Abstract

The rapid development of communication and network technologies including mobile networks and GPS presents new characteristics of OSNs. These new characteristics pose extra requirements on the access control schemes of OSNs, which cannot be satisfied by relationship-based access control currently. In this paper, we propose a hybrid access control model (HAC) which leverages attributes and relationships to control access to resources. A new policy specification language is developed to define policies considering the relationships and attributes of users. A path checking algorithm is proposed to figure out whether paths between two users can fit in with the hybrid policy. We develop a prototype system and demonstrate the feasibility of the proposed model.

Highlights

  • Online social networks (OSNs) have attracted widespread popularity nowadays

  • By maintaining the balance between ease of use and flexibility, relationship-based access control (ReBAC) has been commonly applied in real OSN systems

  • Alice is shopping at Bergdorf Goodman in New York. She has recorded a video of the megamall with her Google glasses and published it in OSN to see if any female friends can give her some pieces of advice in choosing cosmetics

Read more

Summary

Introduction

Online social networks (OSNs) have attracted widespread popularity nowadays. Users can conveniently share personal information with friends via OSNs. Considering the fact that sensitive information may be leaked, the protection of users’ privacy becomes a challenging task To address this problem, researchers have proposed the relationship-based access control (ReBAC) mechanism [2,3,4,5]. (ii) Privacy information collected by smart mobile devices can be used for access control scheme of OSNs. These features have brought about new challenges for access control schemes of online social networks. Alice is shopping at Bergdorf Goodman in New York She has recorded a video of the megamall with her Google glasses and published it in OSN to see if any female friends can give her some pieces of advice in choosing cosmetics. The path checking algorithm is implemented to conduct experiments to validate the feasibility and performance of the scheme

Related Work
HAC Model Foundation
HAC Policy Specification and Evaluation
Implementation
Comparison
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.