IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 702- 706

International Journal of Research in Information Technology (IJRIT) www.ijrit.com

ISSN 2001-5569

User Privacy on on Social Networking Sites Hemavathi Pandillapalli1 ,VijayaLakshmi Mukkara2 , Mamatha Maganti3, Punyacharitha Kambala4 1, 2, 3, 4

B.Tech , Department of Computer Science and Engineering , JNTUA college of Engineering , Pulivendula Kadapa , Andhra Pradesh , India 1

2

[email protected] , [email protected] , [email protected] 4

[email protected]

ABSTRACT It seems that everyone in the world is a member of social networking sites these days. If anyone is not a member of these sites, it feels like he or she is not a social person or he does not exist in the world. It has now become the most important part of our life, without visiting one day; it feels like they missed some important information. Social networking sites, such as MySpace, Facebook and Flickr, are gaining more and more popularity among Internet users. As users are enjoying this new style of networking, privacy concerns are also attracting increasing public attention due to reports about privacy breaches on social networking sites. A significant amount of work for privacy protection on OSN(Online Social Networks) has been introduced For example, flyByNight is a Facebook application designed to protect the privacy of messages exchanged between Facebook users. NOYB (short for “None Of Your Business”) is another system targeted at cryptographically protecting user privacy on Facebook.

Keywords: Userprivacy, Social Networkingsite,Significance

1. INTRODUCTION Social networking sites like

www.facebook.com (facebook), www.orkut.com (Orkut),

www.myspace.com (my space), www.linkedin.com (LinkedIn) offer members the ability to instantly connect and Hemavathi Pandillapalli,

IJRIT

702

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 702- 706

communicate with other members; including friends, relatives, colleagues, contacts, prospects and even the general public. These sites are otherwise called as social media sites. These social networking sites are essentially known as online communities of personal and professional friends. These sites are increasingly attracting millions of users, many of whom have integrated these sites into their daily practices. Now in this 21st century, all these online communication sites have become more popular. Around 700 billion people are members of these sites and they are visiting to these sites in their everyday life to communicate or to share something with their friends, colleagues or any other person to whom they want to share. More than 30 billion contents (such as articles, photos, links, news, stories, blog posts etc.) are shared on face book every month.

2. LITERATURE REVIEW •

According to M. M. Lucas and N. Borisov[8] “flyByNight” is a Facebook application designed to protect the privacy of messages exchanged between Facebook users.



According to S. Guha, K. Tang, and P. Francis[9] “NOYB” (short for “None Of Your Business”) is another system targeted at protecting user privacy on Facebook using “encryption” in a novel way.



W. Luo, Q. Xie, and U. Hengartner[2] present FaceCloak, an architecture that enforces user privacy on social networking sites by shielding a user’s personal information from the site and from other users that were not explicitly authorized by the user.

3. METHODOLOGY

3.1 ARCHITECTURE FaceCloak carries out privacy protection in three phases: the setup phase, the encryption phase and the decryption phase.

Hemavathi Pandillapalli,

IJRIT

703

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 702- 706

Fig. 1: Architecture of FaceCloak FaceCloak generates several keys and distributes a subset of these keys to the user’s friends An optional task for the setup phase is setting up a third party server, which is used to store and retrieve the user’s encrypted personal information. When a user installs FaceCloak, it generates three keys: amaster key, a personal index key, and an access key. A copy of the master key and the personal index key are distributed by the user to her friends, whereas the access key is stored locally on the user’s computer and never distributed. To prevent the social networking site from learning the master and personal index keys, the user should use out-of-band mechanisms, suchas e-mail, to distribute them. In the encryption phase, FaceCloak guides a content publisher (i.e., a user who posts information to her or her friend’s account on the social networking site) to encrypt the posted information and send it to the third party server over a connection protected by TLS. The decryption phase occurs when a content viewer (i.e., the owner of an account or an authorized friend of the owner) wants to look at information posted to the account . The content viewer decrypts the real information retrieved from the third party server over a connection protected by TLS and uses it to replace the fake information obtained from the social networking site.

3.2 IMPACT OF SOCIAL NETWORKING SITES ON SOCIAL LIFE

There are people who stand for social networking sites while others are against. Well one of the many advantages is that you can connect with your lost connections, lost family members on social networking sites. Simply by typing a name and you might see a picture of someone whom you have not seen him in years. You can Hemavathi Pandillapalli,

IJRIT

704

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 702- 706

even rekindle your lost relationship with your friends or relatives if you try for this to accomplish. So it is a best medium for bonding your relationships forever. Another advantage is that the career advantage, by posting information about yourself and your work history, you may just get some job offers. Some social networks are good opportunities to find jobs.

