ABSTRACT
Online Social Networks hold vast amounts of readily accessible personal information leaving them particularly vulnerable to privacy breach attacks [6]. With the impact these breaches varying from simply embarrassing the user, to negatively influencing the decision of potential employers, identity theft and even physical harm it is important that they are addressed. In this research we approach privacy management in OSNs as an access control problem. We propose a formal Attribute-Based Access Control (ABAC) language; SocACL. SocACL is based on Answer Set Programming (ASP) and allows for policy specification using the most abundant sources of information available in OSNs; user attributes and relationships. This paper outlines SocACL's core concepts, features, syntax and semantics.
- C. Baral. Knowledge Representation, Reasoning and Declartive Problem Solving. Cambridge University Press, 1st edition, 2010. Google ScholarDigital Library
- J. Crampton and C. Morisset. PTaCL: A Language for Attribute-Based Access Control in Open Systems. Lecture Notes in Computer Science, 7215 LNCS: 390--409, 2012. Google ScholarDigital Library
- I. B. Dhia. Access control in social networks: a reachability-based approach. In Proc. of the 2012 Joint EDBT/ICDT Workshops, EDBT-ICDT '12, pages 227--232, New York, NY, USA, 2012. ACM. Google ScholarDigital Library
- W. Faber, G. Pfeifer, N. Leone, T. Dell'Armi, and G. Ielpa. Design and implementation of aggregate functions in the DLV system. Theory and Practice of Logic Programming, 8: 545--580, 10 2008. Google ScholarDigital Library
- P. W. Fong. Relationship-based access control: protection model and policy language. In Proc. of the 1st ACM Conf. on Data and Application Sec. and Pri., CODASPY '11, pages 191--202, New York, NY, USA, 2011. ACM. Google ScholarDigital Library
- H. Gao, J. Hu, T. Huang, J. Wang, and Y. Chen. Security Issues in Online Social Networks. Internet Computing, IEEE, 15(4): 56--63, July-Aug. 2011. Google ScholarDigital Library
- H. Hu, G. Ahn, and J. Jorgensen. Multiparty access control for online social networks: Model and mechanisms. Knowledge and Data Engineering, IEEE Trans. on, 25(7): 1614--1627, 2013. Google ScholarDigital Library
- H. R. Lipford, A. Besmer, and J. Watson. Understanding Privacy Settings in Facebook with an Audience View. In Proc. of the 1st Conf. on Usability, Psychology, and Sec., UPSEC'08, pages 2:1--2:8, Berkeley, CA, USA, 2008. USENIX Association. Google ScholarDigital Library
- M. Madejski, M. Johnson, and S. Bellovin. A Study of Privacy Settings Errors in an Online Social Network. In Proc. of Pervasive Computing and Comm. Workshops (PERCOM Workshops), 2012 IEEE Int. Conf. on, pages 340--345, March 2012.Google ScholarCross Ref
- E. Yuan and J. Tong. Attributed based access control (ABAC) for web services. In Web Services, 2005. ICWS 2005. Proc. 2005 IEEE Int. Conf. on. IEEE, 2005. Google ScholarDigital Library
Index Terms
- Social access control language (SocACL)
Recommendations
SocACL: An ASP-Based Access Control Language for Online Social Networks
CMS 2013: 14th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security - Volume 8099Online Social Networks OSNs, such as Facebook, encourage their users to disclose significant amounts of personal information to facilitate connecting and sharing content with other users. This has resulted in some OSNs holding vast amounts of ...
Patterns for session-based access control
PLoP '06: Proceedings of the 2006 conference on Pattern languages of programsThe concept of session, the context under which a user accesses resources is very important to apply access control. We present first the Controlled Access Session pattern for describing how sessions can limit the rights of a user. We then combine this ...
A card requirements language enabling privacy-preserving access control
SACMAT '10: Proceedings of the 15th ACM symposium on Access control models and technologiesWe address the problem of privacy-preserving access control in distributed systems. Users commonly reveal more personal data than strictly necessary to be granted access to online resources, even though existing technologies, such as anonymous ...
Comments