understand by

normal users

Study on

social circles

Flexible for

finding

association

among the

users.

Unable to

process for

higher number

of users.

Compression

schemes for

images

Simple to

use

Overhead in

computational

process

Privacy

protector

tools

Transparent

process

Highly

difficult to

understand

Tagging

concepts

Transparent

process

Inefficient

handling of

large set of

users.

Linked data

to the tags

and keywords

Link with

multiple sites

Limited set of

connecting the

linked data

Image

classification

and search

for privacy

schemes

Performs

direct search

for protected

data

High

complexity

Table 1 Relational study of merits and demerits of privacy analysis

2.6. A NEW GROUP KEY TRANSFER PROTOCOL

The work focuses on mutually trusted Key Distribution by using KDC (Key Distribution

Center) to generate and distribution the credentials i.e. session key to all the members of the

community secretly. In this policy, the key is transmitted at once to all the members but only

the authorized user can recover the actual key with the available details. The main advantage

is that even when the master key is leaked, the attacker will not be able to find the session

Page 6: ENHANCED PRIVACY SETTINGS IN ONLINE CONTENT SHARING … · 2017. 9. 23. · CONTENT SHARING WEBSITES USING KEY DISTRIBUTION CENTER (KDC) Ganesan R, Hemalatha D Assistant Professor,

Ganesan R, Hemalatha D and Justin Joseph

http://www.iaeme.com/IJCIET/index.asp 730 [email protected]

key. This is done for group key transfer using hash function along with Advanced Encryption

Standard (AES) in order to provide confidentiality.

Figure 7 Session Key Exchange using AES

2.7. SYMMETRIC KEY DISTRIBUTION IN DYNAMIC MULTICAST

NETWORK

Multicast refers to the process of sending data to several number of users across computer

network at the same time. All the receivers of this data will definitely share a session key.

Dynamic change in the session key will ensure the secrecy both forward and backward. There

are some complexities like communication of keys, storage etc. which are examined in this

work. By examining the reason for these complexities, the study proposes a new multicast key

distribution scheme which reduces the computational complexity to the extent by reducing the

load on each group. The main advantage of this paper is that it uses the MDS (Maximum

Distance Separable) code instead of using traditional encryption algorithms

Figure 8 Encryption & Decryption using symmetric key

3. PROPOSED WORK

The main contribution for the existing A3P architecture for providing different levels of

privacy access to the uploaded images is an experience based informal community plan. The

system can be utilized for a wide number of utilizations, for example, a drop-in swap for an

up close and personal key dispersion benefit for future secure correspondence.

Page 7: ENHANCED PRIVACY SETTINGS IN ONLINE CONTENT SHARING … · 2017. 9. 23. · CONTENT SHARING WEBSITES USING KEY DISTRIBUTION CENTER (KDC) Ganesan R, Hemalatha D Assistant Professor,

Enhanced Privacy Settings in Online Content Sharing Websites Using Key Distribution Center (Kdc)

http://www.iaeme.com/IJCIET/index.asp 731 [email protected]

Figure 9 System Architecture

Key Distribution Center (KDC) is a part of cryptosystem intended to reduce the risk

inherent in exchanging keys. The algorithm used by our center is AES (Advanced Encryption

Standard) which is a symmetric encryption algorithm that uses similar key for both encryption

and decryption of the data. AES is planned to be efficient in both hardware and software

environment. It supports a block length of 128 bits and key length of 128, 192 and 256 bits.

The KDC operating with AES produces a key based on the server. The client receives the key

and submits it to the appropriate server which verifies the submitted key and grant access to

user submitting it.

Figure 10 Operation of KDC

4. SUMMARY

In this present modern world, a large amount of data which is considered as private is being

shared in the social networks. Those data include personal information and images that are

shared by millions of users.