3.3 SIGNFICANCE IN INDIAN SCEANARIO There are some major legal issues which arise in social networking sites like defamation issues, privacy issues, copyright issues and also lot of people are facing the problem of „pranksters‟ i.e. creating fake profiles on the social networking sites. Some cases are there in Delhi, Mumbai where people are facing these problems of fake profiles. In Delhi, an air-hostess working for king fisher airlines asked a city court for filling a case against Orkut after a vulgar profile posted by someone. The fake profile had a picture of her with her working uniform and her neighbors‟ phone number has been listed for „friendship‟. Her neighbors‟ were flooded with persky calls leading to a lot of embarrassment. Another case was that the family of a school girl started receiving phone calls and visits of strangers after a prankster created a lewd fake profile on orkut and listed the girls‟ phone number and e-mail address. Another case happened in Mumbai, that a guy who owns boutique faced a lot of humiliation after a fake profile on orkut listed him as a porn seller mentioning his phone number and home address for good deals. Even if your own friends are also not so much faithful, they may create a fake profile. Not only common people, celebrities are also facing these types of problems many times in order to defame them or to hamper their privacy in society.

4. CONCLUSION It was found that social networking sites are acting as great medium for view mobilization. People are feeling free in sharing their thoughts on any issue and even youth is raising their voice against social acts like violation of Human Rights, corruption etc. These social networking sites are proving themselves a boon at least in bringing thoughts of people on these social issues. Although present some technologies that are used in to provide privacy for user information on social networking sites.

REFERENCES [1] BBC News, “Crew sacked over Facebook posts,” http://news.bbc.co.uk/2/hi/uk news/7703129.stm, October 2008, accessed April 2009. [2] W. Luo, Q. Xie, and U. Hengartner, “Facecloak: An architecture for user privacy on social networking sites,” in CSE (3). IEEE Computer Society, 2009, pp. 26–33.

Hemavathi Pandillapalli,

IJRIT

705

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 702- 706

[3]

You

Tube‟s

acquisition

by

Google:

issues

and

challenges

case

study,

http://webcache.googleusercontent.com/search?q=cache:32pfYyvoL40J:www.ibscdc.org/Case_studies/Strategy/Mer gers,%2520Acquisitions%2520and%2520Takeovers/MAA0095C.htm+copy+right+issues%2Bsocial+networking+si tes%2Bindia%2Bcase&cd=3&hl=en&ct=clnk&gl=in [4] CyberInsecure.com, “New Cross-Site Scripting Vulnerability Found On Facebook, ”http:// cyberinsecure.com/ new-cross-site-scripting-vulnerability-found-on-facebook/, May 2008, access It is also being generated from the information so obtained that people are getting more aware about the social issues mainly from Facebook. ed April 2009. [5] Facebook, “Privacy Policy,” http://www.facebook.com/policy.php, November 2008, accessed April 2009. [6] K. B. Frikken and P. Srinnivas, “Key allocation schemes for private social networks,” in Proceedings of the 8th ACM workshop on Privacy in the electronic society, 2009, pp. 11–20. [7]

TechCrunch,

“Facebook

Now

Nearly

Twice

The

Size

Of

MySpace

Worldwide,”

http://www.techcrunch.com/2009/01/22/ facebook-now-nearly-twice-the-size-of-myspace-worldwide, January 2009, accessed April 2009. [8] M. M. Lucas and N. Borisov, “flyByNight: Mitigating the Privacy Risks of Social Networking,” in Proc. of 7th ACM Workshop on Privacy in the Electronic Society (WPES 2008), October 2008, pp. 1–8. [9] S. Guha, K. Tang, and P. Francis, “NOYB: Privacy in Online Social Networks,” in Proc. of 1st Workshop on Online Social Networks (WOSN 2008), August 2008, pp. 49–54. [10] A. Felt and D. Evans, “Privacy Protection for Social Networking Platforms,” in Proc. of Web 2.0 Security and Privacy (W2SP 2009), May 2008.

Hemavathi Pandillapalli,

IJRIT

706

User Privacy o User Privacy on Social Networking ...

