Skip to main content
Log in

Trust-Based Access Control in Multi-role Environment of Online Social Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In the last decade, online social networks have seen a boom with respect to the use and applications. Many users upload large quantity of data that may risk the data security and access control. Trust-based access control strategy was used initially for the owner and his friends in order to restrict the data access using a well defined Trust Rule. The paper has implemented trust-based access control depending on the different roles played by the user. User plays different roles like owner, contributor, disseminator and stakeholder. Aggregated trust score computation and security level computation has been calculated in multi-role environment depending on different multi-role scenarios The proposed novel concept solves the access control problem where the user plays multiple roles that have been further discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Takalkar, V., & Mahalle, P. N. (2015). Data confidentiality in online social networks: A survey. IJSR, 4(1), 78–82.

    Google Scholar 

  2. http://mashable.com/2011/12/19/friend-unfriend-facebook.

  3. Takalkar, V., & Mahalle, P. N. (2015). Trustbook: A Trust-based access control in online social networks. WPMC, Global Wireless Summit.

  4. Hu, H., & Ahn, G.-J. (2011). Multiparty authorization framework for data sharing in online social networks data and applications security and privacy XXV. DBSec 2011. Lecture Notes in Computer Science, Vol 6818. Springer, Berlin, Heidelberg.

  5. Hu, H., Ahn, G.-J., & Jorgensen, J. (2013). Multiparty access control for online social model and mechanisms. IEEE Transactions on Knowledge and Data Engineering, 25(7), 1614–1627.

    Article  Google Scholar 

  6. Omanakuttan, S., & Chatterjee, M. (2014). Experimental analysis on access control using trust parameter for social network. Berlin, Heidelberg: Springer.

    Book  Google Scholar 

  7. Chang, W.-L., Diaz, A. N., & Hung, P. C. K. (2014). Estimating trust value: A social network perspective. New York: Springer.

    Google Scholar 

  8. Ziegler, C.-N., & Lausen, G. (2005). Propagation models for trust and distrust in social networks. Springer.

  9. Hang, C.-W., Wang, Y., & Singh, M. P. (2009). Operators for propagating trust and their evaluation in social networks. International Foundation for Autonomous Agents and Multiagent Systems.

  10. Villegas, W. A trust based approach for protecting user data in social networks. In CASCON'07 Proceedings of the 2007 conference of the center for advanced studies on Collaborative research.

  11. Kuter, U., & Golbeck, J. (2007). SUNNY: A new algorithm for trust inference in social networks using probabilistic confidence models’. Association for the Advancement of Artificial Intelligence (www.aaai.org).

  12. Liu, G., Wang, Y., Orgun, M. A., & Lim, E.-P. (2013). Finding the optimal social trust path for the selection of trustworthy service providers in complex social networks. IEEE Transactions on Services Computing, 6(2), 152–167.

    Article  Google Scholar 

  13. Yeh, L.-Y., Huang, Y.-L., Joseph, A. D., Shieh, S. W., & Tsaur, W.-J. (2012). A batch-authenticated and key agreement framework for P2P-based online social network. IEEE Transactions on Vehicular Technology, 61(4), 1907–1924.

    Article  Google Scholar 

  14. Van Hieu, D., Wisitpongphan, N., & Meesad, P. Analysis of factors which impact facebook users’ attitudes and behaviours using decision tree techniques. In 11th JCSSE (International Joint Conference in Computer Science and Software Engineering).

  15. Hur, J. (2013). Improving security and efficiency in attribute based data sharing. IEEE Transactions on Knowledge and Data Engineering, 25(10), 2271–2282.

    Article  Google Scholar 

  16. Yu, S., Wang, C., Ren, K., & Lou, W. (2010). Achieving secure, scalable, and fine-grained data access control in cloud computing. In INFOCOM, 2010 Proceedings IEEE. https://doi.org/10.1109/INFCOM.2010.5462174.

  17. Shehab, M., Squicciarini, A., Ahn, G.-J., & Kokkinou, I. (2012). Access control for online social networks third party applications. Computers & Security, 31, 897–911.

    Article  Google Scholar 

  18. Hur, J. (2013). Attribute-based secure data sharing with hidden policies in smart grid. IEEE Transactions on Parallel and Distributed Systems, 24(11), 2171–2180.

    Article  Google Scholar 

  19. Goyal, V., Wang, C., Ren, K., & Lou, W. (2010). Attribute Based Data Sharing with Attribute Revocation. ASIACCS’10, Beijing, China. Copyright 2010 ACM 978-1-60558-936-7, April 13–16, 2010.

  20. Takalkar, V., & Mahalle, P. (2015). Handling data confidentiality attack due to data sharing using trust-based approach in online social networks. International Journal of Engineering Research and Technology 4(5).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vedashree Takalkar.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Takalkar, V., Mahalle, P.N. Trust-Based Access Control in Multi-role Environment of Online Social Networks. Wireless Pers Commun 100, 391–399 (2018). https://doi.org/10.1007/s11277-017-5078-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-5078-2

Keywords

Navigation