skip to main content
10.1145/3589608.3593833acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
research-article

Data Sharing in Social Networks

Published: 24 May 2023 Publication History

Abstract

In the context of multi-user cooperative systems and, in particular, in social networks, personal data is uploaded to user profiles and shared with other users. These data are often jointly owned and associated with different degrees of sensitivity according to the users. Controlling access to such multi-owner data, under the authority of different users, is challenging. Traditional access control policies are not expressive enough to determine whether a data disclosure meets the privacy expectations of the different involved parties. In this work, we propose a fine-grained access control model for multi-user cooperative systems and apply it to the context of social networks. We consider compound objects and extend attribute-based access control with provenance information to specify additional access control constraints. We also present a prototype implementation and provide an experimental evaluation to demonstrate the feasibility of the proposed model.

Supplemental Material

MP4 File
We propose an extension of attribute-based access control with provenance information to specify additional access control constraints.

References

[1]
Gail-Joon Ahn, Jing Jin, and Mohamed Shehab. 2012. Policy-Driven Role-Based Access Management for Ad-Hoc Collaboration. J. Comput. Secur., Vol. 20, 2-3 (mar 2012), 223--257.
[2]
Evangelos Aktoudianakis, Jason Crampton, Steve Schneider, Helen Treharne, and Adrian Waller. 2013. Policy templates for relationship-based access control. In Annual Conference on Privacy, Security and Trust. IEEE, 221--228.
[3]
Chahal Arora, Syed Zain R. Rizvi, and Philip W.L. Fong. 2022. Higher-Order Relationship-Based Access Control: A Temporal Instantiation with IoT Applications. In Symposium on Access Control Models and Technologies (SACMAT '22). ACM, New York, NY, USA, 223--234.
[4]
Leila Bahri, Barbara Carminati, and Elena Ferrari. 2015. CARDS - Collaborative Audit and Report Data Sharing for A-Posteriori Access Control in DOSNs. In Conference on Collaboration and Internet Computing (CIC). IEEE, 36--45.
[5]
Vitaliano Barberio, Ines Kuric, Markus Höllerer, Edoardo Mollona, and Luca Pareschi. 2017. PERCEIVE project - Deliverable D3.3 "Descriptive report on the specific role of new media in EU financed projects' communication strategies". Technical Report. http://amsacta.unibo.it/5763/
[6]
Clara Bertolissi, Jerry Hartog, and Nicola Zannone. 2019. Using Provenance for Secure Data Fusion in Cooperative Systems. In Symposium on Access Control Models and Technologies. ACM, 185--194.
[7]
Clara Bertolissi, Alba Martinez Anton, Romain Testud, and Nicola Zannone. 2022. Towards secure content sharing in social networks. In International Conference on Cyber-Technologies and Cyber-Systems.
[8]
Glenn Bruns, Philip W.L. Fong, Ida Siahaan, and Michael Huth. 2012. Relationship-Based Access Control: Its Expression and Enforcement through Hybrid Logic. In Proceedings of the Second ACM Conference on Data and Application Security and Privacy (CODASPY '12). ACM, New York, NY, USA, 117--124.
[9]
Barbara Carminati, Elena Ferrari, and Andrea Perego. 2009. Enforcing Access Control in Web-Based Social Networks. ACM Trans. Inf. Syst. Secur., Vol. 13, 1, Article 6 (2009), bibinfonumpages38 pages.
[10]
Stanley Clark, Nikolay Yakovets, George Fletcher, and Nicola Zannone. 2022. ReLOG: A Unified Framework for Relationship-Based Access Control over Graph Databases. In Data and Applications Security and Privacy XXXVI (LNCS, Vol. 13383). Springer, 303--315.
[11]
Jason Crampton and James Sellwood. 2014. Path Conditions and Principal Matching: A New Approach to Access Control. In Symposium on Access Control Models and Technologies (SACMAT '14). ACM, New York, NY, USA, 187--198.
[12]
Stan Damen, Jerry den Hartog, and Nicola Zannone. 2014. CollAC: Collaborative access control. In International Conference on Collaboration Technologies and Systems. IEEE, 142--149.
[13]
Stan Damen and Nicola Zannone. 2014. Privacy Implications of Privacy Settings and Tagging in Facebook. In Secure Data Management. Springer, 121--138.
[14]
Philip W.L. Fong. 2011. Relationship-Based Access Control: Protection Model and Policy Language. In Conference on Data and Application Security and Privacy (CODASPY '11). ACM, New York, NY, USA, 191--202.
[15]
Philip W.L. Fong, Pooya Mehregan, and Ram Krishnan. 2013. Relational Abstraction in Community-Based Secure Collaboration. In SIGSAC Conference on Computer & Communications Security. ACM, New York, NY, USA, 585--598.
[16]
Philip W. L. Fong, Mohd Anwar, and Zhen Zhao. 2009. A Privacy Preservation Model for Facebook-Style Social Network Systems. In Computer Security. Springer, Berlin, Heidelberg, 303--320.
[17]
Hongyu Gao, Jun Hu, Tuo Huang, Jingnan Wang, and Yan Chen. 2011. Security Issues in Online Social Networks. IEEE Internet Computing, Vol. 15, 4 (2011), 56--63.
[18]
Carrie Gates. 2007. Access Control Requirements for Web 2.0 Security and Privacy. In IEEE Web 2.0 Privacy and Security Workshop.
[19]
Hongxin Hu, Gail-Joon Ahn, and Jan Jorgensen. 2013. Multiparty Access Control for Online Social Networks: Model and Mechanisms. IEEE Transactions on Knowledge and Data Engineering, Vol. 25, 7 (2013), 1614--1627.
[20]
Panagiotis Ilia, Barbara Carminati, Elena Ferrari, Paraskevi Fragopoulou, and Sotiris Ioannidis. 2017. SAMPAC: Socially-Aware Collaborative Multi-Party Access Control. In Conference on Data and Application Security and Privacy (CODASPY '17). ACM, New York, NY, USA, 71--82.
[21]
Ankit Kumar Jain, Somya Ranjan Sahoo, and Jyoti Kaubiyal. 2021. Online social networks security and privacy: comprehensive review and analysis. Complex & Intelligent Systems, Vol. 7, 5 (2021), 2157--2177.
[22]
Samuel Paul Kaluvuri, Alexandru Ionut Egner, Jerry den Hartog, and Nicola Zannone. 2015. SAFAX - An Extensible Authorization Service for Cloud Environments. Frontiers ICT, Vol. 2 (2015), 9. https://doi.org/10.3389/fict.2015.00009
[23]
Ninghui Li, J. Mitchell, and W. Winsborough. 2002. Design of a role-based trust-management framework. In Symposium on Security and Privacy. IEEE, 114--130.
[24]
Rauf Mahmudlu, Jerry Hartog, and Nicola Zannone. 2016. Data Governance and Transparency for Collaborative Systems. In Data and Applications Security and Privacy XXX (LNCS, Vol. 9766). Springer, Cham, 199--216.
[25]
Pooya Mehregan and Philip W.L. Fong. 2016. Policy Negotiation for Co-Owned Resources in Relationship-Based Access Control. In Symposium on Access Control Models and Technologies (SACMAT '16). ACM, New York, NY, USA, 125--136.
[26]
Luc Moreau, Ben Clifford, Juliana Freire, Joe Futrelle, Yolanda Gil, Paul Groth, Natalia Kwasnikowska, Simon Miles, Paolo Missier, Jim Myers, Beth Plale, Yogesh Simmhan, Eric Stephan, and Jan Van den Bussche. 2011. The Open Provenance Model core specification (v1.1). Future Generation Computer Systems, Vol. 27, 6 (2011), 743--756.
[27]
Dang Nguyen, Jaehong Park, and Ravi Sandhu. 2013. A provenance-based access control model for dynamic separation of duties. In Annual Conference on Privacy, Security and Trust. IEEE, 247--256.
[28]
OASIS. 2013. eXtensible Access Control Markup Language (XACML) Version 3.0. OASIS Standard.
[29]
Federica Paci, Anna Cinzia Squicciarini, and Nicola Zannone. 2018. Survey on Access Control for Community-Centered Collaborative Systems. ACM Comput. Surv., Vol. 51, 1 (2018), 6:1--6:38.
[30]
Jaehong Park, Dang Nguyen, and Ravi Sandhu. 2012. A provenance-based access control model. In Annual International Conference on Privacy, Security and Trust. IEEE, 137--144.
[31]
Sarah Rajtmajer, Anna Squicciarini, Christopher Griffin, Sushama Karumanchi, and Alpana Tyagi. 2016. Constrained Social-Energy Minimization for Multi-Party Sharing in Online Social Networks. In International Conference on Autonomous Agents & Multiagent Systems (AAMAS '16). International Foundation for Autonomous Agents and Multiagent Systems, Richland, SC, 680--688.
[32]
Anna Squicciarini, Federica Paci, and Smitha Sundareswaran. 2014. Prima: A Comprehensive Approach to Privacy Protection in Social Network Sites. Special Issue of Annals of Telecommunications on Privacy-aware electronic society, Vol. 69 (2014).
[33]
Anna Cinzia Squicciarini, Sarah Michele Rajtmajer, and Nicola Zannone. 2018. Multi-Party Access Control: Requirements, State of the Art and Open Challenges. In Symposium on Access Control Models and Technologies. ACM, 49.
[34]
Daniel Trivellato, Nicola Zannone, and Sandro Etalle. 2014. GEM: A distributed goal evaluation algorithm for trust management. Theory and Practice of Logic Programming, Vol. 14, 3 (2014), 293--337. https://doi.org/10.1017/S1471068412000397
[35]
Nishant Vishwamitra, Yifang Li, Kevin Wang, Hongxin Hu, Kelly Caine, and Gail-Joon Ahn. 2017. Towards PII-Based Multiparty Access Control for Photo Sharing in Online Social Networks. In Symposium on Access Control Models and Technologies (SACMAT '17 Abstracts). ACMK, New York, NY, USA, 155--166.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SACMAT '23: Proceedings of the 28th ACM Symposium on Access Control Models and Technologies
May 2023
218 pages
ISBN:9798400701733
DOI:10.1145/3589608
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 24 May 2023

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. abac
  2. data sharing
  3. provenance
  4. social networks

Qualifiers

  • Research-article

Data Availability

We propose an extension of attribute-based access control with provenance information to specify additional access control constraints. https://dl.acm.org/doi/10.1145/3589608.3593833#sacmat23_sacmat20.mp4

Funding Sources

  • Excellence Initiative of Aix-Marseille - A*MIDEX

Conference

SACMAT '23
Sponsor:

Acceptance Rates

Overall Acceptance Rate 177 of 597 submissions, 30%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 122
    Total Downloads
  • Downloads (Last 12 months)33
  • Downloads (Last 6 weeks)5
Reflects downloads up to 20 Jan 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media