Social Puzzles: Context-Based Access Control in Online Social Networks

被引:2
作者
Jadliwala, Murtuza [1 ]
Maiti, Anindya [1 ]
Namboodiri, Vinod [1 ]
机构
[1] Wichita State Univ, Wichita, KS 67260 USA
来源
2014 44TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN) | 2014年
关键词
Online Social Networks; Access Control; Privacy; Surveillance Resistance;
D O I
10.1109/DSN.2014.38
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing popularity of online social networks (OSNs) is spawning new security and privacy concerns. Currently, a majority of OSNs offer very naive access control mechanisms that are primarily based on static access control lists (ACL) or policies. But as the number of social connections grow, static ACL based approaches become ineffective and unappealing to OSN users. There is an increased need in social-networking and data-sharing applications to control access to data based on the associated context (e.g., event, location, and users involved), rather than solely on data ownership and social connections. Surveillance is another critical concern for OSN users, as the service provider may further scrutinize data posted or shared by users for personal gains (e.g., targeted advertisements), for use by corporate partners or to comply with legal orders. In this paper, we introduce a novel paradigm of context-based access control in OSNs, where users are able to access the shared data only if they have knowledge of the context associated with it. We propose two constructions for context-based access control in OSNs: the first is based on a novel application of Shamir's secret sharing scheme, whereas the second makes use of an attribute-based encryption scheme. For both constructions, we analyze their security properties, implement proof-of-concept applications for Facebook and empirically evaluate their functionality and performance. Our empirical measurements show that the proposed constructions execute efficiently on standard computing hardware, as well as, on portable mobile devices.
引用
收藏
页码:299 / 310
页数:12
相关论文
共 20 条
  • [1] [Anonymous], 9241111998 ISO
  • [2] [Anonymous], 2009, W3C WORKSH FUT SOC N
  • [3] [Anonymous], 2012, WALL STREET J
  • [4] Beato F., 2011, P PETS 11
  • [5] BEATO F, 2009, ENFORCING ACCESS CON
  • [6] Beato F., 2013, P ACM CODASPY 13
  • [7] Bethencourt J., 2007, IEEE S P 07
  • [8] Carminati B., 2009, ACM TISSEC
  • [9] Durr M., 2012, MOBILE COMPUTING APP
  • [10] Gross R., 2005, P WPES 05