International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET ISO 9001:2008 Certified Journal Page 395
A SURVEY ON PRIVACY IN SOCIAL NETWORKING WEBSITES
Dr. N. Jayalakshmi1, R.G. Kavitha2.
1 Professor, Dept. of Computer Applications, Saveetha Engineering College, Chennai, India.
2 Assistant Professor, Dept. of Computer Applications, RNS First Grade College, Bangalore, India.
-------------------------------------------------------------------------------------------------------------------------------------------------
Abstract - Most Social Networking Websites
facilitate users with the features like online
interaction, sharing of information and developing
new relationships etc. As a result, more and more
data containing personal information such as
name, gender, age, birthday, email address, phone
number, current university/company, political
views and so on are published over the Internet,
which might be lead to a serious privacy leakage.
Since some of these items are sensitive, access
control is widely employed in order to protect the
privacy of users. The current protection
mechanisms, such as privacy policies and access
control mechanisms fall short on protecting the
privacy of the users. This paper presents a survey
on different frameworks for privacy enhanced
social networking websites, which technically
enforces the protection of the personal
information of a user, when interacting with social
applications.
Keywords: Privacy, Social Networking Sites, trust,
privacy watch, privacy crypt, Hippocratic Social
Network
1. Introduction
Social networking websites have become a potential target
for attackers due to the availability of sensitive
information as well as its large user base. Therefore,
privacy and security issues in online social networks are
increasing. Privacy issue is one of the main concerns, since
many social network users are not careful about what they
expose on their social network space. Many social
networking sites try to prevent the exploitations, but many
attackers are still able to overcome those security counter
measures by using different techniques. Social network
users may not be aware of such threats. A survey on
different privacy frameworks in social networking
websites to prevent from the privacy issues are discussed
in this paper.
2. OAUTH (Open Authorization) Framework
Mohamed Shehab et al. proposed OAuth framework. It
provides a secure and efficient mechanism for authorizing
third-party applications without releasing a user’s access
credentials. OAuth framework increases user privacy by
separating the role of users from that of third party
applications. Users need not share their private credentials
with third party application, instead OAuth issues a new
set of credentials. These new credentials are represented
via an Access Token. An access token is a string which
denotes a unique set of permissions granted to a third
party application. After getting the approval from the
resource owner, an authorization server issues access
token to the third party application. Authorization code
flow is shown in the figure 1. The authorization flow
process consists of three parties: End-user (resource
owner) at browser, Client (third-party application),
Authorization server (e.g., Facebook). When a third party
application needs to access user’s resources, it presents its
Access Token to the service provider. The authorization
server authenticates the end user, and decides whether to
grant or deny the third-party application’s access request
[1].
Figure 1. Authorization code OAuth flow.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET ISO 9001:2008 Certified Journal Page 396
3. Privacy Crypt
Robert Koch et al. implemented a prototype called Privacy
crypt. It uses two core modules (the crypto-module and
encoding module) and the page module. It is an extension
of well known Firefox browser. It ensures the privacy of
data released on public severs in the internet. When the
user requests a website, a small key-icon is shown in the
status bar of the Firefox browser. On clicking the icon, a
dialog box will be displayed. Figure 2 shows the dialog box
which asks the user to enter the key. The key is stored in
the database as strings. Once the key is entered, the user
can work just as usual. When the user sends a new status
message, privacy crypt encrypts it and sends the cipher to
the server. The user can not see the encrypted text. Both
the encryption and decryption process are fully
transparent and carried out in the background. The
friends of the user must enter this key. Then the cipher
text is decrypted and the readable message is shown as
usual. Therefore the user and his friends who know the
key can only read the message. Using Privacy crypt, the
user can control the distribution of her data in an easy and
effective way [2].
Figure 2. Dialog for entering a new encryption key
4. Privacy Management Models
Gorrell P Check et al. proposed two privacy management
models namely Group-based policy Management with
assisted friend grouping and Same-as Policy Management.
Gorrell P Check et al. predefined ten relationship groups:
family, close friends, graduate school, under graduate
school, high school, work, acquaintances, friends of friend,
community, and other. Group based policy management
helps the user to populate groups based on relationship. It
also assigns object permissions to the groups. Assisted
friend grouping assists in grouping their friends and
setting friend level exceptions within the group policy.
Figure 3 shows role based access control. Same-as policy
management leverages users’ memory and opinion of their
friends to set policies for other similar friends [3].
Figure 3. Role based access control.
5. Digital Image Authentication Model
The images from social networking websites can be easily
downloaded, edited, morphed and shared. The validation
of the ownership is practically impossible due to high
degree of replication. Nidhi Grover et al. proposed digital
image authentication model to secure the unintentional
use of personal images by someone else. Embedding
algorithm and extraction algorithm are used in this model.
The subscriber’s login detail and current timestamp will be
converted to binary and it will be hidden the original
image. It is done using embedding algorithm. Embedding
algorithm is shown in figure 4.
Figure 4. Embedding Block diagram
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET ISO 9001:2008 Certified Journal Page 397
Figure 5. Extraction Block Diagram
If any fake user tries to use the original image for creating
a fake ID, SN provider compares it with the original
embedded data and detects the fake use. It is done by
extraction algorithm. Misuse of the images can be
prevented using the model is shown in figure 5 [4].
6. Multiparty Access Control (MPAC) model
Hongxin Hu et al. introduced MPAC model. MPAC model
enables the protection of shared data associated with
multiple users in SNS. MPAC model enforces privacy
concerns over data associated with multiple users in SNS.
It describes relationships of five individuals, Alice (A), Bob
(B), Carol (C), Dave (D), and Edward (E), along with their
groups of interests. Figure 6 shows an example of
Multiparty social networking. It shows that the users may
be directly connected by more than one edge labeled with
different relationship types. In addition, the users may
also have transitive relationship, such as friends-of-
friends (FOF), colleagues-of-colleagues (COC) and
classmates-of-classmates (LOL). It is noticed that some
data items have multiple controllers and some users may
be the controllers of multiple data items. It also shows that
the users can participate in the fashion and hiring group.
Some users can also join in multiple groups. Thus MPAC
model can greatly enhance the flexibility for regulating
data sharing in SNSs [5].
Figure 6. An example of multiparty social network
presentation.
7. Footlights
Jonathan Anderson et al. designed and implemented an
architecture called footlights. Footlight’s design constraint
is trust. Users need not trust any third party with their
private data.
Footlight uses cloud storage providers to hold user data.
This data is broken into fixed sized blocks and then
encrypted. When the users share with their friends,
footlights reveals encryption keys to the client software of
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET ISO 9001:2008 Certified Journal Page 398
the chosen users only. The local Footlights client software
interprets blocks that have been shared with it as a file
system. The subsets of these data can be exposed to
applications through a security API. Figure 7 shows file
system layers visible to applications. Footlights provide an
API that lets applications work with user data but not leak
it beyond the user’s consent.
Applications bundle files in a directory to be shared with
other users, but footlights allows sharing only with explicit
expression of user intent. Applications can access data
such as photos directly if the user explicitly expresses
intent [6].
Figure 7. File system layers visible to applications.
8. Privacy watch
Esma Aïmeur et al. introduced privacy watch framework.
Privacy watch provides users with an easy and flexible to
specify and communicate their privacy concerns to other
users, third parties and SNS service provider. There are
four privacy levels: No Privacy, Soft Privacy, Hard Privacy
and Full Privacy. Based on his privacy level, the user can
determine how
Figure 8. Overview of Privacy Watch
much information he would like to share with the
provider. Figure 8 shows the overview of Privacy watch.
Server access control in privacy watch manages the access
control mechanism to the personal information of the user
for his friends. It acts as a proxy sitting between the
personal information of the user and his friends. The SNS
server is responsible for strong the personal information
of the user. The users have Client Privacy Manager. It is
responsible for helping the user to maintain their
sovereignty of their personal information. Privacy watch
relies on third party email server such as Hotmail and
Gmail. It is used to store and exchange encryption and
decryption keys as well as UPP (User Privacy Policy)
between users.
The user generates a public verification key for each group
and transmits it to the SNS server. Each friend of the
group will receive the private signature key through an
email. Using the private signature key, a friend of the user
can sign messages. The SNS server can use the public
verification key of the group to check the validity of the
signature. Thus Privacy watch fulfills the most of the
privacy criteria for a privacy-enhanced social networking
site [7].
9. Hippocratic Social Network
Rajneeshkaur Bedi et al. proposed Hippocratic Social
network to enhance the user profile privacy in online
social network. It has four components:
 Watermarking Module
 SNS Interaction Module
 Data Perturbation Module
 HSN Repository
Watermarking module inserts a visible or invisible
watermark in the database record of user profile. This
helps in tackling with the profile cloning attacks. SNS
interaction modules read the request for profile data. It
identifies the level of security that has to be added to the
profile data. Then it modifies and returns the profile data
to the requesting application. Data perturbation module
takes the record form SNS interaction module and
modifies it using generalization or suppression method.
