SlideShare a Scribd company logo
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 1, Issue 2, pp: (44-53), Month: October 2014 - March 2015, Available at: www.paperpublications.org
Page | 44
Paper Publications
MUTATION AND CROSSOVER ISSUES
FOR OSN PRIVACY
C. Narasimham1
, Jacob2
1
II Year M.Tech-CSE, 2
Assoc Prof. of CSE
Nova College of Engineering, Jangareddy Gudem, AP, India
Abstract: Privacy is one of the friction points that emerge when communications get mediated in Online Social
Networks (OSNs). Different communities of computer science researchers have framed the ‘OSN privacy problem’
as one of surveillance, institutional or social privacy. In this article, first we provide an introduction to the
surveillance and social privacy perspectives emphasizing the narratives that inform them, as well as their
assumptions and goals. This paper mainly addresses visitors events(population) on an users account and updates
the account holders log information. And thus the evolutionary aspects of Surveillance are reflected in User's Log,
this needs the implementation of Genetic Algorithm. Further, this requires a bridge module between every
interaction between the user and social network server. This paper implements mutation aspects through Genetic
Algorithm by differing users into Guests and Friends, and identifies and Cross over issues of a guest Clicking
Friend of a friend.
I. INTRODUCTION
The existing work could model and analyze access control requirements with respect to collaborative authorization
management of shared data in OSNs. The need of joint management for data sharing, especially photo sharing, in OSNs
has been recognized by the recent work provided a solution for collective privacy management in OSNs. Their work
considered access control policies of a content that is co-owned by multiple users in an OSN, such that each co-owner
may separately specify her/his own privacy preference for the shared content. After careful analysis the system has been
identified to have the following stages:
 The Social Privacy
 The Surveillance
 The Institutional Privacy
 Privacy As Protection
Social Privacy:
Social privacy relates to the concerns that users raise and to the harms that they experience when technologically mediated
communications disrupt social boundaries. The users are thus “consumers” of these services. They spend time in these
(semi-)public spaces in order to socialize with family and friends, get access to information and discussions, and to
expand matters of the heart as well as those of belonging. That these activities are made public to „friends‟ or a greater
audience is seen as a crucial component of OSNs. In Access Control, solutions that employ methods from user modeling
aim to develop “meaningful” privacy settings that are intuitive to use, and that cater to users‟ information management
needs.
Surveillance Module:
With respect to surveillance, the design of PETs starts from the premise that potentially adversarial entities operate or
monitor OSNs. These have an interest in getting hold of as much user information as possible, including user-generated
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 1, Issue 2, pp: (44-53), Month: October 2014 - March 2015, Available at: www.paperpublications.org
Page | 45
Paper Publications
content (e.g., posts, pictures, private messages) as well as interaction and behavioral data (e.g., list of friends, pages
browsed, „likes‟). Once an adversarial entity has acquired user information, it may use it in unforeseen ways – and
possibly to the disadvantage of the individuals associated with the data.
Institutional Privacy:
The way in which personal control and institutional transparency requirements, as defined through legislation, are
implemented has an impact on both surveillance and social privacy problems, and vice versa. institutional privacy studies
ways of improving organizational data management practices for compliance, e.g., by developing mechanisms for
information flow control and accountability in the back end. The challenges identified in this paper with integrating
surveillance and social privacy are also likely to occur in relation to institutional privacy, given fundamental differences in
assumptions and research methods.
Privacy As Protection:
The goal of PETs (“Privacy Enhancing Technologies”) in the context of OSNs is to enable individuals to engage with
others, share, access and publish information online, free from surveillance and interference. Ideally, only information that
a user explicitly shares is available to his/her intended recipients, while the disclosure of any other information to any
other parties is prevented. Furthermore, PETs aim to enhance the ability of a user to publish and access information on
OSNs by providing her with means to circumvent censorship.
Proposed System:
We distinguish three types of privacy problems that researchers in computer science have to tackle. The first approach
addresses the “surveillance problem” that arises when the personal information and social interactions of OSN users are
leveraged by governments and service providers. The second approach addresses those problems that emerge through the
necessary renegotiation of boundaries as social interactions get mediated by OSN services, in short called “social
privacy”. The third approach addresses problems related to users losing control and oversight over the collection and
processing of their information in OSNs, also known as “institutional privacy”. This paper implements mutation aspects
through Genetic Algorithm by differing users into Guests and Friends, and identifies and Cross Over issues of a guest
Clicking Friend of a friend.
II. DESIGN
The system that we propose to describe in using Object Oriented Modeling Diagrams.
