Reference Hub13
A Decentralized Security Framework for Web-Based Social Networks

A Decentralized Security Framework for Web-Based Social Networks

Barbara Carminati, Elena Ferrari, Andrea Perego
Copyright: © 2008 |Volume: 2 |Issue: 4 |Pages: 32
ISSN: 1930-1650|EISSN: 1930-1669|ISSN: 1930-1650|EISBN13: 9781615203246|EISSN: 1930-1669|DOI: 10.4018/jisp.2008100102
Cite Article Cite Article

MLA

Carminati, Barbara, et al. "A Decentralized Security Framework for Web-Based Social Networks." IJISP vol.2, no.4 2008: pp.22-53. http://doi.org/10.4018/jisp.2008100102

APA

Carminati, B., Ferrari, E., & Perego, A. (2008). A Decentralized Security Framework for Web-Based Social Networks. International Journal of Information Security and Privacy (IJISP), 2(4), 22-53. http://doi.org/10.4018/jisp.2008100102

Chicago

Carminati, Barbara, Elena Ferrari, and Andrea Perego. "A Decentralized Security Framework for Web-Based Social Networks," International Journal of Information Security and Privacy (IJISP) 2, no.4: 22-53. http://doi.org/10.4018/jisp.2008100102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The wide diffusion and usage of social networking Web sites in the last years have made publicly available a huge amount of possible sensitive information, which can be used by third-parties with purposes different from the ones of the owners of such information. Currently, this issue has been addressed by enforcing into Web-based Social Networks (WBSNs) very simple protection mechanisms, or by using anonymization techniques, thanks to which it is possible to hide the identity of WBSN members while performing analysis on social network data. However, we believe that further solutions are needed, to allow WBSN members themselves to decide who can access their personal information and resources. To cope with this issue, in this article we illustrate a decentralized security framework for WBSNs, which provide both access control and privacy protection mechanisms. In our system, WBSN members can denote who is authorized to access the resources they publish and the relationships they participate in, in terms of the type, depth, and trust level of the relationships existing between members of a WBSN. Cryptographic techniques are then used to provide a controlled sharing of resources while preserving relationship privacy.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.