[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Research on access control model of social network based on distributed logic

Published: 01 June 2018 Publication History

Abstract

Highly decentralized, dynamic and fine-grained access control models of social networks need that the access control mechanisms of social networks own sufficient expressiveness and flexibility. Most of current authorizations are difficult to satisfy the requirements of social network. Some access control models need a centralized access control mode or implementation. Some access control models use hybrid declarative/imperative languages with operational semantic. This paper develops an access control model of social network based on distributed logic with active rules and triggering mechanism, which we call DUD_RuleSN, a rule-based access control model of social network based on distributed updatable datalog. The logic makes the model a powerful authorization expressiveness and flexibility that can meet the requirements for access control of social network appropriately. Firstly, the paper elaborates syntax, semantics and evaluation algorithm of Active-UD-Datalog, which is a distributed updatable datalog with active rules and triggering mechanism we develop for the model. Secondly, access control model DUD_RuleSN for Social Network is introduced and the authorization framework is explained. Finally, a motivational example and a contrastive analysis are discussed.

References

[1]
H. Liang, D. Deng-Guo, W. Rui, MapReduce-based large-scale online social network worm simulation, J. Softw., 24 (2013) 1666-1682.
[2]
P.W.L. Fong, M.M. Anwar, Z. Zhao, A privacy preservation model for facebook-style social network systems, in: ESORICS, 2009, pp. 303320.
[3]
Y. Li, W. Dai, Z. Ming, M. Qiu, Privacy protection for preventing data over-collection in smart city, IEEE Trans. Comput., 65 (2016) 1339-1350.
[4]
N. Katuk, C.S. Fong, K.L. Chun, Security of Social Network Credentials for Accessing Course Portal: Users Experience, AIP Publishing LLC, 2015.
[5]
A.C. Squicciarini, M. Shehab, J. Wede, Privacy policies for shared content in social network sites, VLDB J., 19 (2010) 777-796.
[6]
S.T.R. Rajam, S.B.R. Kumar, An innovative security architecture and algorithm for social network services, ARPN J. Eng. Appl. Sci., 11 (2016) 1101-1105.
[7]
S. Subhani, M. Rajasekhar, A photo privacy for tagged images using rule-based access control in social networks, Int. J. Res. Sci. Adv. Eng., 2 (2012) 45-49.
[8]
A. Obiniyi, N. Oyelade, P. Obiniyi, Social network and security issues: Mitigating threat through reliable security model, Int. J. Comput. Appl., 103 (2014) 1-7.
[9]
R. Layfield, B. Thuraisingham, L. Khan, Design and implementation of a secure social network system, in: IEEE International Conference on Intelligence and Security Informatics, IEEE, 2009, pp. 236-247.
[10]
Y. Wu, G. Min, D. Zhu, An analytical model for on-chip interconnects in multimedia embedded systems, ACM Trans. Embedded Comput. Syst., 13 (2013) 29.
[11]
Ting Wang, Mudhakar Srivatsa, Ling Liu, Fine-grained access control of personal data, in: Proc of SACMAT, 2012, pp. 145156.
[12]
L. Ma, L. Tao, K. Gai, Y. Zhong, A novel social network access control model using logical authorization language in cloud computing, Concurr. Comput.: Pract. Exper., PP (2016) 1.
[13]
A. Tapiador, D. Carrera, J. Salvacha, Tie-RBAC: an application of RBAC to Social networks, in: Proc of Web 2.0 Security and Privacy, Oakland, California, 2011, pp. 14.
[14]
J. Ding, L. Mo, Enforcement of role based access control in social network environments, in: IEEE Sixth International Conference on Software Security and Reliability Companion. 2012, pp. 92101.
[15]
N. Razzaq, Securewall-a framework for finegrained privacy control in online social networks, Int. J. Inf. Technol. Model. Comput., 1 (2013) 51-72.
[16]
M. Majedi, K. Ghazinour, A.H. Chinaei, et al., SQl privacy model for social networks, in: International Conference on Advances in Social Network Analysis and Mining, Asonam 2009, 20-22 July 2009, Athens, Greece. 2009, pp. 369370.
[17]
E. Bertino, B. Catania, R. Gori, Active-U-Datalog: Integrating Active Rules in a Logical Update Language, in: Lecture Notes in Computer Science, 1998, pp. 107-133.
[18]
R. Fogues, J.M. Such, A.E.A. Garcia-Fornes, Open challenges in relationship-based privacy mechanisms for social network services, Int. J. Hum.-Comput. Interact., 31 (2015) 350-370.
[19]
