您的位置:山东大学 -> 科技期刊社 -> 《山东大学学报(理学版)》

山东大学学报(理学版) ›› 2016, Vol. 51 ›› Issue (7): 90-97.doi: 10.6040/j.issn.1671-9352.2.2015.350

• • 上一篇    下一篇

在线社会网络中基于关系强度的访问控制机制

蔡红云1,2,马晓雪3   

  1. 1. 河北大学计算机科学与技术学院, 河北 保定 071000;2.燕山大学信息科学与工程学院, 河北 秦皇岛 066004;3.河北大学计算机教学部, 河北 保定 071000
  • 收稿日期:2015-08-01 出版日期:2016-07-20 发布日期:2016-07-27
  • 作者简介:蔡红云(1980— ),女,博士研究生,副教授,研究方向为信息安全、推荐系统、用户行为分析.E-mail:chy-hbu@126.com
  • 基金资助:
    国家自然科学基金资助项目(61170254);河北省自然科学青年基金资助项目(F2014201165);河北省高等学校科学技术研究项目(ZD2016043);河北省自然科学基金项目(F2014201099)

Access control based on relationship strength for online social network

CAI Hong-yun1, 2, MA Xiao-xue3   

  1. 1. School of Computer Science and Technology, Hebei University, Baoding 071000, Hebei, China;
    2. School of Information Science and Engineering, Yanshan University, Qinhuangdao 066004, Hebei, China;
    3. Computer Teaching Department, Hebei University, Baoding 071000, Hebei, China
  • Received:2015-08-01 Online:2016-07-20 Published:2016-07-27

摘要: 访问控制是实现OSN隐私保护的有效方法之一,针对已有基于关系的访问控制中存在的控制粒度粗、不够灵活等问题,提出OSN访问控制下的关系度量机制,利用用户间关系强弱进一步区分关系(群组)中不同用户的访问权限。基于OSN用户交互特点,由交互行为分析用户关注度,利用用户关注度相对因子、交互强度、关系强度时间衰减性综合产生用户间关系强度。实验结果证明了所提关系强度度量方法的可行性和有效性。

关键词: 在线社会网络, 访问控制, 关系强度, 隐私保护

Abstract: Access control is one of the effective methods to protect the privacy of people in OSN. However, there are some problems in the relationship-based access control scheme, such as the coarse-grained and inflexibility. So evaluating the relationship strength between users is introduced in relationship-based access control, users access can be authorized according to relationship strength. Based on the characteristics of users interaction in OSN, the users attention is acquired by analyzing interaction behavior between users, and then a new evaluation model for relationship strength is constructed by considering the following features: attention factor, interaction strength and time decay. Experimental results show that the proposed method is feasible and effective.

Key words: privacy protection, relationship strength, access control, online social network

中图分类号: 

