CS298 Proposal
Access Control In a Social Networking Environment
Mallika Perepa (perepamallika@gmail.com)
Advisor: Dr. Chris Pollett
Committee Members: Dr. Sami Khuri and Dr. Teng Moh
Abstract:
This project aims to explore access control techniques for dynamically created groups.
The starting point will be the Yioop, a PHP-based search engine. The ability to create
social groups will be added to Yioop. We have explored different policies for automatically
adding access levels and compared them with the policies of existing social networks to gain
an insight into how access control is provided. Last semester we implemented a Manage Groups
feature to Yioop and a feature to group the users. This semester a Grouping feature in Yioop will be
improved by adding the additional functionalities like, building pages and blogs for every group and
adding an option to mark a group public or not. Detailed experiments to compare the access control methods
of existing social networking sites with the access control methods in Yioop will be conducted.
CS297 Results:
- Studied the proposal, design, implementations, and the results from B.Ur and R.McGrath paper Grouping Friends for Access Control in Online Social Network.
- Conducted experiments on different social networking websites that explore access control to different groups and also different users within a group.
Also compared the accessibility of using a Group feature between different web applications and social networking sites such as Skype, Facebook, Google, and Yahoo.
- Added a Manage Groups feature in Yioop and implemented the feature to group the users.
- Enhanced the Manage Groups feature by implementing the View Groups feature.
Proposed Schedule
Week 1:
Aug 26-Sep 3 | Discuss the project in detail with the advisor. |
Week 2-3:
Sep 3-17 | Deliverable1: Adding a Create a New Account feature to Yioop.Working on the user interface of web pages
and blogs for every group. |
Week 4,5,6:
Sept 17-Oct 7 | Deliverable 2: Building web pages and blogs for every group and trying to develop a feature
to mark a group public or not (trying to provide access control to groups). |
Weak 7,8,9:
Oct 8-28: | Deliverable 3: Compare the access control methods of the existing social networking sites
with the access control methods in Yioop. |
Week 10,11,12:
Oct 29-Nov18 | Deliverable 4:Implement and test all the functionalities related to the Grouping feature in Yioop. |
Week 13:
Nov19-Nov25 | Work on CS298 Report. |
Week 14:
Nov26- Dec2 | Draft of CS298 Report- Submit to Advisor and Committee. |
Week 15:
Dec3-Dec9 | CS298 Report final document- Submit to Advisor and Committee. |
Week 16:
Dec10-Dec16 | Defense. |
Key Deliverables:
- Software
- Deliver a patch for implementing the Manage Groups feature in Yioop.
- Building web pages and blogs for every group in Yioop.
- Providing access control techniques to the Groups in Yioop by marking a group public or not.
- Comparing the access control methods of the existing social networking sites
with the access control methods in Yioop.
- Report
- CS298 Report.
- Project Code and Test results Documentation.
Innovations and Challenges:
- Conducting and analyzing the experiments on different social networking websites that
explore access control to different groups and also different users within a group was
challenging and time consuming as several activities were to be considered.
- Comparing the accessibility of using a Create Group feature between
different web applications and social networking sites gave an insight of how access control is given.
- Adding a Manage Groups feature in Yioop and implementing the feature to group the users is
innovative and challenging as this feature will add the ability to create social groups to Yioop.
- Implementing activities like changing the group privacy options and transferring the
admin property to a different user within a group will be interesting and challenging to accomplish.
References:
[1] Information Retrieval: Implementing and Evaluating Search Engines. Stefan, Clarke, Charles, and Cormack, Gordon. The MIT Press. 2010.
[2] Abdessalem.T, and Dhia.B.I (January 29,2013). Reachability based Access Control Model for Online Social Networks
(www page). URL. http://isicil.inria.fr/v2/res/docs/articles/DBSocial2011/DBsocial__paper.pdf
[3] Jahid.S, Mittal.P, and Borisov.N (2011). EASiER: Encryption-based Access Control in Social Networks with Efficient Revocation (www page).
URL. Retrieved January 30, 2013. http://web.engr.illinois.edu/~sjahid2/pub/easier-asiaccs2011.pdf
|