P.W.L. Fong, Relationship-based access control: protection model and policy language, in: ACM Conference on Data & Application Security & Privacy, ACM, 2011, pp. 191-202.
[20]
P.Y. Zhang, B. Huang, R.J. Xie, A method for web services recommendation based on social network trust relationship, J. Chinese Comput. Syst., 35 (2014) 222-227.
[21]
M. Faisal, A. Alsumait, Z. Alameer, Trust inference algorithms for social networks, J. Eng. Res., 2 (2014) 29-48.
[22]
B. Carminati, E. Ferrari, A. Perego, Rule-based access control for social networks, in: Proc of on the Move To Meaningful Internet Systems 2006: OTM 2006 Workshops, Springer-Verlag, 2006, pp. 1734-1744.
[23]
Zhao Du, Yuguang Liu, Ye Wang, Relation based access control in campus social network system, Procedia Comput. Sci., 17 (2013) 1-1282.
[24]
Ting Wang, Mudhakar Srivatsa, Ling Liu, Fine-grained access control of personal Data, in: Proc of SACMAT, 2012, pp. 145156.
[25]
Guojun Wang, Wenjun Jiang, Jie Wu, Zhengli Xiong, Fine-grained feature-based social influence evaluation in online social networks, IEEE Trans. Parallel Distrib. Syst., 25 (2014) 2286-2296.
[26]
Y. Cheng, J. Park, R. Sandhu, Relationship-based access control for online social networks: Beyond User-to-user relationships, in: Proc. Of 2012 International Conference on Privacy, Security, Rish and Trust and 2012 International Conference on Social Computing, 2012, pp. 646655.
[27]
B.T. Loo, Declarative networking, Commun. ACM, 52 (2009) 87-95.
[28]
J.M. Hellerstein, The declarative imperative: experiences and conjectures in distributed logic, in: SIGMOD Rec. 39 (September 2010), pp. 519.
[29]
T.J. Ameloot, F. Neven, J. Vanden Bussche, Relational transducers for declarative networking, in: PODS, 2011.
[30]
Peter Alvaro, Boom analytics: exploring data-centric, declarative programming for the cloud, in: EuroSys10, ACM, New York, NY, USA, 2010, pp. 223-236.
[31]
P. Alvaro, W.R. Marczak, N. Conway, J.M. Hellerstein, D. Maier, Dedalus: Datalog in time and space, in: International Conference on Datalog Reloaded, Vol. 52, 2010, pp. 262281.
[32]
A. Galland, et al., A rule-based language for Web data management, in: Proc of PODS 2011, 30th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems Athens, Greece, 2011, pp. 293304.
[33]
P. Alvaro, T. Condie, N. Conway, K. Elmeleegy, J.M. Hellerstein, R.C. Sears, BOOM: Data-centric Programming in the Datacenter. Technical Report UCB/EECS-2009-113, EECS Department, University of California, Berkeley, Jul 2009.
[34]
P. Alvaro, T. Condie, N. Conway, J.M. Hellerstein, R. Sears, I do declare: Consensus in a logic language, in: NetDB, 2009.
[35]
L. Ma, P. Leng, Y. Zhong, Research on semantic of updatable distributed logic and its application in access control, J. Parallel Distrib. Comput., 103 (2017) 104-112.
[36]
S. Jajodia, P. Samarati, M.L. Sapino, V.S. Subrahmanian, Flexible support for multiple access control policies, ACM Trans. Database Syst., 26 (2001) 214-260.
[37]
M. Qiu, Z. Ming, J. Li, K. Gai, Z. Zong, Phase-change memory optimization for green cloud with genetic algorithm, IEEE Trans. Comput., 64 (2015) 3528-3540.
[38]
Y. Wu, G. Min, K. Li, Modeling and analysis of communication networks in multicluster systems under spatio-temporal bursty traffic, IEEE Trans. Parallel Distrib. Syst., 23 (2012) 902-912.
[39]
X. Zhu, X. Qin, M. Qiu, QoS-Aware fault-tolerant scheduling for real-time tasks on heterogeneous clusters, IEEE Trans. Comput., 60 (2011) 800-812.

Cited By

View all
  • (2021)A Novel Spatio-Temporal Access Control Model for Online Social Networks and Visual VerificationInternational Journal of Cloud Applications and Computing10.4018/IJCAC.202104010211:2(17-31)Online publication date: 1-Apr-2021

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Future Generation Computer Systems
Future Generation Computer Systems  Volume 83, Issue C
June 2018
449 pages

Publisher

Elsevier Science Publishers B. V.

Netherlands

Publication History

Published: 01 June 2018

Author Tags

  1. Access control
  2. Active rule
  3. DUD_RuleSN
  4. Distributed logic
  5. Social network

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 04 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2021)A Novel Spatio-Temporal Access Control Model for Online Social Networks and Visual VerificationInternational Journal of Cloud Applications and Computing10.4018/IJCAC.202104010211:2(17-31)Online publication date: 1-Apr-2021

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media