Computer Science ›› 2016, Vol. 43 ›› Issue (1): 116-121.doi: 10.11896/j.issn.1002-137X.2016.01.027

Previous Articles     Next Articles

Multi-party Authorization Model for Social Networks

HUO Ying-yu, MA Li, ZHONG Yong and QIN Xiao-lin   

  • Online:2018-12-01 Published:2018-12-01

Abstract: Most of the current access control mechanisms focus on data of private space of users,which cannot control the data beyond the personal space,such that the remarks published by a user in the space of his friend cannot be controlled by the user and the shared resource cannot be controlled jointly by the sharer.The paper presented the MRuleSN,a multi-party authorization model for social networks.The model processes the problem of ownership by single ownership and multi-party shareholders,and adopts extended w-Datalog rules to express authorization,which owns more powerful flexibility,fine-grained access control and authorization expressiveness.The rule structure,syntax and semantic of authorization language of the model were analyzed and explained.Finally,application and expressiveness of the model were exampled and discussed.

Key words: Multi-party authorization,Social networks,Authorization rules,w-Datalog

[1] Park J,Sandhu R,Cheng Y.Acon:Activity-centric access control for social computing[C]∥2011 Sixth International Confe-rence on Proc.of Availability,Reliability and Security (ARES).IEEE,2011:242-247
[2] Mahmood S.Online Social Networks:Privacy Threats and Defenses[M]∥Security and Privacy Preserving in Social Networks.Springer Vienna,2013:47-71
[3] Hu Hong-xin,Gail-Joon Ahn,Jan Jorgensen.Multiparty Access Control for Online Social Networks:Model and Mechanisms[J].Proc.of IEEE Transactions on Knowledge and Data Enginee-ring,2013,25(7):1614-1627
[4] Thomas K,Grier C,Nicol D M.unfriendly:Multi-party privacy risks in social networks[C]∥Proc.of Privacy Enhancing Technologies.Springer Berlin Heidelberg,2010:236-252
[5] Squicciarini A C,Shehab M,Wede J.Privacy policies for shared content in social network sites[J].The VLDB Journal-The International Journal on Very Large Data Bases,2010,19(6):777-796
[6] Amrutha P,Sathiyaraj R.Privacy Management of Multi UserEnvironment in Online Social Networks (OSNs)[J].GJCST-E:Network,Web & Security,2013,13(10):01-07
[7] Subhani S,Rajasekhar M.A photo privacy for tagged images using rule-based access control in social networks[J].International Journal of Research Sciences and Advanced Engineering,2012,2(5):45-49
[8] Yeung C A,Kagal L,Gibbins N,et al.Providing Access Control to Online Photo Albums Based on Tags and Linked Data[C]∥Proc.of AAAI Spring Symposium:Social Semantic Web:Where Web 2.0 Meets Web 3.0.2009:9-14
[9] Zhong Yong,Zhang Hong,Liu Feng-yu,et al.A Digital Rights Management Mechanism and Implementation Based on Logic Framework[J].Journal of Computer Research and Development,2010,47(2):223-230(in Chinese)钟勇,张宏,刘凤玉,等.一种基于逻辑框架的数字版权管理机制和实现[J].计算机研究与发展,2010,47(2):223-230
[10] Bertino E,Catania B,Gori R,et al.Active-U-Datalog:integrating active rules in a logical update language [C]∥Proc.of International Seminar on Logic Databases and the Meaning of Change,LNCS 1472.Berlin:Springer,1998:107-133
[11] Montesi D,Bertino E,Martelli M.Transactions and updates indeductive databases[J].IEEE Trans.Knowl.Data Eng.,1997,9(5):784-797
[12] Carminati B,Ferrari E,Perego A.Rule-based access control for social networks[C]∥Proc.of on the Move to Meaningful Internet Systems 2006:OTM 2006 Workshops.Spring-Verlag Lecture Notes in Computer Science,LNCS 4278,2006:1734-1744
[13] Jajodia S,Samarati P,Sapino M L,et al.Flexible support for multiple access control policies[J].ACM Transaction on Database System,2001,26(2):214-260

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!