HSN repository has Retention Table, Compliance Table,
Consent Table, Sharing Limit, Data Generalization and
suppression metadata. Retention table stores the time for
which the information will be disclosed to a third party
application or another person. Compliance table shows
that whether his profile data is disclosed to other user or
not. Consent table stores the user’s consent about his
profile data disclosure in regards of a particular group or a
person or a third party application. Sharing limit specifies
the number of time the information will be disclosed to a
particular user [8].
10. Trust model for SNS
Nafaa Jabeur et al. proposed a trust model for SNS. Trust
model deals with five trust aspects: What to trust? , When
to trust, Where to trust, whom to trust? and Why to trust?
Direct and indirect are two types of trust. Trust may have
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET ISO 9001:2008 Certified Journal Page 399
risks and benefits. Context affects the trust. Trust
characterizes the relations of the SNS user with other SNS
users. The trust model helps in preventing the leakage of
personal data. It also helps in personalizing privacy and
trust to better fit the current context, user profile and data
context [9].
11. Recommendation for SNS users
Michael fire et al. presented eight recommendations for
SNS users to help them improve their security and privacy
in Social Network Websites [10]. The eight
recommendations are as follows:
 Remove Unnecessary Personal Information.
 Adjust Privacy and Security Settings.
 Do Not Accept Friend Requests From Strangers
 Install Internet Security Software
 Remove Installed Third-Party Applications
 Do Not Publish Your Location.
 Do Not Trust Your SNS Friends.
 Monitor Your Children’s SNS Activity.
12. Comparison of various Privacy Models
Foot light Model and OAuth Model authorize the third
party application to work with user data but not beyond
the user’s consent. Privacy Management Model helps to
populate groups based on relationship. Digital Image
Authentication Model is an efficient model to secure the
unintentional use of personal images by someone else.
Multiparty Access Control Model enforces privacy
concerns over data associated with multiple users in SNS.
Privacy Crypt Model, Privacy Watch Model, Hippocratic
Model and Trust Model help in protecting the privacy of
user profile data.
13. Conclusion
This paper presented the various privacy risks that a user
incurs while putting personal information on the Social
Networking Websites. It also exposed the privacy
frameworks for a privacy enhanced Social networking
websites, Social networking sites try to implement
different security mechanisms to prevent from the privacy
issues, and to protect their users, but attackers will always
find new methods to break through those defenses.
Therefore, social network users should be aware of all
these threats, and be more careful when using them.
Social network users should be careful about what they
expose on their social network space.
REFERENCES:
1. Mohamed Shehab et al., Recommendation Models for
Open Authorization, IEEE Transactions on dependable and
secure computing, Vol. 9, No. 4, July/August 2012.
2. Robert Koch et al., Data Control in Social Networks,
978-1-4577-0460-4/11/$26.00 ©2011 IEEE.
3. Gorrell P. Cheek et al., Human Effects of Enhanced
Privacy Management Models, IEEE Transactions on
dependable and secure computing, Vol. 11, No. 2,
March/April 2014.
4. Nidhi Grover et al., Digital Image Authentication Model
Based on Edge Adaptive Steganography, 2013 Second
International Conference on Advanced Computing,
Networking and Security.
5. Hongxin Hu et al., Multiparty Access Control for Online
Social Networks: Model and Mechanisms, IEEE
Transactions on Knowledge and Data Engineering, Vol. 25,
No. 7, July 2013.
6. Jonathan Anderson, Frank, Must Social Networking
Conflict with Privacy, Co published by the IEEE Computer
and Reliability Societies May/June 2013.
7. Esma Aïmeur, Sébastien Gambs, Ai Ho, Towards a
Privacy-enhanced Social Networking Site, 2010
International, Reliability Conference on Availability and
Security.
8. RajneeshKaur Bedi, Nitinkumar Rajendra Gove, V.M.
Wadhai ,Hippocratic Social Network ,2013 Fifth
International Conference on Computational Aspects of
Social Networks (CASoN).
9. Nafaâ Jabeur, Sherali Zeadally, Sergey Maydebura,
Improving Trust and Privacy Models in Social Networks,
978-1-4673-0229-6/12/$31.00 ©2012 IEEE.
10. Michael Fire et al., Online Social Networks: Threats and
Solutions, IEEE Communication surveys & Tutorials, Vol.
16, No. 4, Fourth Quarter 2014.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET ISO 9001:2008 Certified Journal Page 400
Author Name
Name of the
Privacy
Model
Features
Mohamed Shehab OAuth Model It uses the concept of Access Tokens to authorize the third
party applications
Robert Koch
Privacy Crypt
Model
Using Crypto module, Encoding module and Page module, it
can control the distributions of user's data in an easy and
effective way.