Use-case Diagram:
Fig 1: Use Case Diagram
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 1, Issue 2, pp: (44-53), Month: October 2014 - March 2015, Available at: www.paperpublications.org
Page | 46
Paper Publications
Class Diagram:
Fig 2: Class Diagram
Sequence Diagram:
Fig 3: Sequence Diagram
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 1, Issue 2, pp: (44-53), Month: October 2014 - March 2015, Available at: www.paperpublications.org
Page | 47
Paper Publications
Activity Diagram:
Fig 4: Activity Chart
Component Diagram:
Fig 5: Component Diagram
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 1, Issue 2, pp: (44-53), Month: October 2014 - March 2015, Available at: www.paperpublications.org
Page | 48
Paper Publications
Deployment Diagram:
Fig: 6. Deployment Diagram
III. IMPLEMENTATION
This module collects vistors events (population) on an users account and updates the account holders log information.
And Thus the evolutionary aspects of Surveillance are reflected in User's Log. Thus Completing GA's implementation
public static void saveActions (String actioned, String actioner, String action, String actionertype, String sensitiveaction)
throws ClassNotFoundException, SQLException {
if(actioned.trim().equals(actioner.trim()))
{ return; }
DataBase dbfunc = new DataBase();
dbfunc.createConnection();
String query = "insert into actionsmonitor(`actioned`,`actioner`,`action`,`actionon`,`actionertype`,`sensitiveaction`)
values('" + actioned.trim() + "','" + actioner + "','" + action + "',now(),'" + actionertype + "','" + sensitiveaction + "')";
System.out.println(query);
dbfunc.updateRecord(query);
dbfunc.closeConnection();
}
This happens to be a bridge module between every interaction between the user and social network server. This module
implements mutational aspects of GA by differing users into Guests and Friends. This module implements and identifies
Cross Over Activities of a guest Clicking Friend of a friend of a friend.
public class Surveillance extends HttpServlet {
* Processes requests for both HTTP
* <code>GET</code> and
* <code>POST</code> methods.
* @param request servlet request
* @param response servlet response
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 1, Issue 2, pp: (44-53), Month: October 2014 - March 2015, Available at: www.paperpublications.org
Page | 49
Paper Publications
* @throws ServletException if a servlet-specific error occurs
* @throws IOException if an I/O error occurs
*/
protected void processRequest(HttpServletRequest request, HttpServletResponse response)
throws ServletException, IOException {
response.setContentType("text/html;charset=UTF-8");
PrintWriter out = response.getWriter();
try {
HttpSession session = request.getSession(false);
String store = (String) session.getAttribute("id");
String email = (String) session.getAttribute("email");
String name = (String) session.getAttribute("name");
String option = request.getParameter("option");
if (option.trim().equals("2")) {
String friendMail = request.getParameter("friendMail");
Globals.saveActions(friendMail, email, "ViewedProfile", "GUEST", "YES");
String page = "viewProfile.jsp?option=2&friendMail=" + friendMail;
response.sendRedirect(page);
}
if (option.trim().equals("3")) {
String friendMail = request.getParameter("friendMail");
Globals.saveActions(friendMail, email, "ViewedProfile", "FRIEND", "NO");
String page = "viewProfile.jsp?option=1&friendMail=" + friendMail;
response.sendRedirect(page);
}
// 4 users's page
if (option.trim().equals("4")) {
String friendMail = request.getParameter("friendMail");
Globals.saveActions(friendMail, email, "AccountAccess", "FRIEND", "NO");
String page = "template.jsp?option=1&friendMail=" + friendMail;
response.sendRedirect(page);
}
// 5 users's wall
if (option.trim().equals("5")) {
String friendMail = request.getParameter("friendMail");
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 1, Issue 2, pp: (44-53), Month: October 2014 - March 2015, Available at: www.paperpublications.org
Page | 50
Paper Publications
Globals.saveActions(friendMail, email, "WallAccess", "FRIEND", "NO");
String page = "template.jsp?option=2&friendMail=" + friendMail;
response.sendRedirect(page);
}
// 6 users's photos
if (option.trim().equals("6")) {
String friendMail = request.getParameter("friendMail");
Globals.saveActions(friendMail, email, "ImageAccess", "FRIEND", "NO");
String page = "template.jsp?option=3&friendMail=" + friendMail;
response.sendRedirect(page);
}
// 7 users's videos
if (option.trim().equals("7")) {
String friendMail = request.getParameter("friendMail");
Globals.saveActions(friendMail, email, "VideoAccess", "FRIEND", "NO");
String page = "template.jsp?option=4&friendMail=" + friendMail;
response.sendRedirect(page);
}
// 8 users's friends
if (option.trim().equals("8")) {
String friendMail = request.getParameter("friendMail");
Globals.saveActions(friendMail, email, "FriendAccess", "FRIEND", "NO");
String page = "template.jsp?option=5&friendMail=" + friendMail;
response.sendRedirect(page);
}
// 9 chain users's page
if (option.trim().equals("9")) {
String source = request.getParameter("source");
String friendMail = request.getParameter("friendMail");
Globals.saveActions(friendMail, email, "FriendAccess:Source("+source+") and Friend("+friendMail+")",
"FRIEND", "NO");
String page = "template.jsp?option=1&friendMail=" + friendMail;
response.sendRedirect(page);
}
} catch (ClassNotFoundException ex) {
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 1, Issue 2, pp: (44-53), Month: October 2014 - March 2015, Available at: www.paperpublications.org
Page | 51
Paper Publications
Logger.getLogger(Surveillance.class.getName()).log(Level.SEVERE, null, ex);
} catch (SQLException ex) {
Logger.getLogger(Surveillance.class.getName()).log(Level.SEVERE, null, ex);
} finally {
out.close();
}}
// <editor-fold defaultstate="collapsed" desc="HttpServlet methods. Click on the + sign on the left to edit the code.">
/**
* Handles the HTTP
* <code>GET</code> method.
