Content-based access control in an online community

This paper demonstrates how semantic web can provide a solution for controlling access to contents around a community. The main intention of online communities is enabling a platform for users to share information with each other. But there may be some information to which access must be restricted, such as the personal information of a user in the National ID Network. Traditional OSNs or other online communities provide very few or no controlling access to these information semantically. In this paper we have proposed a semantic approach to enhance the access control in any online community depending on the sensitivity of information content. We also mention some major challenges in access control paradigm and show how our model can meet them.

[1]  Swapna S. Gokhale,et al.  Analysis of Structural Social Capital in Online Social Networks , 2015, 2015 3rd International Conference on Future Internet of Things and Cloud.

[2]  Talel Abdessalem,et al.  A reachability-based access control model for online social networks , 2011, DBSocial '11.

[3]  Benjamin Kuipers,et al.  Negation and Proof by Contradiction in Access-Limited Logic , 1991, AAAI.

[4]  Barbara Carminati,et al.  A Decentralized Security Framework for Web-Based Social Networks , 2008, Int. J. Inf. Secur. Priv..

[5]  Bernardo Cuenca Grau,et al.  OWL 2 Web Ontology Language: Profiles , 2009 .

[6]  Frank van Harmelen,et al.  A semantic web primer , 2004 .

[7]  Tim Berners-Lee,et al.  Uniform Resource Locators (URL) , 1994, RFC.

[8]  Jose M. Such,et al.  Open Challenges in Relationship-Based Privacy Mechanisms for Social Network Services , 2015, Int. J. Hum. Comput. Interact..

[9]  Dong Kun Noh,et al.  Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems , 2011, IEEE Transactions on Parallel and Distributed Systems.

[10]  Ei Ei Mon,et al.  The privacy-aware access control system using attribute-and role-based access control in private cloud , 2011, 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology.

[11]  Xin Jin,et al.  A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC , 2012, DBSec.

[12]  Barbara Carminati,et al.  Collaborative access control in on-line social networks , 2011, 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).

[13]  Barbara Carminati,et al.  Rule-Based Access Control for Social Networks , 2006, OTM Workshops.

[14]  Huajun Chen,et al.  The Semantic Web , 2011, Lecture Notes in Computer Science.

[15]  Mark A. Musen,et al.  The protégé project: a look back and a look forward , 2015, SIGAI.

[16]  Gail-Joon Ahn,et al.  Multiparty Access Control for Online Social Networks: Model and Mechanisms , 2013, IEEE Transactions on Knowledge and Data Engineering.

[17]  P. Samarati,et al.  Access control: principle and practice , 1994, IEEE Communications Magazine.

[18]  Barbara Carminati,et al.  Enforcing access control in Web-based social networks , 2009, TSEC.

[19]  Nigel Shadbolt,et al.  Providing Access Control to Online Photo Albums Based on Tags and Linked Data , 2009, AAAI Spring Symposium: Social Semantic Web: Where Web 2.0 Meets Web 3.0.

[20]  Rob Johnson,et al.  Usable Privacy Controls for Blogs , 2009, 2009 International Conference on Computational Science and Engineering.

[21]  Susan B. Barnes,et al.  A privacy paradox: Social networking in the United States , 2006, First Monday.

[22]  Amirreza Masoumzadeh,et al.  Ontology-based access control for social network systems , 2011, Int. J. Inf. Priv. Secur. Integr..

[23]  Philip W. L. Fong,et al.  Relationship-based access control policies and their policy languages , 2011, SACMAT '11.

[24]  Swapna S. Gokhale,et al.  Understanding social effects in online networks , 2015, 2015 International Conference on Computing, Networking and Communications (ICNC).

[25]  Blase Ur,et al.  Tag, you can see it!: using tags for access control in photo sharing , 2012, CHI.

[26]  Yuan Cheng,et al.  A User-Activity-Centric Framework for Access Control in Online Social Networks , 2011, IEEE Internet Computing.

[27]  Pyin Oo Lwin,et al.  INTELLIGENT ACCESS CONTROL POLICIES FOR SOCIAL N ETWORK SITE , 2013 .

[28]  Robert A. Kowalski,et al.  The Semantics of Predicate Logic as a Programming Language , 1976, JACM.

[29]  Brian Whitworth,et al.  Distributed access control for social networks , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).

[30]  Robert S. Boyer,et al.  A fast string searching algorithm , 1977, CACM.

[31]  Barbara Carminati,et al.  Content-Based Filtering in On-Line Social Networks , 2010, PSDML.

[32]  Liyang Yu,et al.  A Developer’s Guide to the Semantic Web , 2011, Springer Berlin Heidelberg.

[33]  Robert A. Kowalski,et al.  Predicate Logic as Programming Language , 1974, IFIP Congress.

[34]  James A. Hendler,et al.  N3Logic: A logical framework for the World Wide Web , 2007, Theory and Practice of Logic Programming.

[35]  Deborah L. McGuinness,et al.  An Environment for Merging and Testing Large Ontologies , 2000, KR.

[36]  Jose M. Such,et al.  Self-disclosure decision making based on intimacy and privacy , 2012, Inf. Sci..