Gorrell P. Cheek
Privacy
Management
Models
It uses Clustering techniques to group the friends. We can
also set the policies for friends of friends.
Nidhi Grover
Digital Image
Authentication
Model
Using Embedding algorithm and Extraction algorithm, it
secures the unintentional use of personal images by someone
else.
Hongxin Hu
Multiparty
Access Control
Model
It enables the protection of shared data associated with
multiple users in SNS.
Jonathan Anderson and Frank
Footlights
Model
It provides an API that lets applications work with the user
data but not leak it beyond the user's consent.
Esma Aïmeur, Sébastien Gambs, Ai Ho
Privacy Watch
Model
Based on the privacy level set by the user, it protects the user
privacy.
RajneeshKaur Bedi ,Nitinkumar
Rajendra Gove, V.M. Wadhai
Hippocratic
Model
It protects the privacy of user profile data based on the user
consents. It uses different modules and tables.
Nafaâ Jabeur, Sherali Zeadally, Sergey
Maydebura
Trust Model
It helps in personalizing privacy and trust to better fit the
current text, user profile and data context.

More Related Content

PDF
IRJET- Identification of Clone Attacks in Social Networking Sites
PDF
Keystroke with Data Leakage Detection for Secure Email Authentication
PDF
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST...
PDF
Privacy Protection Using Formal Logics in Onlne Social Networks
PDF
Ijcatr04041017
PDF
An iac approach for detecting profile cloning
PDF
Oruta privacy preserving public auditing for shared data in the cloud1
PDF
An Anti-Phishing Framework Based on Visual Cryptography
IRJET- Identification of Clone Attacks in Social Networking Sites
Keystroke with Data Leakage Detection for Secure Email Authentication
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST...
Privacy Protection Using Formal Logics in Onlne Social Networks
Ijcatr04041017
An iac approach for detecting profile cloning
Oruta privacy preserving public auditing for shared data in the cloud1
An Anti-Phishing Framework Based on Visual Cryptography

What's hot (20)

PDF
IRJET - Improving Password System using Blockchain
PDF
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
PDF
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
PDF
Disclosing Private Information from Metadata, hidden info and lost data
PDF
Design and Implementation of Enhanced Single Sign on System for Education Sys...
PDF
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
PDF
IRJET - Chrome Extension for Detecting Phishing Websites
PDF
Remote Exploitation of the Dropbox SDK for Android
PDF
Continuous User Identity Verification through Secure Login Session
PDF
Privacy preserving and obscure delicate data with collaborative tagging
PDF
IRJET- Post Summarization and Text Classification in Social Networking Sites
PDF
SpoofedMe - Intruding Accounts using Social Login Providers
PDF
IRJET- Noisy Content Detection on Web Data using Machine Learning
PDF
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
PDF
C045016020
PDF
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...
PDF
Generic Authentication System
PDF
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
PDF
Connection String Parameter Pollution Attacks
PDF
PXpathV: Preventing XPath Injection Vulnerabilities in Web Applications
IRJET - Improving Password System using Blockchain
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
Disclosing Private Information from Metadata, hidden info and lost data
Design and Implementation of Enhanced Single Sign on System for Education Sys...
INTRUSION DETECTION IN MULTITIER WEB APPLICATIONS USING DOUBLEGUARD
IRJET - Chrome Extension for Detecting Phishing Websites
Remote Exploitation of the Dropbox SDK for Android
Continuous User Identity Verification through Secure Login Session
Privacy preserving and obscure delicate data with collaborative tagging
IRJET- Post Summarization and Text Classification in Social Networking Sites
SpoofedMe - Intruding Accounts using Social Login Providers
IRJET- Noisy Content Detection on Web Data using Machine Learning
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
C045016020
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...
Generic Authentication System
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
Connection String Parameter Pollution Attacks
PXpathV: Preventing XPath Injection Vulnerabilities in Web Applications
Ad

Similar to A Survey on Privacy in Social Networking Websites (20)

PDF
A Survey On Privacy Policy Inference for Social Images
PDF
My Privacy My decision: Control of Photo Sharing on Online Social Networks
PDF
Implementation of Privacy Policy Specification System for User Uploaded Image...
PDF
Authorization mechanism for multiparty data sharing in social network
PDF
A Survey on Privacy Preserving by Protecting the Images in Social Media using...
