For more Electrical & Computer Engineering Project click here


List of Acronyms

1  Introduction
1.1       Background Information
1.2       Statement of Problem
1.3       Objectives
1.4       Methodology
1.5       Outline of the Thesis

2  Literature Review
2.1       Literature Survey
2.2       Cryptography Security
2.3       Secret Sharing Scheme
2.3.1    Share Distribution
2.3.2  Key Reconstruction
2.4       Data-based Access Control
2.5       Hash Function
2.5.1    Types of Hash Function
2.6       Cryptography Encryption
2.7       Symmetric Key Cryptography

3  Design of the Work
3.1       Introduction
3.2       Modeling
3.3       Pro le Structure
3.4       Algorithm Selection
3.4.1    Hash Algorithm
3.4.2    Secret Key Algorithm
3.5       Examples using Indirect Access Control Method

4          Implementation
5          Results and Discussion
            5.1       Introduction
            5.2       Evaluation
                        5.2.1  Con dentiality
5.2.2    Scalability
5.2.3    Flexibility

6  Conclusions and Recommendations
6.1       Conclusion
6.2       Recommendation


Social networking has become a popular way to be in contact with each other. In social networking, people tend to share a wide range of information with other users of the networking site. Here, security of personal information has become a most critical issue. One of the important issues in online social network is that how user privacy is protected because online social network providers have full control over users' data. The online social network providers typically store users' information permanently. Meanwhile, the trend in information security is mov-ing the security perimeter as close to the data as possible. We want to move the perimeter closer to the data, but do this without being able to derive who is accessing which data. An e cient privacy protection mechanism is important for online social networking sites that can be used to protect the privacy of online users' data from third parties. An access control mechanism shifts the control over data sharing back to the users by providing them with exible and dynamic access policies. Hence, instead of relying on credentials given by a person trying to access information, there is a need to protect the data using only the data itself. In this context where decryption of data is made possible by already knowing some part of the data. This thesis work discusses the implementation of data based access control in social networking sites. That is, personal information is made available only to those who already have some of this information. We de ned and analyzed types of data based access control methods (direct, indirect and order-invariant data based access control methods). An e ort is made to design suitable policy in order to apply them to social networking sites. We implemented our solution in a prototype platform for social networking sites using a Java based prototype and My Structured Query Language (MySQL) database. Our experimental re-sults verify the e ectiveness of indirect data based access control method over social networking sites. This mechanism provides enhanced security features from both eavesdrop attacks and provider attacks. Moreover, we present a performance study of the implemented prototype.

Chapter 1

1.1         Background Information

A social networking website is an online platform that allows users to create a public pro le and interact with other users on the website. The rst social net-working site was launched in 1997 [1]. Six Degrees allowed users to create pro les, list and message their friends and traverse friend's listings, thus tting the de nition above. Even though there were millions of users, users did not have many direct friends and Six Degrees did not o er much functionality besides messaging. The website nally shut down in 2000 [1]. During and after this period other websites started adding Online Social Networks (OSN) features to their existing content, essentially becoming OSNs, with various degrees of suc-cess. In the years that followed, new OSNs started from scratch and began to o er functionality beyond simply listing and browsing friends.

Facebook, Twitter, MySpace and LinkedIn are among most popular social net-working sites according to tra c rank. The main goal of online social network site is to make available an information space, where each social network participant can publish and share information as well as meet other people for a variety of purposes.

When registering to a social network, the user will be given an account and a pro le, where he or she is able to modify personal information, specify relation-ships with other users and even manage personal resourses, such as comments and photos. So there is a need to protect sensitive information from unauthorized people. The traditional access control implemented in social networks is based on the relationship between each user. A member from a social network can decide which personal information is accessible by marking a given item as public or pri-vate. Although this approach has the advantage of being easy to implement, lacks exibility. The relationship settings do not allow users to specify their own access control requirements, which might lead to a too loose or too restrictive access control policy [2]. Moreover, social networks store information remotely, rather than on a user's personal computer. This means the privacy policy may change at any time without a user's permission. Due to this content that was posted with restrictive privacy settings may become visible....

For more Electrical & Computer Engineering Project click here

This is a General Thesis for both Undergraduate & Postgraduate Studies. The complete research material plus questionnaire and references can be obtained at an affordable price of N3,000 within Nigerian or its equivalent in other currencies.


Kindly pay/transfer a total sum of N3,000 into any of our Bank Accounts listed below:
·         Diamond Bank Account:
A/C Name:      Haastrup Francis
A/C No.:         0096144450

·         GTBank Account:
A/C Name:      Haastrup Francis
A/C No.:         0029938679
After payment, send your desired Project Topic, Depositor’s Name, and your Active E-Mail Address to which the material would be sent for downloading (you can request for a downloading link if you don’t have an active email address) to +2348074521866 or +2348066484965. You can as well give us a direct phone call if you wish to. Projects materials are sent in Microsoft format to your mail within 30 Minutes once payment is confirmed.

N/B:    By ordering for our material means you have read and accepted our Terms and Conditions

Terms of Use: This is an academic paper. Students should NOT copy our materials word to word, as we DO NOT encourage Plagiarism. Only use as guide in developing your original research work.

Delivery Assurance
We are trustworthy and can never SCAM you. Our success story is based on the love and fear for God plus constant referrals from our clients who have benefited from our site. We deliver project materials to your Email address within 15-30 Minutes depending on how fast your payment is acknowledged by us.

Quality Assurance
All research projects, Research Term Papers and Essays on this site are well researched, supervised and approved by lecturers who are intellectuals in their various fields of study.

Search for your topic here

See full list of Project Topics under your Department Here!

Featured Post

Article: How to Write a Research Proposal

Most students and beginning researchers do not fully understand what a research proposal means, nor do they understand ...

Popular Posts