  • TP309
[1] 刘娜. 基于关系的线上社交网络访问控制模型研究[D].重庆: 重庆大学,2014. LIU Na. Research on access control model of online social network based on relationship [D]. Chongqing: Chongqing University, 2014.
[2] GROSS R, ACQUISTI A. Information revelation and privacy in online social networks[C] //Proceedings of ACM Workshop on Privacy in the Electronic Society. New York: ACM, 2005:71-80.
[3] LI Yan, LI Yingjiu, YAN Qiang, et al.Privacy leakage analysis in online social networks[J].Computers and Security, 2015, 49:239-254.
[4] GATES C E. Access control requirements for Web 2.0 security and privacy[C] // Proceedings of Workshop on Web 2.0 Security and Privacy. Oakland: IEEE, 2007: 249-256.
[5] CARMINATI B, FERRARI E, HEATHERLY R. Semantic web-based social network access control[J]. Computers and Security, 2011, 30(2-3):108-115.
[6] FONG P W L, ANWAR M, ZHZO Z. A privacy preservation model for Facebook-Style social network systems[C] //Proceedings of European Conference on Research in Computer Security. Berlin: Springer-Verlag, 2009, 5789:303-320.
[7] FONG P W L. Relationship-based access control: protection model and policy language[C] //Proceedings of the 1st ACM Conference on Data and Application Security and Privacy. New York: ACM, 2011:191-202.
[8] BRUNS G, FONG PWL, SIAHAAN I, et al. Relationship-based accesscontrol: its expression and enforcement through hybrid logic[C] //Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy. New York: ACM, 2012:117-124.
[9] HU H, AHN G J. Multiparty authorization framework for data sharing in online social networks[J]. Data and Applications Security and Privacy XXV-ifip, 2011, 6818:29-43.
[10] YUAN Cheng, PARK J, SANDHU R. Relationship-based access control for online social networks: beyond user-to-user relationships[C] //Proceedings of the International Conference on Privacy, Security Risk and Trust. Los Alamitos: IEEE Computer Society, 2012:646-655.
[11] 王媛, 孙宇清, 马乐乐. 面向社会网络的个性化隐私策略定义与实施[J]. 通信学报, 2012, 33(Z1): 239-249. WANG Yuan, SUN Yuqing, MA Lele. The definition and implementation of personalized privacy policy for social networks[J]. Journal of Communication, 2012, 33(Z1):239-249.
[12] PANG Jun, ZHANG Yang. A new access control scheme for Facebook-style social networks[J].Computer and Security, 2015, 54:1-16.
[13] BAEK S, KIM S. Trust-based access control model from sociological approach in dynamic online social network environment[J].Scientific World Journal, 2014: 936319.1-8.
[14] ZHAO X, YUAN J, LI G, et al. Relationship strength estimation for online social networks with the study on Facebook[J].Neurocomputing, 2012, 95(14):89-97.
[15] ADALI S, ESCRIVA R, GOLDBERG M K, et al.Measuring behavioral trust in social networks[C] //Proceedings of the IEEE International Conference on Intelligence and Security Informatics. Piscataway: IEEE, 2010:150-152.
[16] 孟宪佳, 马建峰,卢笛,等.在社交网络中综合的信任评估模型[J].通信学报,2014,35(12):136-143. MENG Xianjia, MA Jianfeng, LU Di, et al. Integrated trust evaluation model in social networks[J]. Journal of Communication, 2014, 35(12):136-143.
[1] 李艳平,齐艳姣,张凯,魏旭光. 支持用户撤销的多授权机构的属性加密方案[J]. 山东大学学报(理学版), 2018, 53(7): 75-84.
[2] 康海燕,黄渝轩,陈楚翘. 基于视频分析的地理信息隐私保护方法[J]. 山东大学学报(理学版), 2018, 53(1): 19-29.
[3] 毕晓迪,梁英,史红周,田辉. 一种基于隐私偏好的二次匿名位置隐私保护方法[J]. 山东大学学报(理学版), 2017, 52(5): 75-84.
[4] 康海燕,马跃雷. 差分隐私保护在数据挖掘中应用综述[J]. 山东大学学报(理学版), 2017, 52(3): 16-23.
[5] 柳欣,徐秋亮,张波. 满足可控关联性的合作群签名方案[J]. 山东大学学报(理学版), 2016, 51(9): 18-35.
[6] 李宇溪,王恺璇,林慕清,周福才. 基于匿名广播加密的P2P社交网络隐私保护系统[J]. 山东大学学报(理学版), 2016, 51(9): 84-91.
[7] 查明明,王伟. FlowMonitor: Android隐私数据流向监控防护系统[J]. 山东大学学报(理学版), 2016, 51(9): 59-67.
[8] 唐乾,杨飞,黄琪,林果园. 基于TCB子集的访问控制信息安全传递模型[J]. 山东大学学报(理学版), 2016, 51(7): 98-106.
[9] 赵斌,何泾沙,张伊璇. 基于信息熵隶属度的决策属性权重确定方法[J]. 山东大学学报(理学版), 2016, 51(3): 86-90.
[10] 吕盟, 刘哲, 刘建伟. 企业级无线局域网可信域间访问控制方案[J]. 山东大学学报(理学版), 2014, 49(11): 82-88.
[11] 蔡红云, 田俊峰. 云计算中的数据隐私保护研究[J]. 山东大学学报(理学版), 2014, 49(09): 83-89.
[12] 杨晓晖, 王虹, 江丽军, 常思远. 一种基于信任度量的Web服务跨域访问控制模型[J]. 山东大学学报(理学版), 2014, 49(09): 115-122.
[13] 杨松涛, 马春光, 周长利, 张宗利. 一种地理围栏服务中的LBS隐私保护方法[J]. 山东大学学报(理学版), 2014, 49(09): 69-73.
[14] 邹德清, 杨凯, 张晓旭, 苑博阳, 冯明路. 虚拟域内访问控制系统的保护机制研究[J]. 山东大学学报(理学版), 2014, 49(09): 135-141.
[15] 康海燕, 杨孔雨, 陈建明. 于K-匿名的个性化隐私保护方法研究[J]. 山东大学学报(理学版), 2014, 49(09): 142-149.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!