IMPROVE - Identifying Minimal PROfile VEctors for Similarity Based Access Control (original) (raw)

INTELLIGENT ACCESS CONTROL POLICIES FOR SOCIAL NETWORK SITE

Social networking sites (SNSs) are increasingly becoming a major type of online applications that facilitate online social interactions and information sharing among a large amount of users. Furthermore, privacy protection is an important issue in social networking. Users are not able to easily specify their access control requirements through the available privacy configuration interfaces. An approach assisting online users in composing and managing their access control policies to configure their privacy setting is proposed based on Decision Tree Learning. Moreover, Ontology APIs include social network ontology (SNO) to capture the information semantics in an SNS and an access control ontology (ACO) that is used to store rules from the classifier combining with existing access control rules. Therefore, a fine-gained OSN access control model based on semantic web technologies is proposed in order to automatically construct access control rules for the users' privacy settings with the minimal effort from the user.

Analyzing and Optimizing Access Control Choice Architectures in Online Social Networks

The way users manage access to their information and computers has a tremendous effect on the overall security and privacy of individuals and organizations. Usually, access management is conducted using a choice architecture, a behavioral economics concept that describes the way decisions are framed to users. Studies have consistently shown that the design of choice architectures, mainly the selection of default options, has a strong effect on the final decisions users make by nudging them toward certain behaviors. In this article, we propose a method for optimizing access control choice architectures in online social networks. We empirically evaluate the methodology on Facebook, the world's largest online social network, by measuring how well the default options cover the existing user choices and preferences and toward which outcome the choice architecture nudges users. The evaluation includes two parts: (a) collecting access control decisions made by 266 users of Facebook for a period of 3 months; and (b) surveying 533 participants who were asked to express their preferences regarding default options. We demonstrate how optimal defaults can be algorithmically identified from users' decisions and preferences, and we measure how existing defaults address users' preferences compared with the optimal ones. We analyze how access control defaults can better serve existing users, and we discuss how our method can be used to establish a common measuring tool when examining the effects of default options. ACM Reference Format: Ron Hirschprung, Eran Toch, Hadas Schwartz-Chassidim, Tamir Mendel, and Oded Maimon. 2017. Analyzing and optimizing access control choice architectures in online social networks.

Beyond User-to-User Access Control for Online Social Networks

2008

With the development of Web 2.0 technologies, online social networks are able to provide open platforms to enable the seamless sharing of profile data to enable public developers to interface and extend the social network services as applications (or APIs). At the same time, these open interfaces pose serious privacy concerns as third party applications are usually given full read access to the user profiles. Current related research has focused on mainly user-to-user interactions in social networks, and seems to ignore the third party applications. In this paper, we present an access control framework to manage the third party to user interactions. Our framework is based on enabling the user to specify the data attributes to be shared with the application and at the same time be able to specify the degree of specificity of the shared attributes. We model applications as finite state machines, and use the required user profile attributes as conditions governing the application execution. We formulate the minimal attribute generalization problem and we propose a solution that maps the problem to the shortest path problem to find the minimum set of attribute generalization required to access the application services.

IJERT-Multiuser Access Control for online Social Medias: Beyond Single user Protection

International Journal of Engineering Research and Technology (IJERT), 2014

https://www.ijert.org/multiuser-access-control-for-online-social-medias-beyond-single-user-protection https://www.ijert.org/research/multiuser-access-control-for-online-social-medias-beyond-single-user-protection-IJERTV3IS040846.pdf Online social medias (OSMs) have seen a rapid growth in decade and has become a real gateway for millions of Internet users. These OSMs offer a digital social communications and information sharing. OSMs users unintentionally disclose certain kinds of personal information that attackers could get benefited from which there is a need for increased security and privacy issues. Online social medias (OSMs) with a billion users have severely raised concerns on privacy leakage. Hence OSMs allow its users to maximum access to mutual data, they currently do not provide any method to apply privacy concerns over data related with many users. Our work recognize what bits of information are currently being shared, how extensively, and what users can do to stop such sharing. Along with this we frame an access control model to internment the essence of multiuser authorization requirements, along with a multiuser policy requirement scheme and a policy implementation mechanism.

A collaborative access control framework for online social networks

Journal of Logical and Algebraic Methods in Programming, 2020

Online social networks (OSNs) are one of the most popular web-based services for people to communicate and share information with each other. With all their bene ts, OSNs might raise serious problems in what concerns users' privacy. One privacy risk is caused by accessing and sharing co-owned data items, i.e., when a user posts a data item that involves other users, some users' privacy may be disclosed, since users generally have di erent privacy preferences regarding who can access and share their data. Another risk is caused by the privacy settings o ered by OSNs that do not, in general, allow ne-grained enforcement, especially in cases where posted data items concern other users. We discuss and give examples of these issues, in order to illustrate their impacts on current OSNs' privacy protection mechanisms. We propose a collaborative access control framework to deal with such privacy issues. Basically, in our framework, the decision whether a user can access or share a co-owned data item is based on the aggregated opinion of all users involved. Our solution is based on the sensitivity level of users with respect to the concerned data item, the trust among users, the types of controllers (those who are concerned in making the collaborative decision) and the types of accessors (those who are identi ed to access a given data item or not). In order to observe how varying some of the parameters mentioned above in uence the outcome of the permitting/denying decision of the proposed solution, we provide an evaluation of our framework. We also present a proof-of-concept implementation of our approach in the open source OSN Diaspora.

A Collaborative Access Control Model for Shared Items in Online Social Networks

2014

The recent emergence of online social networks (OSNs) has changed the communication behaviors of thousand of millions of users. OSNs have become significant platforms for connecting users, sharing information, and a valuable source of private and sensitive data about individuals. While OSNs insert constantly new social features to increase the interaction between users, they, unfortunately, offer primitive access control mechanisms that place the burden of privacy policy configuration solely on the holder who has shared data in her/his profile regardless of other associated users, who may have different privacy preferences. Therefore, current OSN privacy mechanisms violate the privacy of all stakeholders by giving one user full authority over another's privacy settings, which is

Policy resolution of shared data in online social networks

International Journal of Electrical and Computer Engineering (IJECE), 2020

Online social networks have practically a go-to source for information divulging, social exchanges and finding new friends. The popularity of such sites is so profound that they are widely used by people belonging to different age groups and various regions. Widespread use of such sites has given rise to privacy and security issues. This paper proposes a set of rules to be incorporated to safeguard the privacy policies of related users while sharing information and other forms of media online. The proposed access control network takes into account the content sensitivity and confidence level of the accessor to resolve the conflicting privacy policies of the co-owners.

Modeling Access Control Policy of a Social Network

International Journal of Advanced Computer Science and Applications, 2016

Social networks bring together users in a virtual platform and offer them the ability to share-within the Community-personal and professional information's, photos, etc. which are sometimes sensitive. Although, the majority of these networks provide access control mechanisms to their users (to manage who accesses to which information), privacy settings are limited and do not respond to all users' needs. Hence, the published information remain all vulnerable to illegal access. In this paper, the access control policy of the social network "Facebook" is analyzed in a profound way by starting with its modeling with "Organization Role Based Access Control" model, and moving to the simulation of the policy with an appropriate simulator to test the coherence aspect, and ending with a discussion of analysis results which shows the gap between access control management options offered by Facebook and the real requirements of users in the same context. Extracted conclusions prove the need of developing a new access control model that meets most of these requirements, which will be the subject of a forthcoming work.