Security Features of Users for Online Social Networks

Radhakrishna*, K. Chandra Sekharaiah**
* Associate Professor, Department of Computer Science and Engineering, V.S. Lakshmi Engineering College for Women, Andra Pradesh, India.
** Professor, School of Information Technology, Jawaharlal Nehru Technological University, Hydrabad, Andra Pradesh, India.
Periodicity:September - November'2014
DOI : https://doi.org/10.26634/jcom.2.3.3313

Abstract

In recent years, Online Social Network (OSN's) have a great growth and a fabulous usage for thousands of millions of users on the Internet. These OSNs have become a main forum for digital social interactions and sharing of Information among users, but they does not have a proper facility of providing security and privacy apprehensions. Users manage these OSN’s access to share data, and presently there is no method to provide proper privacy concerns over the usage of data by multiple users. In this paper, the authors have suggested an approach in how to allow and protect the shared data of multiple users associated in OSN’s. The authors have designed a method to declaim these sense of multiple use conditions, including a method of policy specification of multiple users, and how to use this method of security of user's data. In this paper, the authors have included a logical representation of users access control model, which allows many users to work or extend this model. Proof of concept of approach of safety for an application on face book has been discussed and usability study and evaluation of the method, has been provided.

Keywords

Social Network,Multiparty Access Control,Policy Specification and Management.

How to Cite this Article?

Krishna, A.R., and Sekharaiah, K.C. (2014). Security Features of Usersfor Online Social Networks. i-manager’s Journal on Computer Science, 2(3), 17-24. https://doi.org/10.26634/jcom.2.3.3313

References

[1]. G. Ahn and H. Hu, (2007). “Towards Realizing a Formal th RBAC Model in Real Systems,” Proceedings of 12 ACM Symposiam on Access Control Models and Technologies, pp.215-224.
[2]. G. Ahn, H.Hu, J. Lee, and Y. Meng, (2010). “Representing and Reasoning about Web Access Control th Policies,” Proceedings of IEEE 34 Annual Computer Software and Applications Conference (COMPSAC), pp. 137-146.
[3]. A. Besmer and H.R. Lipford, (2010). “Moving beyond Untagging: Photo Privacy in a Tagged World,” th Proceedings of 28 International Conference on Human Factors in Computing Systems, pp.1563-1572.
[4]. L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda, (2009). “All Your Contacts Are Belong to Us: Automated Identity theft th Attacks on Social Networks,” Proceedings of 18 International Conference on World Wide Web, pp.551- 560.
[5]. B. Carminati and E. Ferrari, (2011). “Collaborative Access Control in OnLine Social Networks,” Proceedings of Seventh International Conference on Collaborative Computing: Networking, Applications and Work sharing (Collaborate-Com), pp.231-240.
[6]. B. Carminati, E. Ferrari, and A. Perego(2006). “Rule- Based Access Control for Social Networks,” Proceedings of International Conference on the Move to Meaningful Internet Systems, pp. 1734-1744.
[7]. Richard D. Nordstrom, Richard L. Pinkerton (1999). “Taking Advantage of Internet-Sources to Build a Competitive intelligence system”, Competitive Intelligence Review, Vol.10(1), pp.56-61.
[8]. A. Pirttila (1998). “Organizing Competitive intelligence Activities in a Corporate Organization”, Aslib Proceedings. Vol.50(4), pp.79-84.
[9]. P. L. Tom (1991). “Managing Information as a Corporate Resource”, Harper Collins Publishers, Second Edition.
[10]. J. I. Jr. Cash (1994). “Building the Information –age Organization: Structure, Control, and Information Technologies”, Third Edition, Irwin Book Series in Information Systems.
[11]. Chen H C, Chau M, Zeng D (2002). “CI spider: a tool for Competitive Intelligence on the Web”, Decision Support Systems, Vol.34(1), pp.1-17.
[12]. Powell J H, Bradford J P (2000). “Targeting intelligence Gathering in a Dynamic Competitive Environment”. International Journal of Information Management, Vol. 20(3), pp.181-195.
[13]. Porter, A. L. and Cunningham, S. W. (2005). “Tech Mining: Exploiting New Technologies for Competitive Advantage”, Sixth Edition, Hoboken, N. J.Wiley.
[14]. Guo, W.D. Xin, Z.H. Wang, L.L. and Du, W.W. (2007). “Establishment Research of Competitive Intelligence nd System in Telecom Enterprises”, 2 International Conference on Research and Practical Issues of Enterprise Information Systems, Beijing, Peoples R China, pp.14-16.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.