* @param request servlet request
* @param response servlet response
* @throws ServletException if a servlet-specific error occurs
* @throws IOException if an I/O error occurs
*/
@Override
protected void doGet(HttpServletRequest request, HttpServletResponse response)
throws ServletException, IOException {
processRequest(request, response);
}
* Handles the HTTP
* <code>POST</code> method.
*
* @param request servlet request
* @param response servlet response
* @throws ServletException if a servlet-specific error occurs
* @throws IOException if an I/O error occurs
*/
@Override
protected void doPost(HttpServletRequest request, HttpServletResponse response)
throws ServletException, IOException {
processRequest(request, response);
}
* Returns a short description of the servlet.
* @return a String containing servlet description
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 1, Issue 2, pp: (44-53), Month: October 2014 - March 2015, Available at: www.paperpublications.org
Page | 52
Paper Publications
@Override
public String getServletInfo() {
return "Short description";
}// </editor-fold>
}
IV. RESULTS
Profile Created Successfully
osn@gmail.com
Email: narasimham_c@yahoo.com
Event Name : Profile Creation
Date : 28-10-2014 16:22:54
IP Address : 0:0:0:0:0:0:0:1
...Thank You...Please Visit Us For Social Networking..
New Image Upload
User Id : gvravindranath@gmail.com
Event Name : User (gvravindranath@gmail.com) Uploaded New Image:Jellyfish.jpg
Activity : New Image Upload
Activity On : 2014-10-28 16:19:47.0
Sent On : 28-10-2014 16:20:44
...Thank You...Please Visit Us...
Profile Picture Up dation
User Id : gvravindranath@gmail.com
Event Name : User(gvravindranath@gmail.com) Updated Their Profile Pic
Activity : Profile Picture Updation
Activity On : 2014-10-28 16:18:40.0
Sent On : 28-10-2014 16:19:35
...Thank You...Please Visit Us...
New Profile Update
osn@gmail.com
User Id : gvravindranath@gmail.com
Event Name : User (gvravindranath@gmail.com) Uploaded New Image: Koala.jpg
Activity : New Image Upload
Activity On : 2014-10-28 16:19:47.0
Sent On : 28-10-2014 16:20:35
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 1, Issue 2, pp: (44-53), Month: October 2014 - March 2015, Available at: www.paperpublications.org
Page | 53
Paper Publications
...Thank You...Please Visit Us...
User Id : gvravindranath@gmail.com
Event Name : User (gvravindranath@gmail.com) updated Their Profile
Activity : New Profile Update
Activity On : 2014-10-28 16:17:20.0
Sent On : 28-10-2014 16:17:35
...Thank You...Please Visit Us...
V. CONCLUSION
Privacy is one of the friction points in Online Social Networks (OSNs). In this article, we conclude that the surveillance
and social privacy perspectives have been emphasized. And, addressed the visitors events on an users account and
updated with the account holders log information. This paper described the implementation of a bridge process between
every interaction between the user and social network server. Further, implemented mutational aspects of Genetic
Algorithm by differing users into Guests and Friends, and identified Cross Over Activities of a guest Clicking Friend of a
friend of a friend.
REFERENCES
[1] Seda Gurses, Claudia Diaz “Two Tales of Privacy in Online Social Networks” IEEE Security and Privacy Vol: PP
No 99, 2013.
[2] J. Anderson, C. Diaz, J. Bonneau, and F. Stajano. Privacy-Enabling Social Networking over Untrusted Networks.
InACM Workshop on Online Social Networks (WOSN), pages 1–6. ACM, 2009.