PDF
MEASURING PRIVACY IN ONLINE SOCIAL NETWORKS
PDF
Social media platform and Our right to privacy
PDF
Measuring privacy in online social
PDF
Detecting and Resolving Privacy Conflicts in Online Social Networks
PDF
IRJET- Hampering the Cloning Attacks in Online Social Networks
PDF
Intelligent access control policies for Social network site
PDF
Privacy Recommendations and Ranking of User Images on Content Sharing Sites
PDF
PDF
Social Networking Websites and Image Privacy
PDF
iaetsd Adaptive privacy policy prediction for user uploaded images on
PDF
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
PDF
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
PDF
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
PDF
Protect Social Connection Using Privacy Predictive Algorithm
PDF
Mina.Deng.PhD.defense
A Survey On Privacy Policy Inference for Social Images
My Privacy My decision: Control of Photo Sharing on Online Social Networks
Implementation of Privacy Policy Specification System for User Uploaded Image...
Authorization mechanism for multiparty data sharing in social network
A Survey on Privacy Preserving by Protecting the Images in Social Media using...
MEASURING PRIVACY IN ONLINE SOCIAL NETWORKS
Social media platform and Our right to privacy
Measuring privacy in online social
Detecting and Resolving Privacy Conflicts in Online Social Networks
IRJET- Hampering the Cloning Attacks in Online Social Networks
Intelligent access control policies for Social network site
Privacy Recommendations and Ranking of User Images on Content Sharing Sites
Social Networking Websites and Image Privacy
iaetsd Adaptive privacy policy prediction for user uploaded images on
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
Protect Social Connection Using Privacy Predictive Algorithm
Mina.Deng.PhD.defense
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPT
UNIT-I Machine Learning Essentials for 2nd years
PPTX
Solar energy pdf of gitam songa hemant k
PDF
Module 1 part 1.pdf engineering notes s7
PPTX
MODULE 02 - CLOUD COMPUTING-Virtual Machines and Virtualization of Clusters a...
PPTX
22ME926Introduction to Business Intelligence and Analytics, Advanced Integrat...
PDF
IAE-V2500 Engine for Airbus Family 319/320
PDF
Introduction to Machine Learning -Basic concepts,Models and Description
PDF
Mechanics of materials week 2 rajeshwari
PPTX
Unit IImachinemachinetoolopeartions.pptx
PPTX
Software-Development-Life-Cycle-SDLC.pptx
PPTX
Module1.pptxrjkeieuekwkwoowkemehehehrjrjrj
PPTX
Design ,Art Across Digital Realities and eXtended Reality
PPTX
SC Robotics Team Safety Training Presentation
PPT
Module_1_Lecture_1_Introduction_To_Automation_In_Production_Systems2023.ppt
PPTX
Research Writing, Mechanical Engineering
PDF
IAE-V2500 Engine Airbus Family A319/320
PDF
ASPEN PLUS USER GUIDE - PROCESS SIMULATIONS
PPTX
Soft Skills Unit 2 Listening Speaking Reading Writing.pptx
PPTX
Unit IILATHEACCESSORSANDATTACHMENTS.pptx
PDF
Using Technology to Foster Innovative Teaching Practices (www.kiu.ac.ug)
UNIT-I Machine Learning Essentials for 2nd years
Solar energy pdf of gitam songa hemant k
Module 1 part 1.pdf engineering notes s7
MODULE 02 - CLOUD COMPUTING-Virtual Machines and Virtualization of Clusters a...
22ME926Introduction to Business Intelligence and Analytics, Advanced Integrat...
IAE-V2500 Engine for Airbus Family 319/320
Introduction to Machine Learning -Basic concepts,Models and Description
Mechanics of materials week 2 rajeshwari
Unit IImachinemachinetoolopeartions.pptx
Software-Development-Life-Cycle-SDLC.pptx
Module1.pptxrjkeieuekwkwoowkemehehehrjrjrj
Design ,Art Across Digital Realities and eXtended Reality
SC Robotics Team Safety Training Presentation
Module_1_Lecture_1_Introduction_To_Automation_In_Production_Systems2023.ppt
Research Writing, Mechanical Engineering
IAE-V2500 Engine Airbus Family A319/320
ASPEN PLUS USER GUIDE - PROCESS SIMULATIONS
Soft Skills Unit 2 Listening Speaking Reading Writing.pptx
Unit IILATHEACCESSORSANDATTACHMENTS.pptx
Using Technology to Foster Innovative Teaching Practices (www.kiu.ac.ug)

A Survey on Privacy in Social Networking Websites

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET ISO 9001:2008 Certified Journal Page 395 A SURVEY ON PRIVACY IN SOCIAL NETWORKING WEBSITES Dr. N. Jayalakshmi1, R.G. Kavitha2. 1 Professor, Dept. of Computer Applications, Saveetha Engineering College, Chennai, India. 2 Assistant Professor, Dept. of Computer Applications, RNS First Grade College, Bangalore, India. ------------------------------------------------------------------------------------------------------------------------------------------------- Abstract - Most Social Networking Websites facilitate users with the features like online interaction, sharing of information and developing new relationships etc. As a result, more and more data containing personal information such as name, gender, age, birthday, email address, phone number, current university/company, political views and so on are published over the Internet, which might be lead to a serious privacy leakage. Since some of these items are sensitive, access control is widely employed in order to protect the privacy of users. The current protection mechanisms, such as privacy policies and access control mechanisms fall short on protecting the privacy of the users. This paper presents a survey on different frameworks for privacy enhanced social networking websites, which technically enforces the protection of the personal information of a user, when interacting with social applications. Keywords: Privacy, Social Networking Sites, trust, privacy watch, privacy crypt, Hippocratic Social Network 1. Introduction Social networking websites have become a potential target for attackers due to the availability of sensitive information as well as its large user base. Therefore, privacy and security issues in online social networks are increasing. Privacy issue is one of the main concerns, since many social network users are not careful about what they expose on their social network space. Many social networking sites try to prevent the exploitations, but many attackers are still able to overcome those security counter measures by using different techniques. Social network users may not be aware of such threats. A survey on different privacy frameworks in social networking websites to prevent from the privacy issues are discussed in this paper. 2. OAUTH (Open Authorization) Framework Mohamed Shehab et al. proposed OAuth framework. It provides a secure and efficient mechanism for authorizing third-party applications without releasing a user’s access credentials. OAuth framework increases user privacy by separating the role of users from that of third party applications. Users need not share their private credentials with third party application, instead OAuth issues a new set of credentials. These new credentials are represented via an Access Token. An access token is a string which denotes a unique set of permissions granted to a third party application. After getting the approval from the resource owner, an authorization server issues access token to the third party application. Authorization code flow is shown in the figure 1. The authorization flow process consists of three parties: End-user (resource owner) at browser, Client (third-party application), Authorization server (e.g., Facebook). When a third party application needs to access user’s resources, it presents its Access Token to the service provider. The authorization server authenticates the end user, and decides whether to grant or deny the third-party application’s access request [1]. Figure 1. Authorization code OAuth flow.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET ISO 9001:2008 Certified Journal Page 396 3. Privacy Crypt Robert Koch et al. implemented a prototype called Privacy crypt. It uses two core modules (the crypto-module and encoding module) and the page module. It is an extension of well known Firefox browser. It ensures the privacy of data released on public severs in the internet. When the user requests a website, a small key-icon is shown in the status bar of the Firefox browser. On clicking the icon, a dialog box will be displayed. Figure 2 shows the dialog box which asks the user to enter the key. The key is stored in the database as strings. Once the key is entered, the user can work just as usual. When the user sends a new status message, privacy crypt encrypts it and sends the cipher to the server. The user can not see the encrypted text. Both the encryption and decryption process are fully transparent and carried out in the background. The friends of the user must enter this key. Then the cipher text is decrypted and the readable message is shown as usual. Therefore the user and his friends who know the key can only read the message. Using Privacy crypt, the user can control the distribution of her data in an easy and effective way [2]. Figure 2. Dialog for entering a new encryption key 4. Privacy Management Models Gorrell P Check et al. proposed two privacy management models namely Group-based policy Management with assisted friend grouping and Same-as Policy Management. Gorrell P Check et al. predefined ten relationship groups: family, close friends, graduate school, under graduate school, high school, work, acquaintances, friends of friend, community, and other. Group based policy management helps the user to populate groups based on relationship. It also assigns object permissions to the groups. Assisted friend grouping assists in grouping their friends and setting friend level exceptions within the group policy. Figure 3 shows role based access control. Same-as policy management leverages users’ memory and opinion of their friends to set policies for other similar friends [3]. Figure 3. Role based access control. 