UGC APPROVED ISSN 2278-1412

Archive

  Volume 15 | Issue 2

  Volume 15 | Issue 1

  Volume 14 | Issue 12

  Volume 14 | Issue 11

  Volume 14 | Issue 10

  Volume 14 | Issue 9

  Volume 14 | Issue 6

  Volume 14 | Issue 5

  Volume 14 | Issue 4

  Volume 14 | Issue 3

  Volume 14 | Issue 2

  Volume 14 | Issue 1

  Volume 13 | Issue 12

  Volume 13 | Issue 11

  Volume 13 | Issue 10

  Volume 13 | Issue 9

  Volume 13 | Issue 8

  Volume 13 | Issue 7

  Volume 13 | Issue 6

  Volume 13 | Issue 5

  Volume 13 | Issue 3

  Volume 13 | Issue 1

  Volume 12 | Issue 12

  Volume 12 | Issue 11

  Volume 12 | Issue 10

  Volume 12 | Issue 9

  Volume 12 | Issue 8

  Volume 12 | Issue 7

  Volume 12 | Issue 6

  Volume 12 | Issue 5

  Volume 12 | Issue 4

  Volume 12 | Issue 3

  Volume 12 | Issue 2

  Volume 12 | Issue 1

  Volume 11 | Issue 12

  Volume 11 | Issue 11

  Volume 11 | Issue 10

  Volume 11 | Issue 8

  Volume 11 | Issue 7

  Volume 11 | Issue 6

  Volume 11 | Issue 3

  Volume 11 | Issue 1

  Volume 10 | Issue 12

  Volume 10 | Issue 8

  Volume 10 | Issue 6

  Volume 10 | Issue 3

  Volume 10 | Issue 2

  Volume 10 | Issue 1

  Volume 9 | Issue 10

  Volume 8 | Issue 11

  Volume 8 | Issue 7

  Volume 7 | Issue 8

  Volume 7 | Issue 7

  Volume 7 | Issue 6

  Volume 7 | Issue 5

  Volume 7 | Issue 4

  Volume 7 | Issue 3

  Volume 7 | Issue 2

  Volume 7 | Issue 1

  Volume 6 | Issue 12

  Volume 6 | Issue 10

  Volume 6 | Issue 9

  Volume 6 | Issue 8

  Volume 6 | Issue 7

  Volume 6 | Issue 6

  Volume 6 | Issue 5

  Volume 6 | Issue 4

  Volume 6 | Issue 3

  Volume 6 | Issue 2

  Volume 6 | Issue 1

  Volume 5 | Issue 12

  Volume 5 | Issue 11

  Volume 5 | Issue 10

  Volume 5 | Issue 9

  Volume 5 | Issue 8

  Volume 5 | Issue 7

  Volume 5 | Issue 6

  Volume 5 | Issue 5

  Volume 5 | Issue 4

  Volume 5 | Issue 3

  Volume 5 | Issue 2

  Volume 5 | Issue 1

  Volume 4 | Issue 12

  Volume 4 | Issue 10

  Volume 4 | Issue 8

  Volume 4 | Issue 7

  Volume 4 | Issue 6

  Volume 4 | Issue 5

  Volume 4 | Issue 4

  Volume 4 | Issue 2

  Volume 4 | Issue 1

  Volume 3 | Issue 10

  Volume 3 | Issue 8

  Volume 3 | Issue 6

  Volume 3 | Issue 5

  Volume 3 | Issue 4

  Volume 3 | Issue 3

  Volume 3 | Issue 2

  Volume 3 | Issue 1

  Volume 2 | Issue 12

  Volume 2 | Issue 11

  Volume 2 | Issue 10

  Volume 2 | Issue 9

  Volume 2 | Issue 8

  Volume 2 | Issue 7

  Volume 2 | Issue 2

  Volume 1 | Issue 9

  Volume 1 | Issue 8

  Volume 1 | Issue 7

  Volume 1 | Issue 6

  Volume 1 | Issue 4

  Volume 1 | Issue 3

  Volume 1 | Issue 2

  Volume 1 | Issue 1

Current Volume 15 | Issue 03

Adaptive Share Sheet Architecture with Multi-Layer Privacy Orchestration


Volume:  14 - Issue: 10 - Date: 01-10-2025
Approved ISSN:  2278-1412
Published Id:  IJAECESTU461 |  Page No.: 117-121
Author: Khushal Baliram Patil
Co- Author:  Jeetendra Singh Yadav
Abstract:-Modern computing platforms increasingly support seamless cross-application content sharing, yet rising privacy concerns necessitate stronger control mechanisms. This work proposes an Adaptive Share Sheet Architecture that integrates a multi-layer privacy orchestration model combining user consent management, probabilistic trust assessment, and dynamic access control. Designed as a cross-platform, web-based solution, the architecture evaluates each sharing request through several privacy layers to ensure that data is only released under appropriate conditions. A formal mathematical model is introduced to describe the orchestration process, including trust scoring for receiving applications, privacy-risk quantification, and adaptive consent dynamics. Multi-layer access control policies are defined to enforce constraints from user-level preferences to system-level rules. The architecture is evaluated through MATLAB-based simulations comparing single-layer and multi-layer privacy strategies under varying user involvement. Results show that the proposed multilayer design significantly enhances privacy enforcement—achieving over 90% compliance, compared to ~70% in single-layer baselines—while maintaining acceptable response latency and strong usability. Graphs illustrate improvements in privacy protection, reduction of unauthorized sharing attempts, and minimal impact on system responsiveness. Overall, findings demonstrate that an adaptive, privacy-aware share sheet is both feasible and effective. Future work will focus on real-world deployment and integrating machine learning to further optimize the privacy–usability balance
Key Words:-Adaptive Share Sheet, Privacy Orchestration, Multi-Layer Access Control, User Consent Management, Probabilistic Trust Model, Privacy-Preserving Content Sharing
Area:-Engineering
Download Paper: 
Preview This Article

Unable to display PDF file. Download instead.


Download Paper

Downlaod Paper

No. of Download

00097

Impact Factor

7.6


ijaece

Upcoming Events


Special Issue For Paper


Upcoming Conference


Call For Paper