To Control Unauthorized Propagation of Message in OSN Using NGCI Access Control Mechanism
Abstract
Online Social Network(OSN) sites act as a medium to spread their own views, activities and their thoughts to some camaraderie. The information is spread on the web is determined by a human decision.Simultaneously,information security is evaluated based on the quality of the decision made by the users.Nowadays,many access control schemas are being used to control spreading of unauthorized information on OSN sites.In this paper,we present NGCI(Novel Group Centric Integrity)mechanism for information control on the web. Alternatively Monto-Carlo algorithm is used to determine shared information and to notify the user about the risk of information spread to different communities/groups. our framework used to reduce the risk of information flow to a particular user.
Keywords
Full Text:
PDFReferences
B. Carminati, E. Ferrari, S. Morasca, D. Taibi, A probability-based approach to modeling the risk of unauthorized propagation of information in on-line social networks, in: Proceedings of the First ACM Conference on Data and Application Security and Privacy, CODASPY ’11, ACM, San Antonio, TX, USA, 2011, pp. 51–62.
A. Tootoonchian, S. Saroiu, A. Wolman, Y. Ganjali, Lockr: better privacy for social networks, in: Proceedings of the Fifth CONEXT, 2009.
B. Ali, W. Villegas, M. Maheswaran, A trust based approach for protecting user data in social networks, in: Proceedings of the Conference of the Center for Advance Studies on Collaborative Research, Richmond Hill, Ontario, Canada,2007.
B. Carminati, E. Ferrari, A. Perego, Enforcing access control in web-based social networks, ACM Trans. Inf. Syst. Secur. (TISSEC) 13 (2009) 6:1–6:38.
P.W.L. Fong, M. Anwar, Z. Zhao, A privacy preservation model for facebook style social network systems, in: Proceedings of the 14th European Conference on Research in Computer Security, Saint-Malo, France, 2009.
P.W.L. Fong, Relationship-based access control: protection model and policy language, in: Proceedings of the First ACM Conference on Data and Application Security and Privacy (CODASPY), San Antonio, Taxas, USA, 2011, pp. 191–202.
A.C. Squicciarini, M. Shehab, J. Wede, Privacy policies for shared content in social network sites, VLDB J. 19 (2010) 777–796.
http://www.facebook.comprivacy .
B. Carminati, E. Ferrari, R. Heatherly, M. Kantarcioglu, B. Thuraisingham, A semantic web based framework for social network access control, in: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, SACMAT ’09, ACM, Stresa, Italy, 2009, pp.177–186.
S.R. Kruk, S. Grzonkowski, A. Gzella, T. Woroniecki, H. Choi, D-foaf: distributed identity management with access rights delegation, in: Proceesing of the AsianSemantic Web Conference, Lecture Notes in Computer Science, vol. 4185,Springer, 2006, pp. 140–154.
J. Park, R. Sandhu, The uconABC usage control model, ACM Trans. Inf. Syst. Secur. (TISSEC) 7 (2004) 128–174.
X. Zhang, M. Nakae, M.J. Covington, R. Sandhu, Toward a usage-based security framework for collaborative computing systems, ACM Trans. Inf. Syst. Secur.(TISSEC) 11 (2008) 3:1–3:36.
M. Bishop, Computer Security: Art and Science, Addison-Wesley, 2002.
SeyedHossein Mohtasebi and Ali Dehghantanha,” A Mitigation Approach to the Malwares Threats of Social Network Services,” Muktimedia Information Networking and Security,2009. MINES’09. International Conference on, vol.1,no.,pp.448-459,2011.
B. Carminati, E. Ferrari, and A. Perego, “Rule-Based Access Control for Social Networks,” Proc. Int’l Conf. On the Move to Meaningful Internet Systems, pp. 1734-1744, 2006.
P. Fong, “Relationship-Based Access Control: Protection Model and Policy Language,” Proc. First ACM Conf. Data and Application Security and Privacy, pp. 191-202, 2011.
H. Hu, G. Ahn, and K. Kulkarni, “Anomaly Discovery andResolution in Web Access Control Policies,” Proc. 16th ACM Symp.Access Control Models and Technologies, pp. 165-174, 2011.
H. Hu, G.-J. Ahn, and K. Kulkarni, “Detecting and Resolving Firewall Policy Anomalies,” IEEE Trans. Dependable and Secure Computing, vol. 9, no. 3, pp. 318-331, May 2012.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.