Browse > Article
http://dx.doi.org/10.7840/kics.2013.38B.5.410

Access Control Mechanism Based on Key Assignment and User Trust Level for Social Network Services  

Quan, Wenji (숭실대학교 정보통신전자공학부 통신망 설계 및 분석 연구실)
Hwang, Junho (숭실대학교 정보통신전자공학부 통신망 설계 및 분석 연구실)
Yoo, Myungsik (숭실대학교 정보통신전자공학부 통신망 설계 및 분석 연구실)
Abstract
Recently, as Internet enters WEB 2.0, many social network services through such as Facebook, Twitter and Youtube appeared. In these social network sites, users can easily make friends, join groups and access others personal information. Therefore, a malicious user can easily gather information of others. In order to protect user's personal information from the unauthenticated users, we propose privacy protection mechanism based on key assignment and user's trust level. A master-key is generated for each users and is segmented into a core-key and several sub-key. The master-key stores at the information owner's side and the sub-key will be distributed to requestor according to the relation and trust level. At last, in order to proof the efficiency, the performance of our proposed mechanism is compared with those of existing mechanisms.
Keywords
Social Network Service; Privacy; Key Assignment; Access Control; Trust Level;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 A. M. Al-senaidy, T. Ahmnad, and M. M. Shafi, "Privacy and security concerns in SNS: a Saudi Arabian users point of view," Int. J. Comput. Applicat., vol. 49, no. 14, pp. 1-5, July 2012.
2 D. M. Boyd and N. B. Ellison, "Social network sites: definition, history, and scholarship," J. Comput.-Mediated Commun., vol. 13, no. 1, article no. 11, Oct. 2007.
3 T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer, "Social Phishing," Commun. ACM, vol. 50, no. 10, pp. 94-100, Oct. 2007.
4 D. H. Jeon, J. Y. Chun, and l. R. Jeong, "An efficient privacy-preserving data sharing scheme in social network," J. Korea Inst. Inform. Soc. Cryptology, vol. 22, no. 3, pp. 447-461, July 2012.   과학기술학회마을
5 S. Guha, K. Tang, and P. Francis, "NOYB: privacy in online social networks," in Proc. 1st Workshop on Online Social Networks(WOSN 2008), pp. 49-54, Seattle, U.S.A., Aug. 2008.
6 D. Boyd, "Facebook's privacy trainwreck: exposure, invasion, and social," Int. J. Research into New Media Technol., vol. 14, no. 1, pp. 13-20, Jan. 2008.   DOI
7 M. M. Lucas, and N. Borisov, "flyByNight: mitigating the privacy risks of social networking," in Proc. 7th ACM Workshop on Privacy in the Electronic Soc. (WPES), pp. 1 -8, Alexandria, U.S.A., Oct. 2008.
8 L. A. Cutillo and R. Molva, "Safebook: a privacy-preserving online social network leveraging on real-life trust," IEEE Commun. Mag., vol. 47, no. 12, pp. 94-101, Dec. 2009.
9 A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 1, pp. 612-613, Nov. 1979.   DOI   ScienceOn
10 C. H. Lee, Y. M. Jung, J. W. Jung, and D. H. Won, "Dynamic user reliability evaluation scheme for social network service," J. Korea Inst. Inform. Soc. Cryptology, vol. 23, no. 2, pp. 157-168, Apr. 2013.   DOI   ScienceOn
11 H. C. Cho, Y. S. Han, and L. H. Kim, "Evaluating the user reputation through social network on UCC video services," Human Comput. Interaction(HCI), pp. 273-277, Feb. 2009