Trust-Based Access Control in Multi-role Environment of Online Social Networks

In the last decade, online social networks have seen a boom with respect to the use and applications. Many users upload large quantity of data that may risk the data security and access control. Trust-based access control strategy was used initially for the owner and his friends in order to restrict the data access using a well defined Trust Rule. The paper has implemented trust-based access control depending on the different roles played by the user. User plays different roles like owner, contributor, disseminator and stakeholder. Aggregated trust score computation and security level computation has been calculated in multi-role environment depending on different multi-role scenarios The proposed novel concept solves the access control problem where the user plays multiple roles that have been further discussed.

[1]  Muthucumaru Maheswaran,et al.  A trust based approach for protecting user data in social networks , 2007, CASCON.

[2]  Georg Lausen,et al.  Propagation Models for Trust and Distrust in Social Networks , 2005, Inf. Syst. Frontiers.

[3]  Phayung Meesad,et al.  Analysis of factors which impact Facebook users' attitudes and behaviours using decision tree techniques , 2014, 2014 11th International Joint Conference on Computer Science and Software Engineering (JCSSE).

[4]  Cong Wang,et al.  Attribute based data sharing with attribute revocation , 2010, ASIACCS '10.

[5]  Gail-Joon Ahn,et al.  Multiparty Access Control for Online Social Networks: Model and Mechanisms , 2013, IEEE Transactions on Knowledge and Data Engineering.

[6]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[7]  Shiuh-Pyng Shieh,et al.  A Batch-Authenticated and Key Agreement Framework for P2P-Based Online Social Networks , 2012, IEEE Transactions on Vehicular Technology.

[8]  Jennifer Golbeck,et al.  SUNNY: A New Algorithm for Trust Inference in Social Networks Using Probabilistic Confidence Models , 2007, AAAI.

[9]  Junbeom Hur,et al.  Attribute-Based Secure Data Sharing with Hidden Policies in Smart Grid , 2013, IEEE Transactions on Parallel and Distributed Systems.

[10]  Gail-Joon Ahn,et al.  Access control for online social networks third party applications , 2012, Comput. Secur..

[11]  Junbeom Hur,et al.  Improving Security and Efficiency in Attribute-Based Data Sharing , 2013, IEEE Transactions on Knowledge and Data Engineering.

[12]  Mehmet A. Orgun,et al.  Finding the Optimal Social Trust Path for the Selection of Trustworthy Service Providers in Complex Social Networks , 2013, IEEE Trans. Serv. Comput..

[13]  Madhumita Chatterjee,et al.  Experimental Analysis on Access Control Using Trust Parameter for Social Network , 2014, SNDS.

[14]  Parikshit N. Mahalle,et al.  Handling Data Confidentiality Attack due to Data Sharing using Trust-based Approach in Online Social Networks , 2015 .

[15]  Wei-Lun Chang,et al.  Estimating trust value: A social network perspective , 2014, Information Systems Frontiers.