Online social networks have experienced tremendous growth in recent years and become a de facto portal for hundreds of millions of Internet users. These online social networks offer attractive means for digital social interactions and information sharing, but also move up a number of privacy and security issues. While online social networks allow users to control access to shared data, they presently do not provide any mechanism to enforce privacy concerns over data associated with many users. To this end, we propose an approach to enable the protection of shared data associated with multiple users in online social networks. We prepare an access control model to take into custody the essence of multiparty authorization requirements, along with a policy enforcement mechanism and a multiparty policy specification system. This paper we going study about model and mechanism systems in analysis of multiparty access control. The correctness of realization of an access control model is based on the premise that the access control model is valid...We pursue an efficient solution to facilitate collaborative management of common data in OSNs. We begin by investigate how the lack of multiparty access control for data sharing in OSNs can undermine the protection of user data. Some distinctive data sharing patterns with respect to multiparty authorization in OSNs are also identified. We make official a Multiparty Access Control (MPAC) model for OSNs
                
  
    | Keywords | 
  
    | OSNs, access control model, multiparty authorization requirements, multiparty policy specification
      scheme, a policy enforcement mechanism, Multiparty Access Control (MPAC) | 
  
    | INTRODUCTION | 
  
    | Online social networks (OSNs) such as Facebook, Twitter , and Google+ are inherently designed to enable people to
      share personal and public information and make social connections with coworkers, family, friends, colleagues, and
      even with strangers. In Facebook users can allow groups, friends, and friends of friends or public to right to use their
      data, depending on their personal authorization and privacy requirements. Although Online social networks presently
      provide simple access control mechanisms allowing users to govern access to information contained in their own
      spaces, users, unfortunately, have no power over data residing outside their spaces. Such as, if a user posts a comment
      in a friend’s space, he/she cannot specify which users can view the comment. | 
  
    | Existing System | 
  
    | OSNs currently provide simple access control mechanisms allowing users to govern access to information
      contained in their own spaces, users, unfortunately, have no power over data residing outside their spaces. Such as, if a
      user posts a comment in a friend’s space, he/she cannot specify which users can view the comment. In another case,
      while a user uploads tags and the photograph friends who appear in the photograph, the tagged friends cannot restrict
      who can see this photograph, even though the tagged friends may have different privacy concerns about the photo. To
      address such a serious issue, beginning protection mechanisms have been offered by existing online social networks
      (OSNs). | 
  
    | • Access to a resource is granted while the requestor is able to demonstrate of being authorized. | 
  
    | • Every user in the group can access the shared content. | 
  
    | • Not give any mechanism to enforce privacy concerns over data associated with multiple users | 
  
    | • if a user posts a comment in a friend’s space, he/she cannot specify which users can view the comment | 
  
    | • while a user uploads a photo and tags friends who appear in the photograph, the tagged friends cannot
      restrict who can see this photograph | 
  
    | Proposed System | 
  
    | Our solution is to support the analysis of multiparty access control model and mechanism systems. The correctness of
      execution of an access control model is based on the premise that the access control model is suitable. Moreover, while
      the use of multiparty access control mechanism can greatly enhance the flexibility for regulating data sharing in Online
      social networks (OSNs), it may potentially reduce the certainty of system authorization consequences due to the reason
      that authorization and privacy conflicts need to be resolved elegantly. We specially analyze the scenario like content
      sharing to understand the risks posted by the lack of collaborative control in online social networks (OSNs). | 
  
    | Proposed System Advantages | 
  
    | • It checks the access request against the policy specified for every user and yields a decision for the access. | 
  
    | • The use of multiparty access control mechanism can greatly enhance the flexibility for regulating data sharing
      in online social networks | 
  
    | • present any mechanism to enforce privacy concerns over data associated with many users | 
  
    | • if a user posts a comment in a friend’s space, he/she can specify which users can view the comment | 
  
