Automated and Dynamic Access Control Management in OSN

被引:0
作者
Abid, Sohail [1 ]
Daud, Imran [1 ]
机构
[1] Fdn Univ Islamabad, CS Dept, Rawalpindi Campus, Rawalpindi, Pakistan
来源
4TH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING (IC)2 | 2021年
关键词
OSNs; Social Network; Access Control; Security; Privacy; Dynamic; BLOCKCHAIN; FRAMEWORK; INTERNET; MODEL;
D O I
10.1109/ICIC53490.2021.9693032
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Online social networks (OSNs) are a platform that is used to share digital resources and to communicate with friends through messages in the OSN environment. The sharing of resources requires proper access control management to limit access as per the requirements of the users. Therefore, the privacy concerns in OSN have gained more attention in recent years. Existing solutions provided by the OSNs are to group the friends in static contact lists (e.g., friends, close friends, etc.). However, the contact lists may contain some irrelevant users, therefore, fine-grained access control management is required in these mechanisms. Moreover, in the existing systems, the predefined policies are implemented on a set of users that also include a group of users that may be irrelevant to the resource. In OSNs, privacy settings are managed by the users. However, due to the users' lack of technical knowledge, they are unable to set privacy settings. To palliate these limitations, we propose an automated and dynamic access control management (AD-ACM) to enhance the privacy of text-based resources in OSNs.
引用
收藏
页码:348 / 353
页数:6
相关论文
共 50 条
[21]   An ECDSA Approach to Access Control in Knowledge Management Systems Using Blockchain [J].
Nyame, Gabriel ;
Qin, Zhiguang ;
Agyekum, Kwame Opuni-Boachie Obour ;
Sifah, Emmanuel Boateng .
INFORMATION, 2020, 11 (02)
[22]   Restricting data-leakage using fine-grained access control on OSN objects [J].
Nemi Chandra Rathore ;
Somanath Tripathy .
International Journal of Information Security, 2023, 22 :93-106
[23]   Access Control, Key Management, and Trust for Emerging Wireless Body Area Networks [J].
Salehi Shahraki, Ahmad ;
Lauer, Hagen ;
Grobler, Marthie ;
Sakzad, Amin ;
Rudolph, Carsten ;
Dong, Hai .
SENSORS, 2023, 23 (24)
[24]   Access control and privilege management in electronic health record: a systematic literature review [J].
Jayabalan, Manoj ;
O'Daniel, Thomas .
JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (12)
[25]   DACIoT: Dynamic Access Control Framework for IoT Deployments [J].
Alkhresheh, Ashraf ;
Elgazzar, Khalid ;
Hassanein, Hossam S. .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (12) :11401-11419
[26]   Dynamic key management schemes for access control in a hierarchy [J].
Lin, CH .
COMPUTER COMMUNICATIONS, 1997, 20 (15) :1381-1385
[27]   Enabling privacy and leakage resistance for dynamic blockchain-based access control systems [J].
Wang, Xin ;
Jiang, Peng ;
Baker, Thar ;
Li, Tielei ;
Zhu, Liehuang .
COMPUTER STANDARDS & INTERFACES, 2023, 84
[28]   Decentralized Lightweight Group Key Management for Dynamic Access Control in IoT Environments [J].
Dammak, Maissa ;
Senouci, Sidi-Mohammed ;
Messous, Mohamed Ayoub ;
Elhdhili, Mohamed Houcine ;
Gransart, Christophe .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (03) :1742-1757
[29]   User authentication using Blockchain based smart contract in role-based access control [J].
Kamboj, Priyanka ;
Khare, Shivang ;
Pal, Sujata .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (05) :2961-2976
[30]   TrustAccess: A Trustworthy Secure Ciphertext-Policy and Attribute Hiding Access Control Scheme Based on Blockchain [J].
Gao, Sheng ;
Piao, Guirong ;
Zhu, Jianming ;
Ma, Xindi ;
Ma, Jianfeng .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (06) :5784-5798