As users are enjoying this new style of networking, privacy concerns are also attracting increasing public attention due to reports about privacy breaches on social networking sites. A significant amount of work for privacy protection on OSN(Online Social Networks) has been introduced For example, flyByNight is a Facebook.

95KB Sizes 0 Downloads 262 Views

Recommend Documents

Social Engineering Attacks on Government Opponents - Privacy ...
find important differences in terms of the subjects' per- ceptions of risk .... tifiers S1–S30) over a two year period between March. 2014 and March 2016.

Social Engineering Attacks on Government Opponents - Privacy ...
seized) account, and indeed 40% of subjects had no strategy to recover their compromised accounts, and. 57% reported no strategy if they lost their phone.

Architecting Interoperable Privacy within User-Centric ...
systems and cloud computing, thus the development of service oriented architecture and the adoption open standards become a mean to assure interoperability.

xBook: Redesigning Privacy Control in Social Networking Platforms
being service providers to platforms for running third party applications. ... ical social network setting: (1) user-user access control. (e.g., access to only friends) ...

Cheap privacy filter 14 inch Laptop Privacy Screens Anti Privacy ...
Cheap privacy filter 14 inch Laptop Privacy Screens A ... Monitor 31.0df17.4cm Privacy Anti-Spy Screen 16-9.pdf. Cheap privacy filter 14 inch Laptop Privacy ...

(Under)mining Privacy in Social Networks
Google Inc. 1 Introduction ... semi-public stage on which one can act in the privacy of one's social circle ... ing on its customer service form, and coComment simi-.

Vanity or Privacy? Social Media as a Facilitator of Privacy and Trust
each study, each participant received the title, snippet and url for each of several articles (seven, eight, nine and five in the four studies, respectively). The articles.

PRIVACY POLICY.pdf
Page 1 of 1. PRIVACY POLICY.pdf. PRIVACY POLICY.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying PRIVACY POLICY.pdf. Page 1 of 1.

Privacy Policy.pdf
[email protected]. Telephone number: (877) 8-CAESAR. Effective as of January 01, 2017. Page 3 of 3. Privacy Policy.pdf. Privacy Policy.pdf. Open.

Privacy Cookie.pdf
I cookie sono dei file di testo che i siti visitati inviano al browser dell'utente e che. vengono memorizzati per poi essere ritrasmessi al sito alla visita successiva. 2.

Privacy Act Statement - USAREC
AUTHORITY: Collection of this information is authorized by 10 USC, sections 503 and 3013. PRINCIPAL PURPOSE: Information collected will be used to ...

Privacy Final
Sep 20, 2002 - personal information made possible by information technology. ..... Rachels, base their defense of privacy on grounds unrelated to autonomy, ...

PRIVACY POLICY.pdf
PRIVACY POLICY.pdf. PRIVACY POLICY.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying PRIVACY POLICY.pdf. Page 1 of 1.

Privacy Policy
Apr 17, 2017 - Your privacy matters to Google, so whether you are new to Google or a long- ... identifiers, and mobile network information including phone number). ... telephony log information, such as your phone number, calling-party number, ... Pa

Privacy-enhanced display device
Jan 15, 2009 - 5,463,428 A 10/1995 Ligtg? et al'. Darrell L. Lelgh ... 5,963,371 A 10/1999 Needham et al. .... This is a particular problem for laptop computers.

Privacy Policy.pdf
CalOPPA is the first state law in the nation to require commercial websites and online services. to post a privacy policy. The law's reach stretches well beyond ...

Privacy Policy.pdf
out in this policy or otherwise notified to you at the time of collection. Information Requested by another Organisation: Your personal information will be used to complete your taxation return. (business & individual), business activity statements (

Privacy Policy.pdf
may review and update this information at any time, by emailing us at [email protected], you can: Update personal information you have already given ...

Privacy-Policy.pdf
Site, such as the operating system and the Internet service providers utilized and other similar information. ... Privacy-Policy.pdf. Privacy-Policy.pdf. Open. Extract.

Privacy Policy.pdf
Page 1 of 1. Capstone Teleprompter Privacy Policy. Privacy Policy. Last updated: 8 February 2017. Capstone Teleprompter is an Android Application hosted in ...

Google Privacy Policy
Apr 17, 2017 - businesses and site owners analyze the traffic to their websites and apps. .... For example, we may share information publicly to show trends ...