Automated and Dynamic Access Control Management in OSN

被引:0
作者
Abid, Sohail [1 ]
Daud, Imran [1 ]
机构
[1] Fdn Univ Islamabad, CS Dept, Rawalpindi Campus, Rawalpindi, Pakistan
来源
4TH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING (IC)2 | 2021年
关键词
OSNs; Social Network; Access Control; Security; Privacy; Dynamic; BLOCKCHAIN; FRAMEWORK; INTERNET; MODEL;
D O I
10.1109/ICIC53490.2021.9693032
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Online social networks (OSNs) are a platform that is used to share digital resources and to communicate with friends through messages in the OSN environment. The sharing of resources requires proper access control management to limit access as per the requirements of the users. Therefore, the privacy concerns in OSN have gained more attention in recent years. Existing solutions provided by the OSNs are to group the friends in static contact lists (e.g., friends, close friends, etc.). However, the contact lists may contain some irrelevant users, therefore, fine-grained access control management is required in these mechanisms. Moreover, in the existing systems, the predefined policies are implemented on a set of users that also include a group of users that may be irrelevant to the resource. In OSNs, privacy settings are managed by the users. However, due to the users' lack of technical knowledge, they are unable to set privacy settings. To palliate these limitations, we propose an automated and dynamic access control management (AD-ACM) to enhance the privacy of text-based resources in OSNs.
引用
收藏
页码:348 / 353
页数:6
相关论文
共 50 条
[41]   Access control models most used in medical data security [J].
Campos-Montero, Brian ;
Rodriguez-Sandoval, Cesar ;
de los Santos, Alberto Mendoza .
TECNOLOGIA EN MARCHA, 2024, 37 (01)
[42]   A New Dynamic Smart-AC Model Methodology to Enforce Access Control Policy in IoT layers [J].
Kashmar, Nadine ;
Adda, Mehdi ;
Atieh, Mirna ;
Ibrahim, Hussein .
2019 IEEE/ACM 1ST INTERNATIONAL WORKSHOP ON SOFTWARE ENGINEERING RESEARCH & PRACTICES FOR THE INTERNET OF THINGS (SERP4IOT 2019), 2019, :21-24
[43]   Automated Design Method of Hierarchical Access Control in Database [J].
Antoshchuk, Svetlana G. ;
Blazhko, Alexander A. ;
Saoud, Ebaa .
2009 IEEE INTERNATIONAL WORKSHOP ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS, 2009, :360-363
[44]   An authenticated access control framework for digital right management system [J].
Rana, Saurabh ;
Mishra, Dheerendra .
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (16) :25255-25270
[45]   An authenticated access control framework for digital right management system [J].
Saurabh Rana ;
Dheerendra Mishra .
Multimedia Tools and Applications, 2021, 80 :25255-25270
[46]   The dynamic predicate: integrating access control with query processing in XML databases [J].
Lee, Jae-Gil ;
Whang, Kyu-Young ;
Han, Wook-Shin ;
Song, Il-Yeol .
VLDB JOURNAL, 2007, 16 (03) :371-387
[47]   A secure effective key management scheme for dynamic access control in a large leaf class hierarchy [J].
Odelu, Vanga ;
Das, Ashok Kumar ;
Goswami, Adrijit .
INFORMATION SCIENCES, 2014, 269 :270-285
[48]   A Systematic Review of Access Control Models: Background, Existing Research, and Challenges [J].
Farhadighalati, Nastaran ;
Estrada-Jimenez, Luis A. ;
Nikghadam-Hojjati, Sanaz ;
Barata, Jose .
IEEE ACCESS, 2025, 13 :17777-17806
[49]   Centralized, Distributed, and Everything in between: Reviewing Access Control Solutions for the loT [J].
Drame-Maigne, Sophie ;
Laurent, Maryline ;
Castillo, Laurent ;
Ganem, Herve .
ACM COMPUTING SURVEYS, 2021, 54 (07)
[50]   Interoperable, dynamic and privacy-preserving access control for cloud data storage when integrating heterogeneous organizations [J].
Esposito, Christian .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 108 :124-136