Social websites like Orkut, Hi5, Facebook, Myspace or the Hungarian iWiW are developing most dynamically among WEB 2.0 services. The websites of the different social networks have an identical basic structure: a personal profile, wall and the interactive list of ’friends’. The profile normally includes the name, the photo, the favorite activities and interests of the given person. That personal profile is available for everyone.
All our data uploaded can be collected by anyone and could also be supplemented with additional information. This way our personal identity can even be stolen, someone can shop in our name or even spy upon our place of work. Our photos uploaded on our profile could be employed for rendering pictures to our anonym profile on even an online dating site. As a result a large quantity of uncontrolled information is circling about us on the internet. What is even worth that the operators of the social networks are regularly unable to identify either the person or the activity that is being carried out. The fact that these pieces of information are usually not being used in a malicious way does not depend on us or on the net but solely on the users employing them. For that very reason our sense of security is mere illusion. The data in our profile can easily be connected with public registers therefore they can be sold and be stolen as well. Excessive trust and carelessness can lead to severe problems such as identity theft. Many of us believe if they upload something on the internet they are protected by ’privacy ’models yet in real there is no protection in the mentioned cases at all. Applications developed by a third party has been introduced on the social networks. By means of these API’s (Application Programming Interface) or gadgets in other words they can reach the users’ network of contacts, personal data and pictures in the albums, in short, almost everything. Some of the services (like Facebook or iWiW) open an API to offer opportunities for the development of extra services. Facebook was the first to develop its own developer site and API. Later on Google fell into line with Facebook, invited the others not to initiate their own developments and the others gave in. They began to use Google API, or more precisely Open Social API. The applications we have developed can access the user’s pictures by means of the gadgets. With the help of these methods we can gain and forward such information as the user’s and the picture’s unique identifier and even that of the pictures in the album and their URL. In a nutshell, this way the picture and the information belonging to its owner can be forwarded together to their interconnection.
As to the Grid infrastructure, MTA SZTAKI, our consortional member in the project, provided the necessary resource, the BOINC Grid. That is a cross-border network of computers which appears to be one virtual machine for the user. Its main characteristics are: automatic management of distributed resources, the utilization of free capacities and heterogeneity (the network is composed by computers running various operating systems). The users running BOINC client (from now on: donors) offer their computer’s capacity for the community. On the gUSE Grid management site developed by SZTAKI we organize the data arriving from the different social sites into a work flow. That work flow contains the watermarking algorithms with the appropriate settings and distributes watermarking to BOINC Grid behind gUSE. That background infrastructural support is fairly favorable for speeding the watermarking algorithms. The Grid with its various parameters produces many thousands of watermarked pictures. Simultaneously with watermarking another process requiring a large number of resources takes place automatically on the created pictures: picture transformation –the simulation of the attacks. The reason why we need to produce such a high number of watermarked pictures is to have the possibility to select by means of a selection algorithm the one possessing the best correlation value. The user can choose the picture he favors that shows the smallest outer modification compared with the original one. That final piece will be signed with SDX signature suite developed by E-Group. Then by using the social application we can upload the electronically protected personal data to the user’s album.