A novel trust-based access control for social networks using fuzzy systems

Social networks are constantly expanding and attracting more and more users. The users of these networks share plenty of information with their friends, many of which are confidential and private. In this regard, maintaining the security and privacy of users is a major requirement in social networks. Although the traditional access control can help users keep their privacy by applying initial access levels, they are not effective for social networks, considering the dynamic nature of them. Therefore, in this paper, a novel trust-based access control approach has been presented for social network using fuzzy system. The proposed method, SNFTrust, is a combination of trust-based access control and fuzzy inference system which consists of three modules: the user module, the fuzzy trust module, and the access control module. In user module, the user request is analyzed to identify the type of relationships, and the property matrix is created based on user’s activity in social network. In fuzzy trust module, two fuzzy systems are combined to calculate the trust score and to specify the access right. Finally, the access control module enables access to the user account. The proposed approach was implemented using the dataset of a real microblog that attracted over 540 million users on the time we accessed the dataset. The results of experiments indicate that the amount of accuracy is 0.96 and the proposed method has the required flexibility, scalability and accuracy, which can be suitable to apply in various social networks.

[1]  Ji Zhang,et al.  Outlier detection from large distributed databases , 2013, World Wide Web.

[2]  Jingsha He,et al.  An Access Control Method based on Scenario Trust , 2012, Int. J. Comput. Intell. Syst..

[3]  Sarbjeet Singh,et al.  An Approach for Determining Trustworthiness of Individuals in a Web-Based Social Network , 2016 .

[4]  Yanchun Zhang,et al.  Privacy-aware access control with trust management in web service , 2011, World Wide Web.

[5]  Michael Netter,et al.  Taxonomy of social network data types , 2014, EURASIP J. Inf. Secur..

[6]  Yu Wang,et al.  Application of fuzzy neural network in the trust-based access control model , 2010, 2010 8th World Congress on Intelligent Control and Automation.

[7]  Bin Zhao,et al.  Assessment of recommendation trust for access control in open networks , 2018, Cluster Computing.

[8]  Juan Li,et al.  MobiTrust: Trust Management System in Mobile Social Computing , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.

[9]  Yuval Elovici,et al.  Online Social Networks: Threats and Solutions , 2013, IEEE Communications Surveys & Tutorials.

[10]  Anna Cinzia Squicciarini,et al.  Learning based access control in online social networks , 2010, WWW '10.

[11]  Parikshit N. Mahalle,et al.  Trust-Based Access Control in Multi-role Environment of Online Social Networks , 2018, Wirel. Pers. Commun..

[12]  Bo Lang Trust Degree Based Access Control for social networks , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).

[13]  Saeedeh Shekarpour,et al.  Modeling and evaluation of trust with an extension in semantic web , 2010, J. Web Semant..

[14]  Justin Zhijun Zhan,et al.  A Novel Trust Computing System for Social Networks , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.

[15]  Cecile Paris,et al.  STrust: A Trust Model for Social Networks , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[16]  Yanchun Zhang,et al.  A flexible payment scheme and its role-based access control , 2005, IEEE Transactions on Knowledge and Data Engineering.

[17]  Arjan Durresi,et al.  A survey of trust management systems for online social communities - Trust modeling, trust inference and attacks , 2016, Knowl. Based Syst..

[18]  Jf Baldwin,et al.  An Introduction to Fuzzy Logic Applications in Intelligent Systems , 1992 .

[19]  Brian Whitworth,et al.  Access control taxonomy for social networks , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).

[20]  Xiang Li,et al.  AUTrust: A Practical Trust Measurement for Adjacent Users in Social Networks , 2012, 2012 Second International Conference on Cloud and Green Computing.

[21]  Jong Hyuk Park,et al.  Social network security: Issues, challenges, threats, and solutions , 2017, Inf. Sci..

[22]  Dave Clarke,et al.  Access Control Models for Online Social Networks , 2014 .

[23]  Laurence T. Yang,et al.  MobiFuzzyTrust: An Efficient Fuzzy Trust Inference Mechanism in Mobile Social Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[24]  Kwang Hyung Lee,et al.  First Course on Fuzzy Theory and Applications , 2005, Advances in Soft Computing.

[25]  Neeli R. Prasad,et al.  A fuzzy approach to trust based access control in internet of things , 2013, Wireless VITAE 2013.

[26]  Cécile Paris,et al.  A survey of trust in social networks , 2013, CSUR.

[27]  Joseph Migga Kizza Ethical, Privacy, and Security Issues in the Online Social Network Ecosystems , 2013 .

[28]  Li Pan,et al.  A Machine Learning Based Trust Evaluation Framework for Online Social Networks , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[29]  Olusegun Folorunso,et al.  A fuzzy expert system to Trust-Based Access Control in crowdsourcing environments , 2015 .

[30]  Anna Stachowiak,et al.  Uncertainty-Preserving Trust Prediction in Social Networks , 2014, Social Networks: A Framework of Computational Intelligence.

[31]  Samee Ullah Khan,et al.  Scalability Issues in Online Social Networks , 2016, ACM Comput. Surv..

[32]  Yuan Cheng,et al.  Relationship-Based Access Control for Online Social Networks: Beyond User-to-User Relationships , 2012, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing.

[33]  Somanath Tripathy,et al.  A trust-based collaborative access control model with policy aggregation for online social networks , 2017, Social Network Analysis and Mining.

[34]  Gert-Jan de Vreede,et al.  Understanding trust influencing factors in social media communication: A qualitative study , 2017, Int. J. Inf. Manag..

[35]  Guojun Wang,et al.  κ-FuzzyTrust: Efficient trust computation for large-scale mobile social networks using a fuzzy implicit social graph , 2015, Inf. Sci..

[36]  Yanchun Zhang,et al.  Effective Collaboration with Information Sharing in Virtual Universities , 2009, IEEE Transactions on Knowledge and Data Engineering.

[37]  Hua Wang,et al.  Injecting purpose and trust into data anonymisation , 2009, CIKM.

[38]  Zhong Chen,et al.  iSac: Intimacy Based Access Control for Social Network Sites , 2012, 2012 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing.

[39]  Guojun Wang,et al.  κ-FuzzyTrust , 2015 .

[40]  Yi Liu,et al.  Context-aware trust network extraction in large-scale trust-oriented social networks , 2017, World Wide Web.

[41]  Richard Chbeir,et al.  Privacy in Online Social Networks , 2013, Security and Privacy Preserving in Social Networks.