[3] F. Beato, M. Kohlweiss, and K. Wouters. Scramble! your social network data. In Privacy Enhancing Technologies
Symposium, PETS 2011, volume 6794 of LNCS, pages 211–225. Springer, 2011.
[4] E. De Cristofaro, C. Soriente, G. Tsudik, and A. Williams. Humming-bird: Privacy at the time of twitter, IEEE
Symposium on Security and Privacy, pages 285–299. IEEE Computer Society, 2012.
[5] .A. Cutillo, R. Molva, and T. Strufe. Safebook: A privacy-preserving online social network leveraging on real-life
trust. Communications Magazine, 47(12):94–101, 2009.
[6] James Grimmelmann. Saving Facebook. Iowa Law Review, 94:1137– 1206, 2009.
[7] Kevin D. Haggerty and Richard V. Ericson. The Surveillant Assemblage. British Journal of Sociology, 51(4):605 –
622, 2000.
[8] Evgeny Morozov. Face book and Twitter are just places revolutionaries go. The Guardian, 11. March 2011.
[9] Deirdre K. Mulligan and Jennifer King. Bridging the gap between privacy and design. Journal of Constitutional
Law, 14 (4):989 – 1034, 2012.

More Related Content

PDF
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
PDF
Identifying ghost users using social media metadata - University College London
PDF
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
PDF
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
PDF
At4102337341
PDF
Implementation of Privacy Policy Specification System for User Uploaded Image...
PDF
Authorization mechanism for multiparty data sharing in social network
PDF
Measuring privacy in online social
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
Identifying ghost users using social media metadata - University College London
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
At4102337341
Implementation of Privacy Policy Specification System for User Uploaded Image...
Authorization mechanism for multiparty data sharing in social network
Measuring privacy in online social

What's hot (19)

PDF
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
PDF
Big Data Analytics : A Social Network Approach
PDF
Two tales of privacy in online social networks
DOCX
Two tales of privacy in online social networks
PPT
Designing People’s Interconnections in Mobile Social Networks
PDF
IRJET- An Intuitive Sky-High View of Recommendation Systems
PDF
Q046049397
PDF
Identity Resolution across Different Social Networks using Similarity Analysis
PDF
[IJET-V2I1P14] Authors:Aditi Verma, Rachana Agarwal, Sameer Bardia, Simran Sh...
DOCX
exploiting service similarity for privacy in location-based search queries
PDF
Improvement in the usability of gis based services by
PDF
A literature survey on recommendation
PDF
An updated look at social network extraction system a personal data analysis ...
PDF
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
DOCX
4 newmain doc
PDF
MANAGING THE INTERTWINING AMONG USERS, ROLES, PERMISSIONS, AND USER RELATIONS...
PDF
Current trends of opinion mining and sentiment analysis in social networks
PDF
Ijcatr04041017
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
Big Data Analytics : A Social Network Approach
Two tales of privacy in online social networks
Two tales of privacy in online social networks
Designing People’s Interconnections in Mobile Social Networks
IRJET- An Intuitive Sky-High View of Recommendation Systems
Q046049397
Identity Resolution across Different Social Networks using Similarity Analysis
[IJET-V2I1P14] Authors:Aditi Verma, Rachana Agarwal, Sameer Bardia, Simran Sh...
exploiting service similarity for privacy in location-based search queries
Improvement in the usability of gis based services by
A literature survey on recommendation
An updated look at social network extraction system a personal data analysis ...
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
4 newmain doc
MANAGING THE INTERTWINING AMONG USERS, ROLES, PERMISSIONS, AND USER RELATIONS...
Current trends of opinion mining and sentiment analysis in social networks
Ijcatr04041017
Ad

Viewers also liked (20)

PDF
Aflatoxicosis in Poultry
PDF
Review Paper on an Open Source Content Management System: Joomla CMS
PDF
Presentación1
DOCX
Resume HONG YONG SHEN 2016
DOCX
Liberty university hius 222 content quiz 6 complete solutions correct answers...
PPTX
The Most Popular Medical Residency Programs in 2017
PDF
A few steps to create a paperless office
PDF
PEM Manual
PPTX
SYAFERI CENTER | Presentasi Integrasi Ekonomi
DOCX
PDF
Johne’s Disease: A Review Article
PDF
Improving Service Recommendation Method on Map reduce by User Preferences and...
PDF
Implementing Map Reduce Based Edmonds-Karp Algorithm to Determine Maximum Flo...
PPTX
Usability Testing for Virtual Reality
PDF
Growing up hybrid: Accelerating digital transformation
PDF
Design and Implementation of Wireless Sensor Node for WSN for Automatic Meter...
