Research on access control model of social network based on distributed logic

Abstract Highly decentralized, dynamic and fine-grained access control models of social networks need that the access control mechanisms of social networks own sufficient expressiveness and flexibility. Most of current authorizations are difficult to satisfy the requirements of social network. Some access control models need a centralized access control mode or implementation. Some access control models use hybrid declarative/imperative languages with operational semantic. This paper develops an access control model of social network based on distributed logic with active rules and triggering mechanism, which we call DUD_RuleSN, a rule-based access control model of social network based on distributed updatable datalog. The logic makes the model a powerful authorization expressiveness and flexibility that can meet the requirements for access control of social network appropriately. Firstly, the paper elaborates syntax, semantics and evaluation algorithm of Active-UD-Datalog, which is a distributed updatable datalog with active rules and triggering mechanism we develop for the model. Secondly, access control model DUD_RuleSN for Social Network is introduced and the authorization framework is explained. Finally, a motivational example and a contrastive analysis are discussed.

[1]  Joseph M. Hellerstein,et al.  Boom analytics: exploring data-centric, declarative programming for the cloud , 2010, EuroSys '10.

[2]  Peter J. Haas,et al.  Distinct-value synopses for multiset operations , 2009, CACM.

[3]  Ion Stoica,et al.  Declarative networking , 2009, Commun. ACM.

[4]  Wang Rui,et al.  MapReduce-Based Large-Scale Online Social Network Worm Simulation , 2012 .

[5]  Li Ma,et al.  Research on semantic of updatable distributed logic and its application in access control , 2017, J. Parallel Distributed Comput..

[6]  Keqiu Li,et al.  Modeling and Analysis of Communication Networks in Multicluster Systems under Spatio-Temporal Bursty Traffic , 2012, IEEE Transactions on Parallel and Distributed Systems.

[7]  Sushil Jajodia,et al.  Flexible support for multiple access control policies , 2001, TODS.

[8]  Laurence T. Yang,et al.  An analytical model for on-chip interconnects in multimedia embedded systems , 2013, TECS.

[9]  Zhao Du,et al.  Relation Based Access Control in Campus Social Network System , 2013, ITQM.

[10]  Asmaa Alsumait,et al.  Trust inference algorithms for social networks , 2014 .

[11]  Nadia Razzaq SECUREWALL -A F RAMEWORK FOR FINE - GRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS , 2013 .

[12]  O. N. Oyelade,et al.  Social Network and Security Issues: Mitigating Threat through Reliable Security Model , 2014 .

[13]  Norliza Katuk,et al.  Security of social network credentials for accessing course portal: Users’ experience , 2015 .

[14]  Meikang Qiu,et al.  Privacy Protection for Preventing Data Over-Collection in Smart City , 2016, IEEE Transactions on Computers.

[15]  Jose M. Such,et al.  Open Challenges in Relationship-Based Privacy Mechanisms for Social Network Services , 2015, Int. J. Hum. Comput. Interact..

[16]  Keke Gai,et al.  A novel social network access control model using logical authorization language in cloud computing , 2017, Concurr. Comput. Pract. Exp..

[17]  Xiaomin Zhu,et al.  QoS-Aware Fault-Tolerant Scheduling for Real-Time Tasks on Heterogeneous Clusters , 2011, IEEE Transactions on Computers.

[18]  Keke Gai,et al.  Phase-Change Memory Optimization for Green Cloud with Genetic Algorithm , 2015, IEEE Transactions on Computers.

[19]  Jie Wu,et al.  Fine-Grained Feature-Based Social Influence Evaluation in Online Social Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[20]  Barbara Carminati,et al.  Rule-Based Access Control for Social Networks , 2006, OTM Workshops.

[21]  Murat Kantarcioglu,et al.  Design and implementation of a secure social network system , 2009, 2009 IEEE International Conference on Intelligence and Security Informatics.

[22]  Anna Cinzia Squicciarini,et al.  Privacy policies for shared content in social network sites , 2010, The VLDB Journal.

[23]  Philip W. L. Fong Relationship-based access control: protection model and policy language , 2011, CODASPY '11.