Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Setting Access Permission through Transitive Relationship in Web-based Social Networks

  • Chapter
  • First Online:
Weaving Services and People on the World Wide Web

Abstract

The rising popularity of various social networking websites has created a huge problem on Internet privacy. Although it is easy to post photos, comments, opinions on some events, etc. on the Web, some of these data (such as a person’s location at a particular time, criticisms of a politician, etc.) are private and should not be accessed by unauthorized users. Although social networks facilitate sharing, the fear of sending sensitive data to a third party without knowledge or permission of the data owners discourages people from taking full advantage of some social networking applications. We exploit the existing relationships on social networks and build a ‘‘trust network’’ with transitive relationship to allow controlled data sharing so that the privacy and preferences of data owners are respected. The trust network linking private data owners, private data requesters, and intermediary users is a directed weighted graph. The permission value for each private data requester can be automatically assigned in this network based on the transitive relationship. Experiments were conducted to confirm the feasibility of constructing the trust network from existing social networks, and to assess the validity of permission value assignments in the query process. Since the data owners only need to define the access rights of their closest contacts once, this privacy scheme can make private data sharing easily manageable by social network participants.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. N. R. Adam and J. C. Worthmann. Security-control methods for statistical databases: a comparative study. ACM Computing Survey, 21(4):515–556, 1989.

    Article  Google Scholar 

  2. E. Adar and C. R. Managing uncertainty in social networks. IEEE Data Engineering Bulletin, 30(2):15–22, 2007.

    Google Scholar 

  3. D. Brickley and L. Miller. Foaf project. http://www.foaf-project.org/, 2007.

  4. S. Brin and L. Page. The anatomy of a large-scale hypertextual web search engine. In WWW7: Proceedings of the Seventh International Conference on World Wide Web 7, pages 107–117, Amsterdam, The Netherlands, 1998. Elsevier Science Publishers B. V.

    Google Scholar 

  5. J.-W. Byun, E. Bertino, and N. Li. Purpose based access control of complex data for privacy protection. In SACMAT ’05: Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies, pages 102–110, New York, NY, USA, 2005. ACM Press.

    Google Scholar 

  6. M. Conrad, T. French, W. Huang, and C. Maple. A lightweight model of trust propagation in a multi-client network environment: To what extent does experience matter? In ARES ’06: Proceedings of the First International Conference on Availability, Reliability and Security (ARES’06), pages 482–487. Washington, DC, USA, 2006. IEEE Computer Society.

    Google Scholar 

  7. B. Esfandiari and S. Chandrasekharan. On how agents make friends: mechanisms for trust acquisition. In Proceedings of the Fourth Workshop on Deception, Fraud and Trust in Agent Societies 2001, pages 27–34, 2001.

    Google Scholar 

  8. D. F. Ferraiolo, J. F. Barkley, and D. R. Kuhn. A role-based access control model and reference implementation within a corporate intranet. ACM Transactions on Information and System Security, 2(1):34–64, 1999.

    Article  Google Scholar 

  9. L. Garton, C. Haythornthwaite, and B. Wellman. Studying online social networks. Journal of Computer-Mediated Communication, 3(1), June 1997.

    Google Scholar 

  10. Google. Google calendar. www.google.com/calendar.

  11. R. Guha, R. Kumar, P. Raghavan, and A. Tomkins. Propagation of trust and distrust. In WWW ’04: Proceedings of the 13th International Conference on World Wide Web, pages 403–412, New York, NY, USA, 2004. ACM Press.

    Google Scholar 

  12. A. Y. Halevy, A. Rajaraman, and J. J. Ordille. Data integration: The teenage years. In VLDB, pages 9–16, 2006.

    Google Scholar 

  13. D. Hong, M. Yuan, and V. Y. Shen. Dynamic privacy management: a plug-in service for the middleware in pervasive computing. In MobileHCI 2005, pages 1–8, Salzburg, Austria, September 2005. ACM.

    Google Scholar 

  14. S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. The eigentrust algorithm for reputation management in p2p networks. In WWW ’03: Proceedings of the 12th International Conference on World Wide Web, pages 640–651, New York, NY, USA, 2003. ACM Press.

    Google Scholar 

  15. Y. Katz and J. Golbeck. Using social network-based trust for default reasoning on the web. Available online http://www.cs.umd.edu/~golbeck/papers/jwsSocDefaults.pdf, 2007.

  16. P. Kolari, L. Ding, S. G. A. Joshi, T. Finin, and L. Kagal. Enhancing web privacy protection through declarative policies. In POLICY ’05: Proceedings of the Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY’05), pages 57–66, Washington, DC, USA, 2005. IEEE Computer Society.

    Google Scholar 

  17. R. Matthew, R. Agrawal, and P. Domingos. Trust management for the semantic web. In Proceedings of the Second International Semantic Web Conference, 2003.

    Google Scholar 

  18. P. Mika. Ontologies are us: A unified model of social networks and semantics. Web Semantics, 5(1):5–15, 2007.

    MathSciNet  Google Scholar 

  19. N. Mishra, R. Schreiber, I. Stanton, and R. E. Tarjan. Clustering social networks. In Workshop On Algorithms And Models For The Web-Graph (WAW2007), 2007.

    Google Scholar 

  20. M. F. Mokbel, C.-Y. Chow, and W. G. Aref. The new casper: Query processing for location services without compromising privacy. In VLDB, pages 763–774, 2006.

    Google Scholar 

  21. L. Sweeney. k-anonymity: A model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10(5):557–570, 2002.

    Article  MATH  MathSciNet  Google Scholar 

  22. Technorati. State of the blogosphere/state of the live web. http://www.sifry.com/ stateoftheliveweb/, 2007.

  23. W3C. A p3p preference exchange language 1.0 (appel1.0). http://www.w3.org/TR/P3P-preferences/.

  24. W3C. Platform for privacy preferences (p3p) project. http://www.w3.org/TR/P3P/, April 2002.

  25. S. Wasserman and K. Faust. Social Network Analysis : Methods and Applications (Structural Analysis in the Social Sciences). Cambridge, 1994. Cambridge University Press.

    Google Scholar 

  26. C.-N. Ziegler and G. Lausen. Analyzing correlation between trust and user similarity in online communities. In C. Jensen, S. Poslad, and T. Dimitrakos, editors, Proceedings of the 2nd International Conference on Trust Management, volume 2995 of LNCS, pages 251–265, Oxford, UK, March 2004. Springer-Verlag.

    Google Scholar 

  27. C.-N. Ziegler and G. Lausen. Spreading activation models for trust propagation. In EEE ’04: Proceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE’04), pages 83–97, Washington, DC, USA, 2004. IEEE Computer Society.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dan Hong .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Hong, D., Shen, V.Y. (2009). Setting Access Permission through Transitive Relationship in Web-based Social Networks. In: King, I., Baeza-Yates, R. (eds) Weaving Services and People on the World Wide Web. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00570-1_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-00570-1_12

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-00569-5

  • Online ISBN: 978-3-642-00570-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics