Relationship-Based Access Control for Resharing in Decentralized Online Social Networks

被引:2
作者
Gay, Richard [1 ]
Hu, Jinwei [1 ]
Mantel, Heiko [1 ]
Mazaheri, Sogol [2 ]
机构
[1] Tech Univ Darmstadt, Dept Comp Sci, Modeling & Anal Informat Syst, Darmstadt, Germany
[2] Tech Univ Darmstadt, Dept Comp Sci, Cryptog & Complex Theory, Darmstadt, Germany
来源
FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2017) | 2018年 / 10723卷
关键词
Decentralized online social networks; Privacy; Access control; MODEL; TRUST;
D O I
10.1007/978-3-319-75650-9_2
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Decentralized online social networks (DOSNs) have adopted quite coarse-grained policies for sharing messages with friends of friends (i.e., resharing). They either forbid it completely or allow resharing of messages only without any possibility to constrain their subsequent distribution. In this article, we present a novel enforcement mechanism for securing resharing in DOSNs by relationship-based access control and user-determined privacy policies. Our mechanism supports resharing and offers users control over their messages after resharing. Moreover, it addresses the fact that DOSNs are run by multiple providers and honors users' choices of which providers they trust. We clarify how our mechanism can be effectively implemented by a prototype for the DOSN Diaspora*. Our experimental evaluation shows that controlling privacy with our prototype causes only a rather small performance overhead.
引用
收藏
页码:18 / 34
页数:17
相关论文
共 30 条
  • [1] Albertini Davide Alberto, 2014, P 4 ACM C DAT APPL S, P297
  • [2] [Anonymous], 2009, P 8 INT C AUT AG MUL
  • [3] [Anonymous], 2005, THESIS
  • [4] [Anonymous], P 3 EUR S RES COMP S
  • [5] CARDS - Collaborative Audit and Report Data Sharing for A-Posteriori Access Control in DOSNs
    Bahri, Leila
    Carminati, Barbara
    Ferrari, Elena
    [J]. 2015 IEEE CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2015, : 36 - 45
  • [6] Beato F, 2014, IEEE CONF COMM NETW, P328, DOI 10.1109/CNS.2014.6997501
  • [7] Bodriagov O, 2014, INT CONF PERVAS COMP, P622, DOI 10.1109/PerComW.2014.6815278
  • [8] Bruns Glenn., 2012, Proceedings of the second CODASPY, P117, DOI DOI 10.1145/2133601.2133616
  • [9] Buchegger Sonja., 2009, P 2 AC M EUROSYS WOR, P46, DOI DOI 10.1145/1578002.1578010
  • [10] Enforcing Access Control in Web-Based Social Networks
    Carminati, Barbara
    Ferrari, Elena
    Perego, Andrea
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2009, 13 (01)