Skip to main content

Defamation-Free Networks through User-Centered Data Control

  • Conference paper
Security and Trust Management (STM 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6710))

Included in the following conference series:

Abstract

Existing online social networks hardly care about users’ privacy rights. In particular, they do not permit users to keep control over “their” data. By “their” data, we denote data that refers to the respective user as an identifiable object within (textual, audio, image or video) media. The well-known concept of “usage control” employs a usage rights’ perspective (e.g. DRM), but it does not explicitly deal with privacy. In this paper, we instead propose the concept of “data control”, which exactly focusses on privacy rights and therefore employs a control rights’ perspective. Based on data control, we propose a defamation-free network (DFN) in which control rights are not only manifest and visible, but can also be exercised. We examine the main usage scenarios of such a network, and discuss the possible approaches for implementing it. Finally, we sketch a solution with an underlying P2P architecture and highlight the basic technological challenges and requirements.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alam, M., Seifert, J.-P., Li, Q., Zhang, X.: Usage control platformization via trustworthy selinux. In: ASIACCS, pp. 245–248 (2008)

    Google Scholar 

  2. Buchegger, S., Schiöberg, D., Vu, L.H., Datta, A.: PeerSoN: P2P Social Networking - Early Experiences and Insights. In: Second ACM Workshop on Social Network Systems Social Network Systems 2009, Nürnberg, Germany (March 31, 2009)

    Google Scholar 

  3. Caronni, G.: Walking the web of trust. In: WETICE 2000: Proceedings of the 9th IEEE International Workshops on Enabling Technologies, pp. 153–158. IEEE Computer Society, Washington, DC, USA (2000)

    Google Scholar 

  4. Castelluccia, C., Kaafar, M.A.: Owner-centric networking (ocn): Toward a data pollution-free internet. In: SAINT 2009: Proceedings of the 2009 Ninth Annual International Symposium on Applications and the Internet, pp. 169–172. IEEE Computer Society, Washington, DC, USA (2009)

    Chapter  Google Scholar 

  5. Cutillo, L.A., Molva, R., Strufe, T.: Safebook: a privacy preserving online social network leveraging on real-life trust. To appear in IEEE Communications Magazine, Consumer Communications and Networking Series (December 2009)

    Google Scholar 

  6. Datta, A., Hauswirth, M., Aberer, K.: Beyond web of trust: Enabling p2p e-commerce. In: CEC, pp. 303–312 (2003)

    Google Scholar 

  7. Eilers, F., Nestmann, U.: Deriving trust from experience. In: Degano, P., Guttman, J.D. (eds.) FAST 2009. LNCS, vol. 5983, pp. 36–50. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  8. Hafner, M., Breu, R.: Security Engineering for Service-Oriented Architectures. Springer, Heidelberg (2009)

    Google Scholar 

  9. Park, J., Sandhu, R.S.: The ucon abc usage control model. ACM Trans. Inf. Syst. Secur. 7(1), 128–174 (2004)

    Article  Google Scholar 

  10. Pretschner, A.: An overview of distributed usage control. In: Proc. of KEPT 2009 International Conference, pp. 25–33 (July 2009)

    Google Scholar 

  11. Pretschner, A., Büchler, M., Harvan, M., Schaefer, C., Walter, T.: Usage control enforcement with data flow tracking for x11. In: 5th International Workshop on Security and Trust Management, STM 2009 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sarrouh, N., Eilers, F., Nestmann, U., Schieferdecker, I. (2011). Defamation-Free Networks through User-Centered Data Control. In: Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds) Security and Trust Management. STM 2010. Lecture Notes in Computer Science, vol 6710. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22444-7_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22444-7_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22443-0

  • Online ISBN: 978-3-642-22444-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics