Abstract
The increasing popularity of social networking makes the social network an important place for digital content dissemination and also brings new business models. The business application of social network needs a balance among these partially diverging interests of the involved parties: users, advertisers and the social network provider. So a contractual access control is needed to assure the three parties that the balance polices can be executed according to the predefined rules. The paper presents a new logic TS_u_Datalog to achieve the goal, a distributed logic incorporated with distributed temporal logic and active rules. The paper shows TS_u_Datalog is one of the most abundant and flexible datalog logic that can describe and execute contractual policies in the distributed and dynamic environment of social network. Firstly, the paper introduces the fundamental concepts, syntax and evaluation method of TS_u_Datalog. Secondly, application on digital content dissemination for social network is illuminated and a motivational example is presented to show the full-fledged temporal expressivity of the logic. Finally, a contrastive analysis is discussed and future works are planned.

Similar content being viewed by others
References
Kahl C., Crane S., Tschersich M., et al. (2011). Privacy respecting targeted advertising for social networks[C]. Information security theory and practice. Security and privacy of mobile devices in wireless communication -, Ifip Wg 11.2 International workshop, Wistp 2011, Heraklion, Crete, Greece. Proceedings. DBLP, 2011:361–370.
Adnan, M., Nagi, M., & Kianmehr, K. (2011). Promoting where, when and what? An analysis of web logs by integrating data mining and social network techniques to guide ecommerce business promotions[J]. Social Network Analysis and Mining, 1(3), 173–185.
Idelberger F, Governatori G, Riveret R, et al. Evaluation of logic-based smart contracts for blockchain systems[C]. Rule Technologies. Research, Tools, and Applications. Volume 9718 of the series Lecture Notes in Computer Science pp 167–1836.
Watanabe, H., Fujimura, S., Nakadaira, A., et al. (2016). Blockchain contract: Securing a blockchain applied to smart contracts[C]. IEEE International Conference on Consumer Electronics., 467–468.
Bertino, E., Catania, B., Gori, R., & Active-U-Datalog, R. (1998). Integrating active rules in a logical update language[C]. Lecture Notes in Computer Science, 107–133.
Loo, B. T., et al. (2009). Declarative networking[J]. Communications of the ACM, 52(11), 87–95.
Hellerstein, J. M. (2010). The declarative imperative: Experiences and conjectures in distributed logic[C]. SIGMOD Rec., 39, 5–19.
A. Galland, et al. (2011) A rule-based language for Web data management[C]. Proc of PODS 2011, 30th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems Athens, Greece 293–304.
Loo, B. T., Condie, T., Garofalakis, M. N., Gay, D. E., Hellerstein, J. M., Maniatis, P., Ramakrishnan, R., Roscoe, T., & Stoica, I. (2006). Declarative networking: language, execution and optimization[C]. In SIGMOD Conference, 97–108.
Condie, T., Chu, D., Hellerstein, J. M., & Maniatis, P. (2008). Evita raced: metacompilation for declarative networks[C]. Proc. VLDB Endow., 1(1), 1153–1165.
Chu, D., Popa, L., Tavakoli, A., Hellerstein, J. M., Levis, P., Shenker, S., & Stoica, I. (2007). The design and implementation of a declarative sensor network system[C]. In SenSys, 175–188.
Ma, L., Leng, P., Zhong, Y., et al. (2017). Research on semantic of updatable distributed logic and its application in access control[J]. Journal of Parallel & Distributed Computing, 103, 104–112.
Hellerstein, J. M. (2010). The declarative imperative: experiences and conjectures in distributed logic[J]. ACM SIGMOD Record, 39(1), 5–19.
Interlandi M. (2012) Reasoning about knowledge in distributed systems using datalog[M]. Datalog in Academia and Industry. Springer Berlin Heidelberg 99–110.
Interlandi M., Tanca L., Bergamaschi S. (2013). Datalog in time and space, synchronously[C]. Alberto Mendelzon International Workshop on Foundations of Data Management.
Li Ma, Yingyu Huo, Yong Zhong, Updatable distributed logic active-DU-Datalog and its application in digital right protection of social network[D], Technical Report, http://www.scholat.com/teamwork/teamworkdownloadscholar.html?id=2202&teamId=286
L. Ma, L. Tao, K. Gai, and Y. Zhong. (2016) A novel social network access control model using logical authorization language in cloud computing[J]. Concurrency and Computation: Practice and Experience, PP(99):1.
Li, Y., Dai, W., Ming, Z., et al. (2016). Privacy protection for preventing data over-collection in Smart City[J]. IEEE Transactions on Computers, 65(5), 1339–1350.
Qiu, M., Ming, Z., Li, J., et al. (2013). Informer homed routing fault tolerance mechanism for wireless sensor networks[J]. Journal of Systems Architecture, 59(4–5), 260–270.
Acknowledgements
This paper is supported by the Natural Science Foundation of Guangdong(2015A030313638), the Frontier and Key Technology innovation of Guangdong(2016B010113004), the Science Research Project of Foshan University, The Characteristic Innovation Project of the Department of Education of Guangdong province under Grant Numbers 2016KTSCX147. The Youth Creative Talents Program of the Department of Education of Guangdong province under Grant Numbers 2015KQNCX179.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Huo, Y., Ma, L. & Zhong, Y. A Big Data Privacy Respecting Dissemination Method for Social Network. J Sign Process Syst 90, 467–475 (2018). https://doi.org/10.1007/s11265-017-1251-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11265-017-1251-9