5. Digital Image Authentication Model The images from social networking websites can be easily downloaded, edited, morphed and shared. The validation of the ownership is practically impossible due to high degree of replication. Nidhi Grover et al. proposed digital image authentication model to secure the unintentional use of personal images by someone else. Embedding algorithm and extraction algorithm are used in this model. The subscriber’s login detail and current timestamp will be converted to binary and it will be hidden the original image. It is done using embedding algorithm. Embedding algorithm is shown in figure 4. Figure 4. Embedding Block diagram
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET ISO 9001:2008 Certified Journal Page 397 Figure 5. Extraction Block Diagram If any fake user tries to use the original image for creating a fake ID, SN provider compares it with the original embedded data and detects the fake use. It is done by extraction algorithm. Misuse of the images can be prevented using the model is shown in figure 5 [4]. 6. Multiparty Access Control (MPAC) model Hongxin Hu et al. introduced MPAC model. MPAC model enables the protection of shared data associated with multiple users in SNS. MPAC model enforces privacy concerns over data associated with multiple users in SNS. It describes relationships of five individuals, Alice (A), Bob (B), Carol (C), Dave (D), and Edward (E), along with their groups of interests. Figure 6 shows an example of Multiparty social networking. It shows that the users may be directly connected by more than one edge labeled with different relationship types. In addition, the users may also have transitive relationship, such as friends-of- friends (FOF), colleagues-of-colleagues (COC) and classmates-of-classmates (LOL). It is noticed that some data items have multiple controllers and some users may be the controllers of multiple data items. It also shows that the users can participate in the fashion and hiring group. Some users can also join in multiple groups. Thus MPAC model can greatly enhance the flexibility for regulating data sharing in SNSs [5]. Figure 6. An example of multiparty social network presentation. 7. Footlights Jonathan Anderson et al. designed and implemented an architecture called footlights. Footlight’s design constraint is trust. Users need not trust any third party with their private data. Footlight uses cloud storage providers to hold user data. This data is broken into fixed sized blocks and then encrypted. When the users share with their friends, footlights reveals encryption keys to the client software of
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET ISO 9001:2008 Certified Journal Page 398 the chosen users only. The local Footlights client software interprets blocks that have been shared with it as a file system. The subsets of these data can be exposed to applications through a security API. Figure 7 shows file system layers visible to applications. Footlights provide an API that lets applications work with user data but not leak it beyond the user’s consent. Applications bundle files in a directory to be shared with other users, but footlights allows sharing only with explicit expression of user intent. Applications can access data such as photos directly if the user explicitly expresses intent [6]. Figure 7. File system layers visible to applications. 8. Privacy watch Esma Aïmeur et al. introduced privacy watch framework. Privacy watch provides users with an easy and flexible to specify and communicate their privacy concerns to other users, third parties and SNS service provider. There are four privacy levels: No Privacy, Soft Privacy, Hard Privacy and Full Privacy. Based on his privacy level, the user can determine how Figure 8. Overview of Privacy Watch much information he would like to share with the provider. Figure 8 shows the overview of Privacy watch. Server access control in privacy watch manages the access control mechanism to the personal information of the user for his friends. It acts as a proxy sitting between the personal information of the user and his friends. The SNS server is responsible for strong the personal information of the user. The users have Client Privacy Manager. It is responsible for helping the user to maintain their sovereignty of their personal information. Privacy watch relies on third party email server such as Hotmail and Gmail. It is used to store and exchange encryption and decryption keys as well as UPP (User Privacy Policy) between users. The user generates a public verification key for each group and transmits it to the SNS server. Each friend of the group will receive the private signature key through an email. Using the private signature key, a friend of the user can sign messages. The SNS server can use the public verification key of the group to check the validity of the signature. Thus Privacy watch fulfills the most of the privacy criteria for a privacy-enhanced social networking site [7]. 9. Hippocratic Social Network Rajneeshkaur Bedi et al. proposed Hippocratic Social network to enhance the user profile privacy in online social network. It has four components:  Watermarking Module  SNS Interaction Module  Data Perturbation Module  HSN Repository Watermarking module inserts a visible or invisible watermark in the database record of user profile. This helps in tackling with the profile cloning attacks. SNS interaction modules read the request for profile data. It identifies the level of security that has to be added to the profile data. Then it modifies and returns the profile data to the requesting application. Data perturbation module takes the record form SNS interaction module and modifies it using generalization or suppression method. HSN repository has Retention Table, Compliance Table, Consent Table, Sharing Limit, Data Generalization and suppression metadata. Retention table stores the time for which the information will be disclosed to a third party application or another person. Compliance table shows that whether his profile data is disclosed to other user or not. Consent table stores the user’s consent about his profile data disclosure in regards of a particular group or a person or a third party application. Sharing limit specifies the number of time the information will be disclosed to a particular user [8]. 10. Trust model for SNS Nafaa Jabeur et al. proposed a trust model for SNS. Trust model deals with five trust aspects: What to trust? , When to trust, Where to trust, whom to trust? and Why to trust? Direct and indirect are two types of trust. Trust may have
