Skip to main content
Log in

A Big Data Privacy Respecting Dissemination Method for Social Network

  • Published:
Journal of Signal Processing Systems Aims and scope Submit manuscript

    We’re sorry, something doesn't seem to be working properly.

    Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Abstract

The increasing popularity of social networking makes the social network an important place for digital content dissemination and also brings new business models. The business application of social network needs a balance among these partially diverging interests of the involved parties: users, advertisers and the social network provider. So a contractual access control is needed to assure the three parties that the balance polices can be executed according to the predefined rules. The paper presents a new logic TS_u_Datalog to achieve the goal, a distributed logic incorporated with distributed temporal logic and active rules. The paper shows TS_u_Datalog is one of the most abundant and flexible datalog logic that can describe and execute contractual policies in the distributed and dynamic environment of social network. Firstly, the paper introduces the fundamental concepts, syntax and evaluation method of TS_u_Datalog. Secondly, application on digital content dissemination for social network is illuminated and a motivational example is presented to show the full-fledged temporal expressivity of the logic. Finally, a contrastive analysis is discussed and future works are planned.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1

Similar content being viewed by others

References

  1. Kahl C., Crane S., Tschersich M., et al. (2011). Privacy respecting targeted advertising for social networks[C]. Information security theory and practice. Security and privacy of mobile devices in wireless communication -, Ifip Wg 11.2 International workshop, Wistp 2011, Heraklion, Crete, Greece. Proceedings. DBLP, 2011:361–370.

  2. Adnan, M., Nagi, M., & Kianmehr, K. (2011). Promoting where, when and what? An analysis of web logs by integrating data mining and social network techniques to guide ecommerce business promotions[J]. Social Network Analysis and Mining, 1(3), 173–185.

    Article  Google Scholar 

  3. Idelberger F, Governatori G, Riveret R, et al. Evaluation of logic-based smart contracts for blockchain systems[C]. Rule Technologies. Research, Tools, and Applications. Volume 9718 of the series Lecture Notes in Computer Science pp 167–1836.

  4. Watanabe, H., Fujimura, S., Nakadaira, A., et al. (2016). Blockchain contract: Securing a blockchain applied to smart contracts[C]. IEEE International Conference on Consumer Electronics., 467–468.

  5. Bertino, E., Catania, B., Gori, R., & Active-U-Datalog, R. (1998). Integrating active rules in a logical update language[C]. Lecture Notes in Computer Science, 107–133.

  6. Loo, B. T., et al. (2009). Declarative networking[J]. Communications of the ACM, 52(11), 87–95.

    Article  Google Scholar 

  7. Hellerstein, J. M. (2010). The declarative imperative: Experiences and conjectures in distributed logic[C]. SIGMOD Rec., 39, 5–19.

    Article  Google Scholar 

  8. A. Galland, et al. (2011) A rule-based language for Web data management[C]. Proc of PODS 2011, 30th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems Athens, Greece 293–304.

  9. Loo, B. T., Condie, T., Garofalakis, M. N., Gay, D. E., Hellerstein, J. M., Maniatis, P., Ramakrishnan, R., Roscoe, T., & Stoica, I. (2006). Declarative networking: language, execution and optimization[C]. In SIGMOD Conference, 97–108.

  10. Condie, T., Chu, D., Hellerstein, J. M., & Maniatis, P. (2008). Evita raced: metacompilation for declarative networks[C]. Proc. VLDB Endow., 1(1), 1153–1165.

    Article  Google Scholar 

  11. Chu, D., Popa, L., Tavakoli, A., Hellerstein, J. M., Levis, P., Shenker, S., & Stoica, I. (2007). The design and implementation of a declarative sensor network system[C]. In SenSys, 175–188.

  12. Ma, L., Leng, P., Zhong, Y., et al. (2017). Research on semantic of updatable distributed logic and its application in access control[J]. Journal of Parallel & Distributed Computing, 103, 104–112.

    Article  Google Scholar 

  13. Hellerstein, J. M. (2010). The declarative imperative: experiences and conjectures in distributed logic[J]. ACM SIGMOD Record, 39(1), 5–19.

    Article  Google Scholar 

  14. Interlandi M. (2012) Reasoning about knowledge in distributed systems using datalog[M]. Datalog in Academia and Industry. Springer Berlin Heidelberg 99–110.

  15. Interlandi M., Tanca L., Bergamaschi S. (2013). Datalog in time and space, synchronously[C]. Alberto Mendelzon International Workshop on Foundations of Data Management.

  16. Li Ma, Yingyu Huo, Yong Zhong, Updatable distributed logic active-DU-Datalog and its application in digital right protection of social network[D], Technical Report, http://www.scholat.com/teamwork/teamworkdownloadscholar.html?id=2202&teamId=286

  17. L. Ma, L. Tao, K. Gai, and Y. Zhong. (2016) A novel social network access control model using logical authorization language in cloud computing[J]. Concurrency and Computation: Practice and Experience, PP(99):1.

  18. Li, Y., Dai, W., Ming, Z., et al. (2016). Privacy protection for preventing data over-collection in Smart City[J]. IEEE Transactions on Computers, 65(5), 1339–1350.

    Article  MathSciNet  Google Scholar 

  19. Qiu, M., Ming, Z., Li, J., et al. (2013). Informer homed routing fault tolerance mechanism for wireless sensor networks[J]. Journal of Systems Architecture, 59(4–5), 260–270.

    Article  Google Scholar 

Download references

Acknowledgements

This paper is supported by the Natural Science Foundation of Guangdong(2015A030313638), the Frontier and Key Technology innovation of Guangdong(2016B010113004), the Science Research Project of Foshan University, The Characteristic Innovation Project of the Department of Education of Guangdong province under Grant Numbers 2016KTSCX147. The Youth Creative Talents Program of the Department of Education of Guangdong province under Grant Numbers 2015KQNCX179.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Li Ma.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Huo, Y., Ma, L. & Zhong, Y. A Big Data Privacy Respecting Dissemination Method for Social Network. J Sign Process Syst 90, 467–475 (2018). https://doi.org/10.1007/s11265-017-1251-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11265-017-1251-9

Keywords