PDF
25.2017年農曆春節渡假4天~屏東.台東.花蓮(第一天.除夕.2017.01.27)
PDF
Trends, Growth and Instability of Teff Production in Ethiopia
PDF
Social Media Use by Doctors: Advice for Safety and for Effectiveness (Februar...
PDF
Learning Process Interaction Aided by an Adapter Agent
Aflatoxicosis in Poultry
Review Paper on an Open Source Content Management System: Joomla CMS
Presentación1
Resume HONG YONG SHEN 2016
Liberty university hius 222 content quiz 6 complete solutions correct answers...
The Most Popular Medical Residency Programs in 2017
A few steps to create a paperless office
PEM Manual
SYAFERI CENTER | Presentasi Integrasi Ekonomi
Johne’s Disease: A Review Article
Improving Service Recommendation Method on Map reduce by User Preferences and...
Implementing Map Reduce Based Edmonds-Karp Algorithm to Determine Maximum Flo...
Usability Testing for Virtual Reality
Growing up hybrid: Accelerating digital transformation
Design and Implementation of Wireless Sensor Node for WSN for Automatic Meter...
25.2017年農曆春節渡假4天~屏東.台東.花蓮(第一天.除夕.2017.01.27)
Trends, Growth and Instability of Teff Production in Ethiopia
Social Media Use by Doctors: Advice for Safety and for Effectiveness (Februar...
Learning Process Interaction Aided by an Adapter Agent
Ad

Similar to MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY (20)

PDF
IRJET- Event Detection and Text Summary by Disaster Warning
PDF
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
PDF
Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...
DOCX
Two tales of privacy in online social networks
PDF
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
PDF
Privacy Protection Using Formal Logics in Onlne Social Networks
PDF
Intelligent access control policies for Social network site
PDF
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
PDF
A Survey On Privacy Policy Inference for Social Images
PDF
Collusion-resistant multiparty data sharing in social networks
PDF
Detecting and Resolving Privacy Conflicts in Online Social Networks
PDF
PDF
My Privacy My decision: Control of Photo Sharing on Online Social Networks
DOCX
Electronic copy available at httpsssrn.comabstract=28526.docx
PDF
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
PDF
Identical Users in Different Social Media Provides Uniform Network Structure ...
PDF
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTION
PDF
Proactive Intelligent Home System Using Contextual Information and Neural Net...
DOCX
Towards Decision Support and Goal AchievementIdentifying Ac.docx
PPTX
INFORMATION RETRIEVAL Anandraj.L
IRJET- Event Detection and Text Summary by Disaster Warning
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...
Two tales of privacy in online social networks
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
Privacy Protection Using Formal Logics in Onlne Social Networks
Intelligent access control policies for Social network site
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
A Survey On Privacy Policy Inference for Social Images
Collusion-resistant multiparty data sharing in social networks
Detecting and Resolving Privacy Conflicts in Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
Electronic copy available at httpsssrn.comabstract=28526.docx
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
Identical Users in Different Social Media Provides Uniform Network Structure ...
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTION
Proactive Intelligent Home System Using Contextual Information and Neural Net...
Towards Decision Support and Goal AchievementIdentifying Ac.docx
INFORMATION RETRIEVAL Anandraj.L

Recently uploaded (20)

PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
1. Introduction to Computer Programming.pptx
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Tartificialntelligence_presentation.pptx
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
OMC Textile Division Presentation 2021.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Approach and Philosophy of On baking technology
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Mushroom cultivation and it's methods.pdf
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Hybrid model detection and classification of lung cancer
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
August Patch Tuesday
PDF
project resource management chapter-09.pdf
cloud_computing_Infrastucture_as_cloud_p
1. Introduction to Computer Programming.pptx
Heart disease approach using modified random forest and particle swarm optimi...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Tartificialntelligence_presentation.pptx
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
OMC Textile Division Presentation 2021.pptx
A Presentation on Artificial Intelligence
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Approach and Philosophy of On baking technology
WOOl fibre morphology and structure.pdf for textiles
A comparative study of natural language inference in Swahili using monolingua...