    | WEB ACCESS CONTROL POLICIES | 
  
    | A.Representing and Reasoning | 
  
    | We propose a systematic method to represent XACML policies in answer set programming (ASP), a declarative
      programming paradigm oriented towards combinatorial search problems and knowledge intensive applications.
      Compared to a few existing approaches to formalizing XACML policies. our formal representation is more
      straightforward and can cover more XACML features. Furthermore, translating XACML to ASP allows us to leverage
      off-the-shelf ASP solvers for a variety of analysis services such as policy verification, comparison and querying. In
      addition, in order to support reasoning about role-based authorization constraints, we introduce a general specification
      scheme for RBAC constraints along with a policy analysis framework, which facilitates the analysis of constraint
      violations in XACML-based RBAC policies. The expressivity of ASP, such as ability to handle default reasoning and
      represent transitive closure, helps manage XACML and RBAC constraints that cannot be handled in other logic-based
      approaches . We also overview our tool XACML2ASP and conduct experiments with real-world XACML policies to
      evaluate the effectiveness and efficient of our solution | 
  
    | B.Requirements for Web 2.0 Security and Privacy | 
  
    | The increased social networking capabilities provided by Web 2.0 technologies requires a examination of what we
      consider "private" and what we consider "personal" information, and will consequently drive a new way of limiting and
      monitoring the information that we make public online. Web 2.0 applications are creating large, composite
      conglomerations of personal data and so we need new approaches to describe and execute access organize on that data.
      "Private" information at present tends to be insecurely defined by legislation, rather than by what individuals consider
      to be personal. Generic information such as a person's home address and phone number are normally considered
      personally identical information (PII) and are to be protected when collected and stored by an organization in addition,
      the use and release of exact data, such as medical or financial information, is restricted legislatively. However, It also
      exists information that an individual may consider to be personal, and want to let loose only to people meeting
      particular criteria (such as people attending the same school) or particular people (such as close friends). Thus
      someone might want to control portions of their digital life in the same manner that they control what information is
      released in their analog life. In the world, a person can choose to tell someone or some group some piece of information
      about themselves. On the other hand, it is often the case that in the online world these controls do not exist, most
      important to de facto public disclosure. | 
  
    | ONLINE SOCIAL NETWORKS | 
  
    | A.Collaborative Face Recognition for Improved Face Annotation in Personal Photo Collections Shared on Online
      Social Networks | 
  
    | We propose a novel collaborative face recognition frame work, improving the accuracy of face annotation by
      effectively making use of multiple face recognition engines available in online social networks. Our collaborative face recognition framework consists of two major parts: merging (or fusion) and selection of face recognition engines of
      multiple face recognition results. The selection of face recognition engines aims at determining a set of modified face
      recognition engines that are suitable for recognizing query face images belonging to a particular member of the Online
      social networks. For this purpose, we use both social network context in an online social networks and social context in
      personal photograph collections. In addition, to take advantage of the availability of multiple face recognition results
      retrieved from the selected face recognition engines, we devise two effective solutions for merging face recognition
      results, adopting traditional techniques for combining multiple classifier outputs. Experiments were conducted using
      547 991 personal photographs collected from an existing Online social networks. Our results demonstrate that the
      proposed collaborative face recognition method is able to significantly improve the accuracy of face annotation,
      compared to conventional face recognition approaches that only make use of a single face recognition engine. Further,
      we demonstrate that our collaborative face recognition framework has a low computational cost and comes with a
      design that is suited for deployment in a decentralized online social network. | 
  
    | B.Protection model and policy language: | 
  
    | Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access
      control. The Gates coined the term Relationship-Based Access Control (ReBAC) to refer to this paradigm.
      Relationship-Based Access Control is characterized by the explicit tracking of interpersonal relationships between
      users, and the expression of access control policies in terms of these relationships. This work explores what it takes to
      widen the applicability of Relationship-Based Access Control to application domains other than social computing. We
      prepare an archetypical Relationship-Based Access Control model to capture the essence of the standard, that is,
      authorization decisions are based on the relationship between the resource owner and the resource accessor in a social
      network maintained by the security system. A novelty of the model is that it captures the contextual nature of
      associations. We work out a policy language, based on modal logic, for composing access control policies that support
      delegation of trust. We use a case study in the domain of Electronic Health Records to demonstrate the utility of our
      model and its policy language. This provides initial evidence to the feasibility and utility of Relationship-Based Access
      Control as a general-purpose paradigm of access control. | 
  
