Browse > Article
http://dx.doi.org/10.9728/dcs.2012.13.1.101

A Categorization Method based on RCBAC for Enhanced Contents and Social Networking Service for User  

Cho, Eun-Ae (삼성전자)
Moon, Chang-Joo (건국대학교 항공우주정보시스템공학과)
Park, Dae-Ha (고려사이버대학교 IT학부)
Publication Information
Journal of Digital Contents Society / v.13, no.1, 2012 , pp. 101-110 More about this Journal
Abstract
Recently, social network sites are very popular with the enhancement of mobile device function and distribution. This gives rise to the registrations of the people on the social network sites and the usage of services on the social sites is also getting active. However, social network sites' venders do not provide services enough compared to the demand of users' to share contents from diverse roots by users effectively. In addition, the personal information can be revealed improperly in processes sharing policies and it is obvious that it raises a privacy invasion problem when users access the contents created from diverse devices according to the relationship by policies. However, the existing methods for the integration management of social network are weak to solve this problem. Thus, we propose a model to preserve user privacy, categorize contents efficiently, and give the access control permissions at the same time. In this paper, we encrypt policies and the trusted third party classifies the encrypted policies when the social network sites share the generated contents by users. In addition, the proposed model uses the RCBAC model to manage the contents generated by various devices and measures the similarity between relationships after encrypting when the user policies are shared. So, this paper can contribute to preserve user policies and contents from malicious attackers.
Keywords
Web Contents; RCBAC((Relationship-Contents based Access Control); Social Network; Privacy; Access Control;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Giuseppe Lugano, Pertti Saariluoma, "To Share or Not to Share: Supporting the User Decision in Mobile Social Software Applications," Proceedings of the User Modelling 2007 (UM2007), pp.440-444, 2007.
2 Leucio Antonio Cutillo, et al., Privacy Preserving Social Networking Through Decentralization
3 Elena Zheleva, et al., Preserving the Privacy of Sensitive Relationships in Graph Data
4 Blog, http://en.wikipedia.org/wiki/Blog, Wikipedia, 2012.
5 W. K.Wong, D.W.-l. Cheung, B. Kao, and N. Mamoulis, "Secure kNN computation on encrypted databases," Proceedings of the 35th ACM SIGMOD international conference on Management of data (SIGMOD '09), pp.139-152, 2009.
6 "웹 2.0 환경에서 사용되는 디지털 콘텐츠의 사용자 프라이버시 보호를 위한 RCBAC 모델," 조은애, 문창주, 박대하, 김정동, 강동수, 백두권, 한국디지털콘텐츠학회 논문지 : 제9권 제4호, pp.697-705, 2008.12.
7 Eun-Ae Cho, Chang-Joo Moon, Dae-Ha Park, Doo-Kwon Baik, "User Privacy Enhanced Access Control Model in Social Network Environment," Proceedings of the 2009 International Conference on Semantic Web and Web Services (SWWS), pp.128-133, Jul. 2009.
8 Eun-Ae Cho, Gabriel Ghinita, Elisa Bertino, "Privacy-Preserving Similarity Measurement for Access Control Policies," Proceedings of the ACM CCS2010 Workshop on Digital Identity Management (DIM '10), pp. 3-11, 2010.
9 조은애, 박대하, 문창주, "모바일 서비스 환경에서 정책의 프라이버시 보호를 위한 서비스 제공자 선택 프레임워크", 한국정보과학회 논문지 : 정보통신 제38권 제5호, pp.331-416, 2011.10.
10 D. Lin and et al, "An approach to Evaluate Policy Similarity," Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT'07), pp.1-10, 2007.
11 Dan Brickley and Libby Miller, "FOAF Vocabulary Specification 0.9," http://xmlns.com/foaf/0.1/, 2007.
12 XFN(XHTML Friends Network), http://en.wikipedia.org/wiki/XHTML_Friends_Network, Wikipedia, 2012.
13 Bishal Raj Karki, Arto Hämäläinen, and Jari Porras, "Social networking on mobile environment," Proceedings of the ACM/IFIP/USENIX Middleware '08 Conference Companion (Companion '08), pp.93-94, 2008.
14 Jari Porras, Petri Hiirsalmi and Ari Valtaoja, "Peer-to-Peer Communication Approach for a Mobile Environment," Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS'04), Vol.9, 2004.
15 Winnie Cheng, Jun Li, Keith Moore, Alan H. Karp, "MUPPET: Mobile Ubiquitous Privacy Protection for Electronic Transactions, In Hewlett-Packard Laboratories Technical Report HPL-2006-141R1, 2006.
16 L. Aaronson, "Your cell phone is so money," Popular Science, 2006.
17 NHN Corporation, http://www.nhncorp.com/, 2009.
18 W3C Mobile Web Initiative, http://www.w3.org/Mobile/, 2009.
19 Eun-Ae Cho, Chang-Joo Moon, Dae-Ha Park, Doo-Kwon Baik, "An Approach to Privacy Enhancement for Access Control Model in Web 3.0," Proceedings of the 3rd International Conference on Convergence and Hybrid Information Technology (ICCIT), Vol.2, pp.1046-1051, 2008.
20 Soren Preibusch, Alastair R. Beresford, "Privacy-Preserving Friendship Relations for Mobile Social Networking," W3C Workshop on the Future of Social Networking, 2009.