Mushroom cultivation and it's methods.pdf
1 - Historical Antecedents, Social Consideration.pdf
Hybrid model detection and classification of lung cancer
Hindi spoken digit analysis for native and non-native speakers
August Patch Tuesday
project resource management chapter-09.pdf

MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY

  • 1. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 1, Issue 2, pp: (44-53), Month: October 2014 - March 2015, Available at: www.paperpublications.org Page | 44 Paper Publications MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY C. Narasimham1 , Jacob2 1 II Year M.Tech-CSE, 2 Assoc Prof. of CSE Nova College of Engineering, Jangareddy Gudem, AP, India Abstract: Privacy is one of the friction points that emerge when communications get mediated in Online Social Networks (OSNs). Different communities of computer science researchers have framed the ‘OSN privacy problem’ as one of surveillance, institutional or social privacy. In this article, first we provide an introduction to the surveillance and social privacy perspectives emphasizing the narratives that inform them, as well as their assumptions and goals. This paper mainly addresses visitors events(population) on an users account and updates the account holders log information. And thus the evolutionary aspects of Surveillance are reflected in User's Log, this needs the implementation of Genetic Algorithm. Further, this requires a bridge module between every interaction between the user and social network server. This paper implements mutation aspects through Genetic Algorithm by differing users into Guests and Friends, and identifies and Cross over issues of a guest Clicking Friend of a friend. I. INTRODUCTION The existing work could model and analyze access control requirements with respect to collaborative authorization management of shared data in OSNs. The need of joint management for data sharing, especially photo sharing, in OSNs has been recognized by the recent work provided a solution for collective privacy management in OSNs. Their work considered access control policies of a content that is co-owned by multiple users in an OSN, such that each co-owner may separately specify her/his own privacy preference for the shared content. After careful analysis the system has been identified to have the following stages:  The Social Privacy  The Surveillance  The Institutional Privacy  Privacy As Protection Social Privacy: Social privacy relates to the concerns that users raise and to the harms that they experience when technologically mediated communications disrupt social boundaries. The users are thus “consumers” of these services. They spend time in these (semi-)public spaces in order to socialize with family and friends, get access to information and discussions, and to expand matters of the heart as well as those of belonging. That these activities are made public to „friends‟ or a greater audience is seen as a crucial component of OSNs. In Access Control, solutions that employ methods from user modeling aim to develop “meaningful” privacy settings that are intuitive to use, and that cater to users‟ information management needs. Surveillance Module: With respect to surveillance, the design of PETs starts from the premise that potentially adversarial entities operate or monitor OSNs. These have an interest in getting hold of as much user information as possible, including user-generated
  • 2. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 1, Issue 2, pp: (44-53), Month: October 2014 - March 2015, Available at: www.paperpublications.org Page | 45 Paper Publications content (e.g., posts, pictures, private messages) as well as interaction and behavioral data (e.g., list of friends, pages browsed, „likes‟). Once an adversarial entity has acquired user information, it may use it in unforeseen ways – and possibly to the disadvantage of the individuals associated with the data. Institutional Privacy: The way in which personal control and institutional transparency requirements, as defined through legislation, are implemented has an impact on both surveillance and social privacy problems, and vice versa. institutional privacy studies ways of improving organizational data management practices for compliance, e.g., by developing mechanisms for information flow control and accountability in the back end. The challenges identified in this paper with integrating surveillance and social privacy are also likely to occur in relation to institutional privacy, given fundamental differences in assumptions and research methods. Privacy As Protection: The goal of PETs (“Privacy Enhancing Technologies”) in the context of OSNs is to enable individuals to engage with others, share, access and publish information online, free from surveillance and interference. Ideally, only information that a user explicitly shares is available to his/her intended recipients, while the disclosure of any other information to any other parties is prevented. Furthermore, PETs aim to enhance the ability of a user to publish and access information on OSNs by providing her with means to circumvent censorship. Proposed System: We distinguish three types of privacy problems that researchers in computer science have to tackle. The first approach addresses the “surveillance problem” that arises when the personal information and social interactions of OSN users are leveraged by governments and service providers. The second approach addresses those problems that emerge through the necessary renegotiation of boundaries as social interactions get mediated by OSN services, in short called “social privacy”. The third approach addresses problems related to users losing control and oversight over the collection and processing of their information in OSNs, also known as “institutional privacy”. This paper implements mutation aspects through Genetic Algorithm by differing users into Guests and Friends, and identifies and Cross Over issues of a guest Clicking Friend of a friend. II. DESIGN The system that we propose to describe in using Object Oriented Modeling Diagrams. Use-case Diagram: Fig 1: Use Case Diagram
  • 3. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 1, Issue 2, pp: (44-53), Month: October 2014 - March 2015, Available at: www.paperpublications.org Page | 46 Paper Publications Class Diagram: Fig 2: Class Diagram Sequence Diagram: Fig 3: Sequence Diagram
  • 4. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 1, Issue 2, pp: (44-53), Month: October 2014 - March 2015, Available at: www.paperpublications.org Page | 47 Paper Publications Activity Diagram: Fig 4: Activity Chart Component Diagram: Fig 5: Component Diagram
  • 5. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 1, Issue 2, pp: (44-53), Month: October 2014 - March 2015, Available at: www.paperpublications.org Page | 48 Paper Publications Deployment Diagram: Fig: 6. Deployment Diagram III. IMPLEMENTATION This module collects vistors events (population) on an users account and updates the account holders log information. And Thus the evolutionary aspects of Surveillance are reflected in User's Log. Thus Completing GA's implementation public static void saveActions (String actioned, String actioner, String action, String actionertype, String sensitiveaction) throws ClassNotFoundException, SQLException { if(actioned.trim().equals(actioner.trim())) { return; } DataBase dbfunc = new DataBase(); dbfunc.createConnection(); String query = "insert into actionsmonitor(`actioned`,`actioner`,`action`,`actionon`,`actionertype`,`sensitiveaction`) values('" + actioned.trim() + "','" + actioner + "','" + action + "',now(),'" + actionertype + "','" + sensitiveaction + "')"; System.out.println(query); dbfunc.updateRecord(query); dbfunc.closeConnection(); } This happens to be a bridge module between every interaction between the user and social network server. This module implements mutational aspects of GA by differing users into Guests and Friends. This module implements and identifies Cross Over Activities of a guest Clicking Friend of a friend of a friend. public class Surveillance extends HttpServlet { * Processes requests for both HTTP * <code>GET</code> and * <code>POST</code> methods. * @param request servlet request * @param response servlet response
  • 6. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 1, Issue 2, pp: (44-53), Month: October 2014 - March 2015, Available at: www.paperpublications.org Page | 49 Paper Publications * @throws ServletException if a servlet-specific error occurs * @throws IOException if an I/O error occurs */ protected void processRequest(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException { response.setContentType("text/html;charset=UTF-8"); PrintWriter out = response.getWriter(); try { HttpSession session = request.getSession(false); String store = (String) session.getAttribute("id"); String email = (String) session.getAttribute("email"); String name = (String) session.getAttribute("name"); String option = request.getParameter("option"); if (option.trim().equals("2")) { String friendMail = request.getParameter("friendMail"); Globals.saveActions(friendMail, email, "ViewedProfile", "GUEST", "YES"); String page = "viewProfile.jsp?option=2&friendMail=" + friendMail; response.sendRedirect(page); } if (option.trim().equals("3")) { String friendMail = request.getParameter("friendMail"); Globals.saveActions(friendMail, email, "ViewedProfile", "FRIEND", "NO"); String page = "viewProfile.jsp?option=1&friendMail=" + friendMail; response.sendRedirect(page); } // 4 users's page if (option.trim().equals("4")) { String friendMail = request.getParameter("friendMail"); Globals.saveActions(friendMail, email, "AccountAccess", "FRIEND", "NO"); String page = "template.jsp?option=1&friendMail=" + friendMail; response.sendRedirect(page); } // 5 users's wall if (option.trim().equals("5")) { String friendMail = request.getParameter("friendMail");
  • 7. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 1, Issue 2, pp: (44-53), Month: October 2014 - March 2015, Available at: www.paperpublications.org Page | 50 Paper Publications Globals.saveActions(friendMail, email, "WallAccess", "FRIEND", "NO"); String page = "template.jsp?option=2&friendMail=" + friendMail; response.sendRedirect(page); } // 6 users's photos if (option.trim().equals("6")) { String friendMail = request.getParameter("friendMail"); Globals.saveActions(friendMail, email, "ImageAccess", "FRIEND", "NO"); String page = "template.jsp?option=3&friendMail=" + friendMail; response.sendRedirect(page); } // 7 users's videos if (option.trim().equals("7")) { String friendMail = request.getParameter("friendMail"); Globals.saveActions(friendMail, email, "VideoAccess", "FRIEND", "NO"); String page = "template.jsp?option=4&friendMail=" + friendMail; response.sendRedirect(page); } // 8 users's friends if (option.trim().equals("8")) { String friendMail = request.getParameter("friendMail"); Globals.saveActions(friendMail, email, "FriendAccess", "FRIEND", "NO"); String page = "template.jsp?option=5&friendMail=" + friendMail; response.sendRedirect(page); } // 9 chain users's page if (option.trim().equals("9")) { String source = request.getParameter("source"); String friendMail = request.getParameter("friendMail"); Globals.saveActions(friendMail, email, "FriendAccess:Source("+source+") and Friend("+friendMail+")", "FRIEND", "NO"); String page = "template.jsp?option=1&friendMail=" + friendMail; response.sendRedirect(page); } } catch (ClassNotFoundException ex) {
