ISSN (ONLINE): 2349-7084 GLOBAL IMPACT FACTOR 0.238 ISRA JIF 0.351 INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING IN RESEARCH TRENDS VOLUME 2, ISSUE 5, MAY 2015, PP 293-295 IJCERT © 2015 Page | 293 ht http://www.ijcert.org New Access Control Methodology for Online Social Network Sandip Sharad Shirgave, Prof. S. V. Pingale, Prof. A. A. Rajguru, Prof. N. M. Sawant AbstractA social networking sites are a platform to build social networks or social relations within people who share interests, activities, backgrounds or real-life connections with each other. A social network service mostly consists of a representation of each user like a profile, his or her social links, and a variety of additional services. Social network sites are web-based services that allow individuals to create a public profile, to create a list of users with whom to share connections, and view and cross the connections within the system.Most social network services are web-based and provide means for users to interact over the Internet, such as e-mail and instant messaging. Social network sites are varied and they incorporate new information and communication tools such as mobile connectivity, photo/video/sharing and blogging.But present social networking sites can not provide mechanism for restricting the information associated with multiple users. This paper shows different methods used by different authors. Index TermsSocial network, security, privacy, methodology. —————————— —————————— 1 INTRODUCTION he Online social networks are the most popular web ser- vices during several years and have attracted a large amount of online users all over the world.For example, Facebook, the leading social network service, has more than one billion active users. With the large amount of data main- tained in social network websites, privacy concerning user’s personal information becomes an important but technically challenging problem. Access control schemes are naturally introduced to protect online user’s privacy in social networks. They can be used to guarantee that information are accessible by multiple users, but not by other users. The availability of this information obviously raises privacy and confidentiality issues. Users typically do not want to share all of their infor- mation with everyone. Consequently, Online Social Networks must provide the right mechanisms in order to give users more control on distribution of their information, which may be accessed by a multiple users far wider than they expected. Todays social networking sites provide only the most basic access control policies, e.g. a user can specify whether a particular of infor- mation shall be publicly available, private (no one can see it) or accessible only by direct user. This simple access control mechanism has the advantage of being simple, intuitive and easy to implement. However, it is not flexible enough to fit with the requirements of all users. It is either too loose be- cause it grants access to all users (public), or it is too restric- tive by limiting too much information sharing (private). Thus, social networking applications need mechanisms that support high- Level complicated access control policies. If a online user posts a comment in a friend’s space, she/he cannot specify which online users can view the comment or photo or video or weblink. In another case, when a user upl- oads a photo and tags friends who appear in the photo, the tagged friends cannot restrict who can see this photo. Since multiple associated users may have different privacy con- cerns over the shared data, privacy conflicts occur and the lack of collaborative privacy control increases the potential risk in leaking sensitive information by friends to the public. 2. PRIVACY CONFLICTS IN ONLINE SOCIAL NETWORKS Users in OSNs can post statuses and notes, upload photos and Videos in their own spaces, tag others to their content, and share the content with their friends. On the other hand, users can also post content in their friends’ spaces. The shared content may be connected with multiple users. A privacy policy conflict occurs when more than two us- ers co-own an identical piece of information or data, and both of them are capable of configuring their own publication set- tings in-dividually. Multiple associated users may have dif- ferent privacy concerns over the shared content, privacy con- flicts can occur among the multiple users. 3 PROBLEM STATEMENT To enable the protection of shared data associated with multiple users in OSNs with the help of access control me- chanism. T ———————————————— Sandip Sharad Shirgave is currently pursuing master’s degree program in computer science & engineering in SKN Sinhgad College Of Engineering, Korti, Solapur University, India, PH-09850004107. E-mail: sandipshirgave@gmail.com Prof.S. V. Pingale is currently working as a professor in SKN Sinhgad College Of Engineering,Korti,Solapur University, India, E-mail: sub.pingale83@gmail.com Prof. A. A. Rajguru is currently working as a Head Of Computer Deaprt- ment in SKN Sinhgad College Of Engineering,Korti,Solapur University, India, E-mail: abhijitcse08@gmail.com Prof. N. M. Sawant is currently working as a professor in SKN Sinhgad College Of Engineering,Korti,Solapur University, India