    | C. Multiparty Authorization Framework for Data Sharing and An Active Detection of Identity Clone Attacks | 
  
    | We propose a multiparty authorization framework (MAF) to model and realize multiparty access control in online
      social networks. We begin by examining how the lack of multiparty access control for data sharing in online social
      networks can undermine the security of user data. A multiparty authorization model is then formulated to capture the
      core features of multiparty authorization requirements which have not been accommodated so far by existing access
      control systems and models for online social networks. In Meanwhile, as conflicts are inevitable in multiparty
      authorization specification and enforcement, systematic conflict resolution mechanism is also addressed to cope with
      authorization and privacy conflicts in our framework. We first examine and characterize the behaviors of ICAs. Then
      we propose a detection framework that is focused on discovering suspicious identities and then validating them.
      Towards detecting suspicious identities, we propose two approaches based on attribute similarity and similarity of
      friend networks. The first approach addresses a simpler scenario where mutual friends in friend networks are
      considered; and the second one captures the scenario where similar friend identities are concerned. We also current
      experimental results to demonstrate flexibility and effectiveness of the proposed approaches. Finally, Some feasible
      solutions to validate suspicious identities. | 
  
    | MPAC Model: | 
  
    | OSN can be represented by a relationship network. OSNs provide each member a Web space where users can
      store and manage their personal data including profile information, friend list and content. Indeed, a flexible access
      control mechanism in a multi-user environment like OSNs should allow multiple controllers, who are associated with
      the shared data, to specify access control policies. We identified previously in the sharing patterns, in addition to the
      other controllers, owner of data including the stakeholder, contributor and disseminator of data, need to regulate the
      access of the shared data as well | 
  
    | We define these controllers as follows: | 
  
    | Definition 1: (Owner). Let d be a data item in the space of a user u in the social network. The user u is called the
      owner of d. | 
  
    | Definition 2: (Contributor). Let d be a data item published by a user u in someone else’s space in the social network.
      The user u is called the contributor of d. | 
  
    | Definition 3: (Stakeholder). Let d be a data item in the space of a user in the social network. Let T be the set of tagged
      users associated with d. A user u is called a stakeholder of d, if u ∈ T | 
  
    | Definition 4: (Disseminator). Let d be a data item shared by a user u from someone else’s space to his/her space in the
      social network. The user u is called a disseminator of d. | 
  
    | MPAC Policy Specification: | 
  
    | The MPAC policies | 
  
    | (1) “Alice authorizes her friends to view her status identified by status01 with a medium sensitivity level, where Alice
      is the owner of the status.” | 
  
    | (2) “Bob authorizes users who are his colleagues or in hiking group to view a photo, summer.jpg, that he is tagged in
      with a high sensitivity level, where Bob is
      a stakeholder of the photo.” | 
  
    | (3) “Carol disallows Dave and Edward to watch a video, play.avi, that she uploads to someone else’s spaces with a
      highest sensitivity level, where Carol is the contributor of the video.” | 
  
    | are expressed as: | 
  
    | 1) p1 = (Alice,OW, {< friendOf,RN >},
      < status01, 0.50 >, permit) | 
  
    | (2) p2 = (Bob, ST, {< colleageOf,RN >,
      < hiking,GN >},< summer.jpg, 0.75 >, permit) | 
  
    | (3) p3 = (Carol,CB, {< Dave,UN >,
      < Edward,UN >},< play.avi, 1.00 >, deny) | 
  
    | METHODOLOGIES | 
  
    | A methodology is the process of acquiring communication traces in large scale parallel application. | 
  
    | Modules Name:Authentication (login /Registration), Profile, Friends, Send request, Group, Photos | 
  
    | In this module user make our profile that details store in database the profile contains name, contact no, and email
      address, photos, and other information. Logged users can see their details and if they wish to change any of their
      information they can edit it. | 
  
