Access Control Based on Different User Privileges in Social Media
Alina K Jayarajan1, Eldo P Elias2

1Alina K Jayarajan, Computer Science and Engineering, Mar Athanasius College of Engineering, Kothamangalam, Kerala, India.
2Eldo P Elias, Computer Science and Engineering, Mar Athanasius College of Engineering, Kothamangalam, Kerala, India.
Manuscript received on May 14, 2020. | Revised Manuscript received on May 25, 2020. | Manuscript published on June 10, 2020. | PP: 380-385 | Volume-9 Issue-8, June 2020. | Retrieval Number: 100.1/ijitee.E2752039520 | DOI: 10.35940/ijitee.E2752.069820
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The emergence of social media lead to people around the world is widely using it. There are varieties of applications under this category for diverse purposes. Day by day, the security concerns related to this area is increasing since it is a medium which connect people. At present, the single access policy is present. That is whether a user can access the media content or not. Hence multi access policy can provide more user satisfaction. On the other hand video and image can be encoded into different qualities. Ciphertext Policy Attribute-Based Encryption is used for encrypting keys used in symmetric encryption. Here introducing Linear Secret Sharing Scheme (LSSS) to the scalable social media stream security. The LSSS mechanism is adopted to increase the expressiveness of the monotone access structure. By utilizing an LSS Scheme the access structure becomes more protective. This algorithm is very useful in practice as a ciphertext policy can now be intuitively expressed using a monotone Boolean formula, which has good usability, and the corresponding LSSS for an actual CP-ABE construction can then be generated accordingly using this algorithm. 
Keywords: CP-ABE, LSSS, Media layers, Access structure. 
Scope of the Article: Social Networks