计算机科学 ›› 2016, Vol. 43 ›› Issue (1): 116-121.doi: 10.11896/j.issn.1002-137X.2016.01.027

• 网络与通信 • 上一篇    下一篇

面向社交网络的多方授权模型

霍颖瑜,马莉,钟勇,秦小麟   

  1. 佛山科学技术学院电子与信息工程学院 佛山528000,佛山科学技术学院电子与信息工程学院 佛山528000,佛山科学技术学院电子与信息工程学院 佛山528000,南京航空航天大学信息安全研究所 南京210016
  • 出版日期:2018-12-01 发布日期:2018-12-01
  • 基金资助:
    本文受国家自然科学基金(61373015,11326123),广东省教育厅育苗工程项目(2013LYM0097),佛山市科技发展专项资金项目(2012AA100251),佛山科学技术学院科研项目资助

Multi-party Authorization Model for Social Networks

HUO Ying-yu, MA Li, ZHONG Yong and QIN Xiao-lin   

  • Online:2018-12-01 Published:2018-12-01

摘要: 现有的访问控制机制大多局限在用户个人空间内的数据,难以控制个人空间以外的数据,例如用户不能对其在朋友空间中发布的评论进行访问控制,不能对共有的资源进行联合访问控制等。面向社交网络的多方授权模型MRuleSN采用单一所有、多方共有的方法处理所有权问题,采用扩展的w-Datalog规则表达授权,具有更强的灵活性、访问细粒度和表达能力。分析并说明了模型的规则结构、授权语言的语法和语义,最后通过示例说明了该模型的应用和表达能力。

关键词: 多方授权,社交网络,授权规则,w-Datalog

Abstract: Most of the current access control mechanisms focus on data of private space of users,which cannot control the data beyond the personal space,such that the remarks published by a user in the space of his friend cannot be controlled by the user and the shared resource cannot be controlled jointly by the sharer.The paper presented the MRuleSN,a multi-party authorization model for social networks.The model processes the problem of ownership by single ownership and multi-party shareholders,and adopts extended w-Datalog rules to express authorization,which owns more powerful flexibility,fine-grained access control and authorization expressiveness.The rule structure,syntax and semantic of authorization language of the model were analyzed and explained.Finally,application and expressiveness of the model were exampled and discussed.

Key words: Multi-party authorization,Social networks,Authorization rules,w-Datalog

[1] Park J,Sandhu R,Cheng Y.Acon:Activity-centric access control for social computing[C]∥2011 Sixth International Confe-rence on Proc.of Availability,Reliability and Security (ARES).IEEE,2011:242-247
[2] Mahmood S.Online Social Networks:Privacy Threats and Defenses[M]∥Security and Privacy Preserving in Social Networks.Springer Vienna,2013:47-71
[3] Hu Hong-xin,Gail-Joon Ahn,Jan Jorgensen.Multiparty Access Control for Online Social Networks:Model and Mechanisms[J].Proc.of IEEE Transactions on Knowledge and Data Enginee-ring,2013,25(7):1614-1627
[4] Thomas K,Grier C,Nicol D M.unfriendly:Multi-party privacy risks in social networks[C]∥Proc.of Privacy Enhancing Technologies.Springer Berlin Heidelberg,2010:236-252
[5] Squicciarini A C,Shehab M,Wede J.Privacy policies for shared content in social network sites[J].The VLDB Journal-The International Journal on Very Large Data Bases,2010,19(6):777-796
[6] Amrutha P,Sathiyaraj R.Privacy Management of Multi UserEnvironment in Online Social Networks (OSNs)[J].GJCST-E:Network,Web & Security,2013,13(10):01-07
[7] Subhani S,Rajasekhar M.A photo privacy for tagged images using rule-based access control in social networks[J].International Journal of Research Sciences and Advanced Engineering,2012,2(5):45-49
[8] Yeung C A,Kagal L,Gibbins N,et al.Providing Access Control to Online Photo Albums Based on Tags and Linked Data[C]∥Proc.of AAAI Spring Symposium:Social Semantic Web:Where Web 2.0 Meets Web 3.0.2009:9-14
[9] Zhong Yong,Zhang Hong,Liu Feng-yu,et al.A Digital Rights Management Mechanism and Implementation Based on Logic Framework[J].Journal of Computer Research and Development,2010,47(2):223-230(in Chinese)钟勇,张宏,刘凤玉,等.一种基于逻辑框架的数字版权管理机制和实现[J].计算机研究与发展,2010,47(2):223-230
[10] Bertino E,Catania B,Gori R,et al.Active-U-Datalog:integrating active rules in a logical update language [C]∥Proc.of International Seminar on Logic Databases and the Meaning of Change,LNCS 1472.Berlin:Springer,1998:107-133
[11] Montesi D,Bertino E,Martelli M.Transactions and updates indeductive databases[J].IEEE Trans.Knowl.Data Eng.,1997,9(5):784-797
[12] Carminati B,Ferrari E,Perego A.Rule-based access control for social networks[C]∥Proc.of on the Move to Meaningful Internet Systems 2006:OTM 2006 Workshops.Spring-Verlag Lecture Notes in Computer Science,LNCS 4278,2006:1734-1744
[13] Jajodia S,Samarati P,Sapino M L,et al.Flexible support for multiple access control policies[J].ACM Transaction on Database System,2001,26(2):214-260

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!