International Research Journal of Engineering and Technology (IRJET) Volume: 04 Issue: 03 | Mar -2017
www.irjet.net
e-ISSN: 2395 -0056 p-ISSN: 2395-0072
PRIVACY PROTECTION USING FORMAL LOGICS IN ONLINE SOCIAL NETWORKS Chrsitina Rini.R1, Jathursana.L2, Dhivya Keerthana.S3, Ms.V.Sathiya4 123Student,
4Associate
Department of CSE, Panimalar Engineering College, Chennai, India. Professor, Department of CSE,Panimalar Engineering College,Chennai, India
-----------------------------------------------------------------------------------------------------------------------------------------------------------------Abstract- Privacy breaches have been understood as the agent. Each agent keeps track them over time. The agent is malfunctioning of a given system. However, a byproduct of then responsible for checking if these privacy its workings. The users are allowed to create and share requirements are expectations from the system. Since content about themselves can reach unintended privacy requirements differ per person, the agent is individuals and inference can reveal more information responsible for creating on-demand privacy agreements about the user. Social networks our categorization yields with the system. Formalization of users’ privacy that the privacy violations in online social networks of requirements is important since privacy violations result events. Our proposed approach is based on agent-based because of the variance in expectation violation for a representation of a social network, The privacy context, second user. By individually representing these for each including the relations among users or content types, are user, one can check for the violations per situation. Once captured using and our approach using real-life social the agent forms the agreements then it can query the networks. system for privacy violations at particular states of the system. Since privacy violations require semantic Index Terms— Privacy, social networks, ontology, formal understanding of situations. model Checking for privacy violation can be useful in two I. INTRODUCTION ways. First is to find out whether the current system currently violates a privacy constraint of a user. That is, to Were used to share personal content with friends decide if the actions of others or the user have already (e.g., Facebook.com), more and more a large number of created a violation. Second is to find out whether taking a users; however each user shares content with only a small particular action will lead to a violation (e.g., becoming subset of these of the user. For example, a user might share friends with a new person). That is, to decide if a future state will cause a violation. If so, the system can act to contact information with all of her acquaintances, the user prevent the violation, for example by disallowing a certain might not even want all her friends to see it. That is, friendship or removing some contextual there are . privacy constraints vary based with their users. However, Using the meta-model,we formally define agentwhen that happens, it is difficult to enforce users’ privacy based social networks, privacy requirements, PRIGUARD requirements. That is, each user can contribute to the for representing a model that conforms to the metasharing of content by putting up posts. It accessible for model.This semantic approach uses description logic (DL) others. These interactions privacy violations, some of [3] to represent information about the social network core which are to deal with privacy violations [2]. of the approach is an algorithm that checks if commitments are violated, leading to a an open-source That is shared in the online social network (OSN). The software tool, PRIGUARDTOOL that implements the content that might be shared by the user herself or by approach using ontologies of our approach through this others; the content may vary, entire social network. tool shows that different types of privacy violations can be Whenever this content reveals information to an detected are available in the literature.. unintended audience, the user’s privacy is breached. Section 5 uses the meta-model to model a real-life It is important that if a user’s privacy will be breached, social network and constructs with pointers for future then either the system takes an appropriate action to avoid work. this or if it is unavoidable at least let the user know so that she can address circulates in the system and manually find out if their privacy has been breached. This is of social networks, where each user is represented by a software
© 2017, IRJET
|
Impact Factor value: 5.181
|
ISO 9001:2008 Certified Journal
|
Page 1255