Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1007/978-3-642-31540-4_2guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

A user-to-user relationship-based access control model for online social networks

Published: 11 July 2012 Publication History

Abstract

Users and resources in online social networks (OSNs) are interconnected via various types of relationships. In particular, user-to-user relationships form the basis of the OSN structure, and play a significant role in specifying and enforcing access control. Individual users and the OSN provider should be allowed to specify which access can be granted in terms of existing relationships. We propose a novel user-to-user relationship-based access control (UURAC) model for OSN systems that utilizes regular expression notation for such policy specification. We develop a path checking algorithm to determine whether the required relationship path between users for a given access request exists, and provide proofs of correctness and complexity analysis for this algorithm.

References

[1]
Bruns, G., Fong, P.W., Siahaan, I., Huth, M.: Relationship-based access control: its expression and enforcement through hybrid logic. In: ACM CODASPY (2012).
[2]
Carminati, B., Ferrari, E., Heatherly, R., Kantarcioglu, M., Thuraisingham, B.: A semantic web based framework for social network access control. In: ACM SACMAT (2009).
[3]
Carminati, B., Ferrari, E., Heatherly, R., Kantarcioglu, M., Thuraisingham, B.: Semantic web-based social network access control. Computers and Security 30(2-3) (2011); Special Issue on Access Control Methods and Technologies.
[4]
Carminati, B., Ferrari, E., Perego, A.: Rule-Based Access Control for Social Networks. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops, Part II. LNCS, vol. 4278, pp. 1734-1744. Springer, Heidelberg (2006).
[5]
Carminati, B., Ferrari, E., Perego, A.: A decentralized security framework for webbased social networks. Int. Journal of Info. Security and Privacy 2(4) (2008).
[6]
Carminati, B., Ferrari, E., Perego, A.: Enforcing access control in web-based social networks. ACM Trans. Inf. Syst. Secur. 13(1) (2009).
[7]
Fong, P.W.L., Anwar, M., Zhao, Z.: A Privacy Preservation Model for Facebook-Style Social Network Systems. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 303-320. Springer, Heidelberg (2009).
[8]
Fong, P.W.: Relationship-based access control: protection model and policy language. In: ACM CODASPY (2011).
[9]
Fong, P.W., Siahaan, I.: Relationship-based access control policies and their policy languages. In: ACM SACMAT (2011).
[10]
Gates, C.E.: Access control requirements for web 2.0 security and privacy. In: Proc. of Workshop on Web 2.0 Security and Privacy, W2SP 2007 (2007).
[11]
Kruk, S.R., Grzonkowski, S., Gzella, A., Woroniecki, T., Choi, H.-C.: D-FOAF: Distributed Identity Management with Access Rights Delegation. In: Mizoguchi, R., Shi, Z.-Z., Giunchiglia, F. (eds.) ASWC 2006. LNCS, vol. 4185, pp. 140-154. Springer, Heidelberg (2006).
[12]
Masoumzadeh, A., Joshi, J.: Osnac: An ontology-based access control model for social networking systems. In: IEEE Social Computing, SocialCom (2010).
[13]
Park, J., Sandhu, R., Cheng, Y.: Acon: Activity-centric access control for social computing. In: Int. Conf. on Availability, Reliability and Security, ARES (2011).
[14]
Park, J., Sandhu, R., Cheng, Y.: A user-activity-centric framework for access control in online social networks. IEEE Internet Computing 15(5) (September-October 2011).
[15]
Rabin, M.O., Scott, D.: Finite automata and their decision problems. IBM J. Res. Dev. 3 (April 1959).
[16]
Thompson, K.: Programming techniques: Regular expression search algorithm. Commun. ACM 11 (June 1968).

Cited By

View all
  • (2024)Socialz: Multi-Feature Social Fuzz TestingProceedings of the Genetic and Evolutionary Computation Conference10.1145/3638529.3654033(1445-1453)Online publication date: 14-Jul-2024
  • (2021)Object-to-Object Relationship-Based Access Control: Model and Multi-Cloud Demonstration (Invited Paper)2016 IEEE 17th International Conference on Information Reuse and Integration (IRI)10.1109/IRI.2016.47(297-304)Online publication date: 10-Mar-2021
  • (2020)Efficient Authorization of Graph-database Queries in an Attribute-supporting ReBAC ModelACM Transactions on Privacy and Security10.1145/340102723:4(1-33)Online publication date: 6-Jul-2020
  • Show More Cited By
  1. A user-to-user relationship-based access control model for online social networks

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    DBSec'12: Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
    July 2012
    330 pages
    ISBN:9783642315398

    Publisher

    Springer-Verlag

    Berlin, Heidelberg

    Publication History

    Published: 11 July 2012

    Author Tags

    1. access control
    2. security
    3. social networks

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 09 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Socialz: Multi-Feature Social Fuzz TestingProceedings of the Genetic and Evolutionary Computation Conference10.1145/3638529.3654033(1445-1453)Online publication date: 14-Jul-2024
    • (2021)Object-to-Object Relationship-Based Access Control: Model and Multi-Cloud Demonstration (Invited Paper)2016 IEEE 17th International Conference on Information Reuse and Integration (IRI)10.1109/IRI.2016.47(297-304)Online publication date: 10-Mar-2021
    • (2020)Efficient Authorization of Graph-database Queries in an Attribute-supporting ReBAC ModelACM Transactions on Privacy and Security10.1145/340102723:4(1-33)Online publication date: 6-Jul-2020
    • (2020)Authorization Policy Extension for Graph DatabasesFuture Data and Security Engineering10.1007/978-3-030-63924-2_3(47-66)Online publication date: 25-Nov-2020
    • (2019)An OpenRBAC Semantic Model for Access Control in Vehicular NetworksProceedings of the 24th ACM Symposium on Access Control Models and Technologies10.1145/3322431.3326328(93-102)Online publication date: 28-May-2019
    • (2018)Efficient Authorization of Graph Database Queries in an Attribute-Supporting ReBAC ModelProceedings of the Eighth ACM Conference on Data and Application Security and Privacy10.1145/3176258.3176331(204-211)Online publication date: 13-Mar-2018
    • (2018)Fine-Grained Access Control via Policy-Carrying DataACM Transactions on Internet Technology10.1145/313332418:3(1-24)Online publication date: 5-Feb-2018
    • (2017)Mining Relationship-Based Access Control PoliciesProceedings of the 22nd ACM on Symposium on Access Control Models and Technologies10.1145/3078861.3078878(239-246)Online publication date: 7-Jun-2017
    • (2017)Classifying and Comparing Attribute-Based and Relationship-Based Access ControlProceedings of the Seventh ACM on Conference on Data and Application Security and Privacy10.1145/3029806.3029828(59-70)Online publication date: 22-Mar-2017
    • (2017)Exploring the viability of tie strength and tags in access controls for photo sharingProceedings of the Symposium on Applied Computing10.1145/3019612.3019909(1082-1085)Online publication date: 3-Apr-2017
    • Show More Cited By

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media