Restricting data-leakage using fine-grained access control on OSN objects

被引:3
作者
Rathore, Nemi Chandra [1 ]
Tripathy, Somanath [2 ]
机构
[1] Cent Univ South Bihar, Dept Comp Sci, Gaya, Bihar, India
[2] Indian Inst Technol Patna, Dept Comp Sci & Engn, Bihta, Bihar, India
关键词
Online social networks (OSNs); Privacy; Access control; Third-party applications; Accessor capability list (ACPL); Answer set programming; MODEL;
D O I
10.1007/s10207-022-00629-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, Online Social Networks like Facebook, Twitter have become an integral part of our daily life to share a variety of information with others. These information contents are accessible to a large group of Internet users causing a serious privacy risk. In this paper, we propose a simple and flexible access control model to regulate access to users' resources on Twitter. Our proposed model employs an object matrix and access capability list to enable users to regulate access to their private resources and can be tuned to other Online Social Networks. The main advantages of our model are its simplicity and ease of deployment. The correctness of the access control model is verified using a logical model in Answer Set Programming. The efficiency and feasibility of our mechanism is evaluated through a prototype.
引用
收藏
页码:93 / 106
页数:14
相关论文
共 65 条
[1]  
Aldhafferi N., 2013, International Journal of Security, Privacy, and Trust Management, V2, P1, DOI DOI 10.5121/IJSPTM.2013.2201
[2]  
[Anonymous], 2020, TEAM HOSTINGFACTS IN
[3]  
[Anonymous], 2022, FACEBOOK
[4]  
[Anonymous], 2022, Facebook
[5]  
[Anonymous], 2020, TWITTER USAGE STAT
[6]  
[Anonymous], 2019, BUSINESS STANDARD DA
[7]  
Anthonysamy P., 2012, P 1 WORKSH PRIV SEC, P51
[8]  
Baek Seungsoo, 2014, ScientificWorldJournal, V2014, P936319, DOI 10.1155/2014/936319
[9]  
Beaumont, 2010, FACEBOOK ADMITS INAD
[10]  
Becker J., 2009, WEB 2 0 SECURITY PRI