IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 702- 706
International Journal of Research in Information Technology (IJRIT) www.ijrit.com
ISSN 2001-5569
User Privacy on on Social Networking Sites Hemavathi Pandillapalli1 ,VijayaLakshmi Mukkara2 , Mamatha Maganti3, Punyacharitha Kambala4 1, 2, 3, 4
B.Tech , Department of Computer Science and Engineering , JNTUA college of Engineering , Pulivendula Kadapa , Andhra Pradesh , India 1
2
[email protected] ,
[email protected] ,
[email protected] 4
[email protected]
ABSTRACT It seems that everyone in the world is a member of social networking sites these days. If anyone is not a member of these sites, it feels like he or she is not a social person or he does not exist in the world. It has now become the most important part of our life, without visiting one day; it feels like they missed some important information. Social networking sites, such as MySpace, Facebook and Flickr, are gaining more and more popularity among Internet users. As users are enjoying this new style of networking, privacy concerns are also attracting increasing public attention due to reports about privacy breaches on social networking sites. A significant amount of work for privacy protection on OSN(Online Social Networks) has been introduced For example, flyByNight is a Facebook application designed to protect the privacy of messages exchanged between Facebook users. NOYB (short for “None Of Your Business”) is another system targeted at cryptographically protecting user privacy on Facebook.
Keywords: Userprivacy, Social Networkingsite,Significance
1. INTRODUCTION Social networking sites like
www.facebook.com (facebook), www.orkut.com (Orkut),
www.myspace.com (my space), www.linkedin.com (LinkedIn) offer members the ability to instantly connect and Hemavathi Pandillapalli,
IJRIT
702
IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 702- 706
communicate with other members; including friends, relatives, colleagues, contacts, prospects and even the general public. These sites are otherwise called as social media sites. These social networking sites are essentially known as online communities of personal and professional friends. These sites are increasingly attracting millions of users, many of whom have integrated these sites into their daily practices. Now in this 21st century, all these online communication sites have become more popular. Around 700 billion people are members of these sites and they are visiting to these sites in their everyday life to communicate or to share something with their friends, colleagues or any other person to whom they want to share. More than 30 billion contents (such as articles, photos, links, news, stories, blog posts etc.) are shared on face book every month.
2. LITERATURE REVIEW •
According to M. M. Lucas and N. Borisov[8] “flyByNight” is a Facebook application designed to protect the privacy of messages exchanged between Facebook users.
•
According to S. Guha, K. Tang, and P. Francis[9] “NOYB” (short for “None Of Your Business”) is another system targeted at protecting user privacy on Facebook using “encryption” in a novel way.
•
W. Luo, Q. Xie, and U. Hengartner[2] present FaceCloak, an architecture that enforces user privacy on social networking sites by shielding a user’s personal information from the site and from other users that were not explicitly authorized by the user.
3. METHODOLOGY
3.1 ARCHITECTURE FaceCloak carries out privacy protection in three phases: the setup phase, the encryption phase and the decryption phase.
Hemavathi Pandillapalli,
IJRIT
703
IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 702- 706
Fig. 1: Architecture of FaceCloak FaceCloak generates several keys and distributes a subset of these keys to the user’s friends An optional task for the setup phase is setting up a third party server, which is used to store and retrieve the user’s encrypted personal information. When a user installs FaceCloak, it generates three keys: amaster key, a personal index key, and an access key. A copy of the master key and the personal index key are distributed by the user to her friends, whereas the access key is stored locally on the user’s computer and never distributed. To prevent the social networking site from learning the master and personal index keys, the user should use out-of-band mechanisms, suchas e-mail, to distribute them. In the encryption phase, FaceCloak guides a content publisher (i.e., a user who posts information to her or her friend’s account on the social networking site) to encrypt the posted information and send it to the third party server over a connection protected by TLS. The decryption phase occurs when a content viewer (i.e., the owner of an account or an authorized friend of the owner) wants to look at information posted to the account . The content viewer decrypts the real information retrieved from the third party server over a connection protected by TLS and uses it to replace the fake information obtained from the social networking site.