  • 8. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 1, Issue 2, pp: (44-53), Month: October 2014 - March 2015, Available at: www.paperpublications.org Page | 51 Paper Publications Logger.getLogger(Surveillance.class.getName()).log(Level.SEVERE, null, ex); } catch (SQLException ex) { Logger.getLogger(Surveillance.class.getName()).log(Level.SEVERE, null, ex); } finally { out.close(); }} // <editor-fold defaultstate="collapsed" desc="HttpServlet methods. Click on the + sign on the left to edit the code."> /** * Handles the HTTP * <code>GET</code> method. * @param request servlet request * @param response servlet response * @throws ServletException if a servlet-specific error occurs * @throws IOException if an I/O error occurs */ @Override protected void doGet(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException { processRequest(request, response); } * Handles the HTTP * <code>POST</code> method. * * @param request servlet request * @param response servlet response * @throws ServletException if a servlet-specific error occurs * @throws IOException if an I/O error occurs */ @Override protected void doPost(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException { processRequest(request, response); } * Returns a short description of the servlet. * @return a String containing servlet description
  • 9. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 1, Issue 2, pp: (44-53), Month: October 2014 - March 2015, Available at: www.paperpublications.org Page | 52 Paper Publications @Override public String getServletInfo() { return "Short description"; }// </editor-fold> } IV. RESULTS Profile Created Successfully osn@gmail.com Email: narasimham_c@yahoo.com Event Name : Profile Creation Date : 28-10-2014 16:22:54 IP Address : 0:0:0:0:0:0:0:1 ...Thank You...Please Visit Us For Social Networking.. New Image Upload User Id : gvravindranath@gmail.com Event Name : User (gvravindranath@gmail.com) Uploaded New Image:Jellyfish.jpg Activity : New Image Upload Activity On : 2014-10-28 16:19:47.0 Sent On : 28-10-2014 16:20:44 ...Thank You...Please Visit Us... Profile Picture Up dation User Id : gvravindranath@gmail.com Event Name : User(gvravindranath@gmail.com) Updated Their Profile Pic Activity : Profile Picture Updation Activity On : 2014-10-28 16:18:40.0 Sent On : 28-10-2014 16:19:35 ...Thank You...Please Visit Us... New Profile Update osn@gmail.com User Id : gvravindranath@gmail.com Event Name : User (gvravindranath@gmail.com) Uploaded New Image: Koala.jpg Activity : New Image Upload Activity On : 2014-10-28 16:19:47.0 Sent On : 28-10-2014 16:20:35
  • 10. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 1, Issue 2, pp: (44-53), Month: October 2014 - March 2015, Available at: www.paperpublications.org Page | 53 Paper Publications ...Thank You...Please Visit Us... User Id : gvravindranath@gmail.com Event Name : User (gvravindranath@gmail.com) updated Their Profile Activity : New Profile Update Activity On : 2014-10-28 16:17:20.0 Sent On : 28-10-2014 16:17:35 ...Thank You...Please Visit Us... V. CONCLUSION Privacy is one of the friction points in Online Social Networks (OSNs). In this article, we conclude that the surveillance and social privacy perspectives have been emphasized. And, addressed the visitors events on an users account and updated with the account holders log information. This paper described the implementation of a bridge process between every interaction between the user and social network server. Further, implemented mutational aspects of Genetic Algorithm by differing users into Guests and Friends, and identified Cross Over Activities of a guest Clicking Friend of a friend of a friend. REFERENCES [1] Seda Gurses, Claudia Diaz “Two Tales of Privacy in Online Social Networks” IEEE Security and Privacy Vol: PP No 99, 2013. [2] J. Anderson, C. Diaz, J. Bonneau, and F. Stajano. Privacy-Enabling Social Networking over Untrusted Networks. InACM Workshop on Online Social Networks (WOSN), pages 1–6. ACM, 2009. [3] F. Beato, M. Kohlweiss, and K. Wouters. Scramble! your social network data. In Privacy Enhancing Technologies Symposium, PETS 2011, volume 6794 of LNCS, pages 211–225. Springer, 2011. [4] E. De Cristofaro, C. Soriente, G. Tsudik, and A. Williams. Humming-bird: Privacy at the time of twitter, IEEE Symposium on Security and Privacy, pages 285–299. IEEE Computer Society, 2012. [5] .A. Cutillo, R. Molva, and T. Strufe. Safebook: A privacy-preserving online social network leveraging on real-life trust. Communications Magazine, 47(12):94–101, 2009. [6] James Grimmelmann. Saving Facebook. Iowa Law Review, 94:1137– 1206, 2009. [7] Kevin D. Haggerty and Richard V. Ericson. The Surveillant Assemblage. British Journal of Sociology, 51(4):605 – 622, 2000. [8] Evgeny Morozov. Face book and Twitter are just places revolutionaries go. The Guardian, 11. March 2011. [9] Deirdre K. Mulligan and Jennifer King. Bridging the gap between privacy and design. Journal of Constitutional Law, 14 (4):989 – 1034, 2012.