An access control model for online social networks using user-to-user relationships
Subject Areas : GeneralMohamad Javad Piran 1 * , mahmud deypir 2
1 - University student
2 - Associate Professor
Keywords: Social networks, network security, privacy, counter loop, data security.,
Abstract :
With the pervasiveness of social networks and the growing information shared on them, users of these networks are exposed to potential threats to data security and privacy. The privacy settings included in these networks do not give users complete control over the management and privatization of access to their shared information by other users. In this article, using the concept of social graph, a new model of user access control was proposed to the user, which allows the expression of privacy policies and more accurate and professional access control in terms of pattern and depth of relationships between users in social networks. In this article, by using the regular index method, indirect relationships among users are examined and analyzed, and more precise policies than previous models are presented. The evaluation of the results showed that for 10 neighbors for each user, the probability accumulation of a qualified path for the first three counter loops is 1, 10.5 and 67.3%, respectively, and finally for the fourth counter it reaches 100%. As the defined counting characteristic increases, the average execution time of the proposed algorithm and previously proposed algorithms increases. However, for the higher limits of the counting characteristic, the proposed algorithm performs better than the previous ones.
1. D.M. Boyd, and N.B. Ellison, “Social network sites: Definition,history, and scholarship,” J.Computer-Mediated Communication, Vol. 13, no. 1, pp. 210–230, 2007.
2. H. Gao, J. Hu, T. Huang, J. Wang, and Y. Chen, “Security issues in online social networks,” Internet Computing, IEEE, Vol.15, no. 4, pp. 56–63, 2011.
3. G. Bruns, P.W. Fong, I. Siahaan, and M. Huth, “Relationshipbased access control: its expression and enforcement through hybrid logic,” In Proceedings of the second CODASPY, pp.117–124, 2012.
4. B. Carminati, E. Ferrari, R. Heatherly, M. Kantarcioglu, and B. Thuraisingham. “A semantic web based framework for social network access control,” In Proceedings of the 14th ACM SACMAT, pp. 177–186, 2009.
5. B. Carminati, E. Ferrari, R. Heatherly, M. Kantarcioglu, and B. Thuraisingham. Semantic web-based social network access control,” Computers and Security, p. 30, 2011.
6. B. Carminati, E. Ferrari, and A. Perego. “A decentralized security framework for web-based social networks,” Int.J.o Info. Security and Privacy, Vol. 2,
no. 4, 2008.
7. B. Carminati, E. Ferrari, and A. Perego. “Enforcing access control in web-based social networks,” ACM Trans. Inf. Syst. Secur, Vol. 13, no. 1, 2009.
8. P. W. Fong. “Relationship-based access control: protection model and policy language,” In Proceedings of the first CODASPY, pp. 191–202, 2011.
9. P. W. Fong, M. Anwar, and Z. Zhao. “A privacy preservation model for facebook-style social network systems,” In Computer Security–ESORICS 2009, pp. 303–320, 2009.
10. P. W. Fong and I. Siahaan. “Relationship-based access control policies and their policy languages,” In Proceedings of the 16th SACMAT, pp. 51–60, 2011.
11. S. R. Kruk, S. Grzonkowski, A. Gzella, T. Woroniecki, and H.-C. Choi,
“D-FOAF: Distributed identity management with access rights delegation,” In The Semantic Web–ASWC, pp. 140–154, 2006.
12. M.K. Christy. Cheung, K.O. Matthew Lee, “A theoretical model of intentional social action in online social networks,ELSEVIER,” Decision Support Systems, Vol. 49, no.2, pp. 24–30, 2010.
13. Mohammad Soryani, Behrooz Minaei, “Social Networks Research Aspects: A Vast and Fast Survey Focused on the Issue of Privacy in Social Network Sites,” arXiv, 2012,
14. X. Yang, H. Steck,Y.Liu, “Circle-based recommendation in online social networks,” KDD '12 Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 1267-1275, 2012
15. A.J. Sarode, A. Mishra, “Audit and Analysis of Impostors: An experimental approach to detect fake profile in online social network,” ICCCT 15, pp. 25-27, 2015.
16. Yong Li, Mengjiong Qian, Depeng Jin, Pan Hui, Athanasios V. Vasilakos , “Revealing the efficiency of information diffusion in online social networks of microblog,” Information Sciences, no. 293 (2015) 383–389.
17. Ben Light and Elija Cassidy, “Strategies for the suspension and prevention of connection: Rendering disconnection as socioeconomic lubricant with Facebook,” New Media & Society, Vol. 16, no. 7, pp. 1169–1184, 2014.
18. Y. Cheng, J. Park, and R. Sandhu, “An Access Control Model for Online Social Networks Using User-to-User Relationships,” IEEE Transactions on Dependable and Secure Computing , Vol. 13, no. 4, 2016.
19. B. Carminati, E. Ferrari, and J. Girardi. “Performance analysis of relationship-based access control in osns,” In IEEE IRI, pp. 449–456, 2012.
20. J. Ugander, B. Karrer, L. Backstrom, and C. Marlow. “The anatomy of the facebook social graph,” CoRR, 2011.
21. S. Milgram, “The small world problem,” Psychology today, Vol. 2, no. 1, pp.
60–67, 1967.
22. L. Backstrom, P. Boldi, M. Rosa, J. Ugander, and S. Vigna, “Four degrees of separation,” CoRR , 2011.
23. فاطمه رنجبر کاهریزی، حسین مومن زاده و حسن ارفعی¬نیا، "مدل کنترل دسترسی در شبکه¬های اجتماعی"، نخستین کنفرانس تدبیر علوم کامپیوتر، مهندسی برق، ارتباطات و فناوری اطلاعات ایران در جهان اسلام، اردیبهشت 1398.