Browse > Article
http://dx.doi.org/10.13089/JKIISC.2014.24.1.59

Relationship-based Dynamic Access Control Model with Choosable Encryption for Social Network Service  

Kwon, Keun (Sungkyunkwan University)
Jung, Youngman (Sungkyunkwan University)
Jung, Jaewook (Sungkyunkwan University)
Choi, Younsung (Sungkyunkwan University)
Jeon, Woongryul (Sungkyunkwan University)
Won, Dongho (Sungkyunkwan University)
Abstract
The social network service is a online service letting users express the personality and enhancing the human network. However, these features result in side effects which diffuse personal information and make users access to treacherous information. Therefore, various access control models have been proposed. However, the access control mechanisms which encrypt data are only able to be applied for controlling access from direct node, and the access control mechanisms without data encryption allow service provider to access all the information. Moreover, both mechanisms do not consider dynamic changes in reliability of the users. In this paper, we propose relationship-based dynamic access control model including encryption of sensitive data, which consider the characteristics of SNS and improves the security of SNS.
Keywords
Social Network Service; Privacy; Access control; Reliability evaluation; Proxy re-encryption;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 B Debatin, et al. "Facebook and online privacy: attitudes, behaviors, and unintended consequences," Journal of Computer Mediated Communication, vol. 15, no. 1, pp. 83-108, Oct. 2009.   DOI
2 NB Ellison, "Social network sites: definition, history, and scholarship," Journal of Computer Mediated Communication, vol. 13, no. 1, pp. 210-230, Oct. 2007.   DOI
3 KY Lin and HP Lu, "Why people use social networking sites: an empirical study integrating network externalities and motivation theory," Computers in Human Behavior, vol. 27, no. 3, pp. 1152-1161, May. 2011.   DOI   ScienceOn
4 R Gross and A Acquisti, "Information revelation and privacy in online social networks," ACM workshop on Privacy in the electronic society, pp. 71-80, Nov. 2005.
5 S Ye and S. F Wu, "Measuring message propagation and social influence on Twitter. com," Springer Social informatics, LNCS 6430, pp. 216-231, Oct. 2010.
6 B Krishnamurthy and CE. Wills, "On the leakage of personally identifiable information via online social networks," 2nd ACM workshop on Online social networks, pp. 7-12, Aug. 2009.
7 G Hogben, "Security issues and recommendations for online social networks," ENISA Position Paper, no. 1, Oct. 2007.
8 R Baden, et al. "Persona: an online social network with user-defined privacy," ACM SIGCOMM Computer Communication Review, vol. 39, no. 4, pp. 135-146, Aug. 2009.   DOI
9 S Jahid, P Mittal, and N Borisov, "EASiER: Encryption-based access control in social networks with efficient revocation," 6th ACM Symposium on Information, Computer and Communications Security, pp. 411-415, Mar. 2011.
10 Y Cheng, J Park, and R Sandhu, "A user-to-user relationship-based access control model for online social networks," Data and Applications Security and Privacy XXVI, LNCS 7371, pp. 8-24, Jul. 2012.
11 F Raji, et al. "Online social network with flexible and dynamic privacy policies," CSI International Symposium on. IEEE, pp. 135-142, Jun. 2011.
12 CH Lee, et al. "Dynamic user reliability evaluation scheme for social network service," Journal of the Korea Institute of Information Security and Cryptology, 23(2), pp. 157-168, Apr. 2013.   과학기술학회마을   DOI   ScienceOn
13 PW.L. Fong and I Siahaan, "Relationship-based access control policies and their policy languages," 6th ACM symposium on Access control models and technologies, pp. 51-60, Jun. 2011.
14 B Carminati, et al. "Semantic web-based social network access control," computers & security, vol. 30, no. 2, pp. 108-115, Aug. 2010.
15 L Banks, SF Wu, "All friends are not created equal: an interaction intensity based approach to privacy in online social networks," CSE 09. International Conference on IEEE, vol. 4, pp. 970-974, Aug. 2009.
16 J Park, R Sandhu, and Y Cheng, "Acon: activity-centric access control for social computing," Availability, Reliability and Security (ARES), 2011 Sixth International Conference on IEEE, pp. 242-247, Aug. 2011.
17 J Park, R Sandhu, and Y Cheng, "A user-activity-centric framework for access control in online social networks," Internet Computing, vol. 15, no. 5, pp. 62-65, Oct. 2011.   DOI
18 S Guha, K Tang, and P Francis, "NOYB: Privacy in online social networks," 1st workshop on Online social networks ACM, pp. 49-54, Aug. 2008.
19 MM. Lucas and N Borisov, "Flybynight: mitigating the privacy risks of social networking," 7th ACM workshop on Privacy in the electronic society, pp. 1-8, Oct. 2008.
20 A Shamir, "How to share a secret," Communications of the ACM, vol. 22, no. 11, pp. 612-613, Nov. 1979.   DOI   ScienceOn
21 HS Song, "A study on transitivity and composability of trust in social network," Journal of Information Technology Applications & Management, 18(4), pp. 41-53, Oct. 2011.
22 G Ateniese, et al. "Improved proxy re-encryption schemes with applications to secure distributed storage," ACM Transactions on Information and System Security, vol. 9, no. 1, pp. 1-30, Feb. 2006.   DOI
23 L Backstrom, et al. "Four degrees of separation," 3rd Annual ACM Web Science Conference, pp. 33-42, Jun. 2012.
24 J. A. Akinyele, et al. "Securing electronic medical records using attribute-based encryption on mobile devices," 1st ACM workshop on security and privacy in smartphones and mobile devices, pp. 75-86, Oct. 2011.
25 J Nutzel, and A Beyer, "Towards trust in digital rights management systems," Trust and Privacy in Digital Business, LNCS 4083, pp. 162-171, Sep. 2006.
26 T Acar, et al. "Affine pairings on ARM," Pairing - Based Cryptography, Pairing 2012 5th International Conference, LNCS 7708, pp. 203-209, May. 2012.
27 C Zhang, et al. "Privacy and security for online social networks: challenges and opportunities," IEEE Network, vol. 24, no. 4, pp. 13-18, Aug. 2010.   DOI   ScienceOn