    | In this module user select friend to send request. logged user view request accept our friend request | 
  
    | In this module user add new photo and publish the content based on our selected members in that group. Who appear in
      the photo, the tagged friends can restrict who can see this photo if ( user = = Allow) that User will be allowed to access
      the data’s Else User will be not allowed to access the data’s This module enables the user to upload the photos to their
      photo gallery and maintain their album. | 
  
    | FUTURE ENHANCEMENT | 
  
    | We define security to the application where the data which is being shared by the owner in the wall of the friends
      profile is restricted to share in his wall based on the sharing policy defined by the owner. | 
  
    | CONCLUSION | 
  
    | In our multiparty access control system for model and mechanism, a group of users could collude with one another
      so as to manipulate the final access control decision. An attack scenarios, anywhere a set of malicious users may want
      to make a shared photo available to a wider audience. Suppose they can access the photo, and then they all tag
      themselves or fake their identities to the photo. In addition, they collude with each other to assign a very low sensitivity
      level for the photo and specify policies to grant a wider audience to access the photo with a large number of colluding
      users, the photo may be disclosed to those users who are not expected to gain the access. To prevent such an attack
      scenario from occurring, three conditions need to be satisfied: (1) there is no fake identity in OSNs; (2) all tagged users
      are real users appeared in the photo; and (3) all controllers of the photo are honest to specify their privacy preferences. | 
  
    | Figures at a glance | 
  
    | 
 
    |  |  |  |  
    | Figure 1 | Figure 2 | Figure 3 |  | 
    | 
 
    |  |  |  |  
    | Figure 4 | Figure 5 | Figure 6 |  | 
  
    |  | 
  
    | References | 
  
    | G. Ahn, H. Hu,  J. Lee, and Y. Meng.Representing and reasoning about web access control  policies. In Computer Software and Applications Conference (COMPSAC), 2010  IEEE 34th Annual, pages 137âÃâ¬Ãâ146. IEEE, 2010.
 E. Carrie.  Access Control Requirements for Web 2.0 Security and Privacy.In Proc. Of  Workshop on Web 2.0 Security & Privacy (W2SP).Citeseer, 2007.
 J. Choi, W. De  Neve, K. Plataniotis, and Y. Ro. Collaborative face recognition for improved  face annotation in personal photo collections shared on online social networks. Multimedia, IEEE Transactions on, 13(1):14âÃâ¬Ãâ28, 2011.
 P. Fong.  Relationship-based access control: Protection model and policy language. In Proceedings  of the first ACM conference on Data and application security and privacy,  pages 191âÃâ¬Ãâ202. A CM, 2011.
 J. Golbeck.  Computing and applying trust in web-based social networks. Ph.D. thesis,  University of Maryland at College Park College Park, MD,USA. 2005.
 H. Hu and G.  Ahn.Multiparty authorization framework for data sharing in online social  networks. In Proceedings of the 25th annual IFIP WG 11.3 conference on Data  and applications security and privacy, pages 29âÃâ¬Ãâ43. Springer-Verlag, 2011.
 H. Hu, G. Ahn,  and K. Kulkarni. Anomaly discovery and resolution in web access control  policies. In Proceedings of the 16th ACM symposium on Access control models  and technologies, pages 165âÃâ¬Ãâ 174. ACM, 2011.
 B. Viswanath, A.  Post, K. Gummadi, and A. Mislove. An analysis of social network- based sybil  defenses. In ACM SIGCOMM Computer Communication Review, volume 40, pages  363âÃâ¬Ãâ374. ACM, 2010.
 G. Wondracek, T.  Holz, E. Kirda, and C. Kruegel.A practical attack to de-anonymize social  network users. In 2010 IEEE Symposium on Security and Privacy, pages  223âÃâ¬Ãâ238.IEEE, 2010.
 E. Zheleva and  L. Getoor. To join or not to join: the illusion of privacy in social networks  with mixed public and private user profiles. In Proceedings of the 18th  international conference on World wide web, pages 531âÃâ¬Ãâ540. ACM, 2009.
 |