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET ISO 9001:2008 Certified Journal Page 399 risks and benefits. Context affects the trust. Trust characterizes the relations of the SNS user with other SNS users. The trust model helps in preventing the leakage of personal data. It also helps in personalizing privacy and trust to better fit the current context, user profile and data context [9]. 11. Recommendation for SNS users Michael fire et al. presented eight recommendations for SNS users to help them improve their security and privacy in Social Network Websites [10]. The eight recommendations are as follows:  Remove Unnecessary Personal Information.  Adjust Privacy and Security Settings.  Do Not Accept Friend Requests From Strangers  Install Internet Security Software  Remove Installed Third-Party Applications  Do Not Publish Your Location.  Do Not Trust Your SNS Friends.  Monitor Your Children’s SNS Activity. 12. Comparison of various Privacy Models Foot light Model and OAuth Model authorize the third party application to work with user data but not beyond the user’s consent. Privacy Management Model helps to populate groups based on relationship. Digital Image Authentication Model is an efficient model to secure the unintentional use of personal images by someone else. Multiparty Access Control Model enforces privacy concerns over data associated with multiple users in SNS. Privacy Crypt Model, Privacy Watch Model, Hippocratic Model and Trust Model help in protecting the privacy of user profile data. 13. Conclusion This paper presented the various privacy risks that a user incurs while putting personal information on the Social Networking Websites. It also exposed the privacy frameworks for a privacy enhanced Social networking websites, Social networking sites try to implement different security mechanisms to prevent from the privacy issues, and to protect their users, but attackers will always find new methods to break through those defenses. Therefore, social network users should be aware of all these threats, and be more careful when using them. Social network users should be careful about what they expose on their social network space. REFERENCES: 1. Mohamed Shehab et al., Recommendation Models for Open Authorization, IEEE Transactions on dependable and secure computing, Vol. 9, No. 4, July/August 2012. 2. Robert Koch et al., Data Control in Social Networks, 978-1-4577-0460-4/11/$26.00 ©2011 IEEE. 3. Gorrell P. Cheek et al., Human Effects of Enhanced Privacy Management Models, IEEE Transactions on dependable and secure computing, Vol. 11, No. 2, March/April 2014. 4. Nidhi Grover et al., Digital Image Authentication Model Based on Edge Adaptive Steganography, 2013 Second International Conference on Advanced Computing, Networking and Security. 5. Hongxin Hu et al., Multiparty Access Control for Online Social Networks: Model and Mechanisms, IEEE Transactions on Knowledge and Data Engineering, Vol. 25, No. 7, July 2013. 6. Jonathan Anderson, Frank, Must Social Networking Conflict with Privacy, Co published by the IEEE Computer and Reliability Societies May/June 2013. 7. Esma Aïmeur, Sébastien Gambs, Ai Ho, Towards a Privacy-enhanced Social Networking Site, 2010 International, Reliability Conference on Availability and Security. 8. RajneeshKaur Bedi, Nitinkumar Rajendra Gove, V.M. Wadhai ,Hippocratic Social Network ,2013 Fifth International Conference on Computational Aspects of Social Networks (CASoN). 9. Nafaâ Jabeur, Sherali Zeadally, Sergey Maydebura, Improving Trust and Privacy Models in Social Networks, 978-1-4673-0229-6/12/$31.00 ©2012 IEEE. 10. Michael Fire et al., Online Social Networks: Threats and Solutions, IEEE Communication surveys & Tutorials, Vol. 16, No. 4, Fourth Quarter 2014.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET ISO 9001:2008 Certified Journal Page 400 Author Name Name of the Privacy Model Features Mohamed Shehab OAuth Model It uses the concept of Access Tokens to authorize the third party applications Robert Koch Privacy Crypt Model Using Crypto module, Encoding module and Page module, it can control the distributions of user's data in an easy and effective way. Gorrell P. Cheek Privacy Management Models It uses Clustering techniques to group the friends. We can also set the policies for friends of friends. Nidhi Grover Digital Image Authentication Model Using Embedding algorithm and Extraction algorithm, it secures the unintentional use of personal images by someone else. Hongxin Hu Multiparty Access Control Model It enables the protection of shared data associated with multiple users in SNS. Jonathan Anderson and Frank Footlights Model It provides an API that lets applications work with the user data but not leak it beyond the user's consent. Esma Aïmeur, Sébastien Gambs, Ai Ho Privacy Watch Model Based on the privacy level set by the user, it protects the user privacy. RajneeshKaur Bedi ,Nitinkumar Rajendra Gove, V.M. Wadhai Hippocratic Model It protects the privacy of user profile data based on the user consents. It uses different modules and tables. Nafaâ Jabeur, Sherali Zeadally, Sergey Maydebura Trust Model It helps in personalizing privacy and trust to better fit the current text, user profile and data context.