For preventing malevolent activities, a well-organized privacy system is required. In this

paper, a relative study is made on the privacy setting in Online Social Networks. In specific to

the study, we examined the enhanced privacy setting for the user uploaded images. For this

work, we sum up that the importance of privacy is yet to be proliferated. Hence it is put

forward that the privacy in the Online Social Networks for the user uploaded information

need to be enhanced. The seclusion in social sites should board their users with different

layers of privacy settings for their uploaded images regardless of time and location

Page 8: ENHANCED PRIVACY SETTINGS IN ONLINE CONTENT SHARING … · 2017. 9. 23. · CONTENT SHARING WEBSITES USING KEY DISTRIBUTION CENTER (KDC) Ganesan R, Hemalatha D Assistant Professor,

Ganesan R, Hemalatha D and Justin Joseph

http://www.iaeme.com/IJCIET/index.asp 732 [email protected]

REFERENCES

[1] Acquisti .A and Gross .R, Imagined communities: Awareness, information sharing, and

privacy on the facebook, in Proc. 6th Int. Conf. Privacy Enhancing Technol. Workshop,

2006, pp. 36–58.

[2] Bonneau .J, Anderson .J, and Danezis .G, Prying data out of a social network, in Proc. Int.

Conf. Adv. Soc. Netw. Anal. Mining, 2009, pp.249–254.Jiang .J et al., Understanding

Latent Interactions in Online Social Networks, Proc. IMC, 2010.

[3] Choudhury .M .D, Sundaram .H, Y.-R. Lin, John .A, and Seligmann .D .D, Connecting

content to community in social media via image content, user tags and user

communication, in Proc. IEEE Int. Conf. Multimedia Expo, 2009, pp.1238–1241.

[4] Datta .R, Joshi .D, Li .J and Wang .J, Image retrieval: Ideas, influences, and trends of the

new age, ACM Comput. Surv., vol. 40, no. 2, p. 5, 2008.

[5] Mohit Kumar and Ghrera .S .P, A New Group Key Transfer Protocol using CBU Hash

Function, Indian Journal of Science and Technology, Vol 7(1), 19–24, January 2014

[6] Rajani .J, Rajani .D, A Novel Approach for Secured Symmetric Key Distribution in

Dynamic Multicast Networks, International Journal of Engineering Inventions ISSN:

2278-7461, www.ijeijournal.com Volume 1, Issue 5 (September2012) PP: 33-40

[7] Seshadri .R et. Al, Raghu Trivedi T Generation of key for Session key Distribution Using

Bio-Metrics, International Journal on Computer Science and Engineering Vol. 02, No. 06,

2010, 1992-1995

[8] Soumya K, Shyam Kishore G, Design and Implementation of Rijndael Encryption

Algorithm Based on FPGA, IJCSMC, Vol. 2, Issue. 9, Sep 2013, pg.120-127, 2013.

[9] Silva Torres .R and Falc~ao .A, Content-based image retrieval: Theory and applications ,

Revista de Information Teorica e Aplicada, vol. 2, no. 13, pp. 161–185, 2006.

[10] Squicciarini .A .C, Sundareswaran .S, Lin D and Wede .J, A3p: Adaptive policy

prediction for shared images over popular content sharing sites.

[11] Dr. Md. Tabrez Quasim and Mohammad. Meraj, Big Data Security and Privacy: A Short

Review, International Journal of Mechanical Engineering and Technology, 8(4), 2017, pp.

408-412.

[12] Dr. Koppula Srinivas Rao, Efficient Security and Privacy in Decentralized Authority

using Attribute-Based Encryption. International Journal of Computer Engineering and

Technology, 7(6), 2016, pp. 55–63

[13] Strater .K and Lipford .H, Strategies and struggles with privacy in an online social

networking community, in Proc. Brit. Comput. Soc. Conf. Human-Comput. Interact, 2008,

pp.111–119.

[14] Wilson .C et al., User Interactions in Social Networks and Their Implications, Proc.

EuroSys, 2009.

[15] Yeh .C .H, Ho .Y-C., Barsky .B .A, and Ouhyoung .M, Personalized photograph ranking

and selection system, in Proc. Int. Conf. Multimedia, 2010, pp. 211–220. [Online].

Available: http://doi.acm.org/10.1145/1873951.1873963

[16] Yeung .C .A, Kagal .L, Gibbins .N, and Shadbolt .N, Providing access control to online

photo albums based on tags and linked data, in Proc. Soc. Semantic Web: Where Web 2.0

Meets Web 3.0 at the AAAI Symp., 2009, pp. 9-14.

[17] Zerr .S, Siersdorfer .S, Hare .J, and Demidova .E, Privacy-aware image classification and

search, in Proc. 35th Int. ACM SIGIR Conf. Res. Develop. Inform. Retrieval, 2012, pp.

35–44.