3.2 IMPACT OF SOCIAL NETWORKING SITES ON SOCIAL LIFE
There are people who stand for social networking sites while others are against. Well one of the many advantages is that you can connect with your lost connections, lost family members on social networking sites. Simply by typing a name and you might see a picture of someone whom you have not seen him in years. You can Hemavathi Pandillapalli,
IJRIT
704
IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 702- 706
even rekindle your lost relationship with your friends or relatives if you try for this to accomplish. So it is a best medium for bonding your relationships forever. Another advantage is that the career advantage, by posting information about yourself and your work history, you may just get some job offers. Some social networks are good opportunities to find jobs.
3.3 SIGNFICANCE IN INDIAN SCEANARIO There are some major legal issues which arise in social networking sites like defamation issues, privacy issues, copyright issues and also lot of people are facing the problem of „pranksters‟ i.e. creating fake profiles on the social networking sites. Some cases are there in Delhi, Mumbai where people are facing these problems of fake profiles. In Delhi, an air-hostess working for king fisher airlines asked a city court for filling a case against Orkut after a vulgar profile posted by someone. The fake profile had a picture of her with her working uniform and her neighbors‟ phone number has been listed for „friendship‟. Her neighbors‟ were flooded with persky calls leading to a lot of embarrassment. Another case was that the family of a school girl started receiving phone calls and visits of strangers after a prankster created a lewd fake profile on orkut and listed the girls‟ phone number and e-mail address. Another case happened in Mumbai, that a guy who owns boutique faced a lot of humiliation after a fake profile on orkut listed him as a porn seller mentioning his phone number and home address for good deals. Even if your own friends are also not so much faithful, they may create a fake profile. Not only common people, celebrities are also facing these types of problems many times in order to defame them or to hamper their privacy in society.
4. CONCLUSION It was found that social networking sites are acting as great medium for view mobilization. People are feeling free in sharing their thoughts on any issue and even youth is raising their voice against social acts like violation of Human Rights, corruption etc. These social networking sites are proving themselves a boon at least in bringing thoughts of people on these social issues. Although present some technologies that are used in to provide privacy for user information on social networking sites.
REFERENCES [1] BBC News, “Crew sacked over Facebook posts,” http://news.bbc.co.uk/2/hi/uk news/7703129.stm, October 2008, accessed April 2009. [2] W. Luo, Q. Xie, and U. Hengartner, “Facecloak: An architecture for user privacy on social networking sites,” in CSE (3). IEEE Computer Society, 2009, pp. 26–33.
Hemavathi Pandillapalli,
IJRIT
705
IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 702- 706
[3]
You
Tube‟s
acquisition
by
Google:
issues
and
challenges
case
study,
http://webcache.googleusercontent.com/search?q=cache:32pfYyvoL40J:www.ibscdc.org/Case_studies/Strategy/Mer gers,%2520Acquisitions%2520and%2520Takeovers/MAA0095C.htm+copy+right+issues%2Bsocial+networking+si tes%2Bindia%2Bcase&cd=3&hl=en&ct=clnk&gl=in [4] CyberInsecure.com, “New Cross-Site Scripting Vulnerability Found On Facebook, ”http:// cyberinsecure.com/ new-cross-site-scripting-vulnerability-found-on-facebook/, May 2008, access It is also being generated from the information so obtained that people are getting more aware about the social issues mainly from Facebook. ed April 2009. [5] Facebook, “Privacy Policy,” http://www.facebook.com/policy.php, November 2008, accessed April 2009. [6] K. B. Frikken and P. Srinnivas, “Key allocation schemes for private social networks,” in Proceedings of the 8th ACM workshop on Privacy in the electronic society, 2009, pp. 11–20. [7]
TechCrunch,
“Facebook
Now
Nearly
Twice
The
Size
Of
MySpace
Worldwide,”
http://www.techcrunch.com/2009/01/22/ facebook-now-nearly-twice-the-size-of-myspace-worldwide, January 2009, accessed April 2009. [8] M. M. Lucas and N. Borisov, “flyByNight: Mitigating the Privacy Risks of Social Networking,” in Proc. of 7th ACM Workshop on Privacy in the Electronic Society (WPES 2008), October 2008, pp. 1–8. [9] S. Guha, K. Tang, and P. Francis, “NOYB: Privacy in Online Social Networks,” in Proc. of 1st Workshop on Online Social Networks (WOSN 2008), August 2008, pp. 49–54. [10] A. Felt and D. Evans, “Privacy Protection for Social Networking Platforms,” in Proc. of Web 2.0 Security and Privacy (W2SP 2009), May 2008.
Hemavathi Pandillapalli,
IJRIT
706