山东大学学报(理学版) ›› 2016, Vol. 51 ›› Issue (7): 90-97.doi: 10.6040/j.issn.1671-9352.2.2015.350
蔡红云1,2,马晓雪3
CAI Hong-yun1, 2, MA Xiao-xue3
摘要: 访问控制是实现OSN隐私保护的有效方法之一,针对已有基于关系的访问控制中存在的控制粒度粗、不够灵活等问题,提出OSN访问控制下的关系度量机制,利用用户间关系强弱进一步区分关系(群组)中不同用户的访问权限。基于OSN用户交互特点,由交互行为分析用户关注度,利用用户关注度相对因子、交互强度、关系强度时间衰减性综合产生用户间关系强度。实验结果证明了所提关系强度度量方法的可行性和有效性。
中图分类号:
[1] 刘娜. 基于关系的线上社交网络访问控制模型研究[D].重庆: 重庆大学,2014. LIU Na. Research on access control model of online social network based on relationship [D]. Chongqing: Chongqing University, 2014. [2] GROSS R, ACQUISTI A. Information revelation and privacy in online social networks[C] //Proceedings of ACM Workshop on Privacy in the Electronic Society. New York: ACM, 2005:71-80. [3] LI Yan, LI Yingjiu, YAN Qiang, et al.Privacy leakage analysis in online social networks[J].Computers and Security, 2015, 49:239-254. [4] GATES C E. Access control requirements for Web 2.0 security and privacy[C] // Proceedings of Workshop on Web 2.0 Security and Privacy. Oakland: IEEE, 2007: 249-256. [5] CARMINATI B, FERRARI E, HEATHERLY R. Semantic web-based social network access control[J]. Computers and Security, 2011, 30(2-3):108-115. [6] FONG P W L, ANWAR M, ZHZO Z. A privacy preservation model for Facebook-Style social network systems[C] //Proceedings of European Conference on Research in Computer Security. Berlin: Springer-Verlag, 2009, 5789:303-320. [7] FONG P W L. Relationship-based access control: protection model and policy language[C] //Proceedings of the 1st ACM Conference on Data and Application Security and Privacy. New York: ACM, 2011:191-202. [8] BRUNS G, FONG PWL, SIAHAAN I, et al. Relationship-based accesscontrol: its expression and enforcement through hybrid logic[C] //Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy. New York: ACM, 2012:117-124. [9] HU H, AHN G J. Multiparty authorization framework for data sharing in online social networks[J]. Data and Applications Security and Privacy XXV-ifip, 2011, 6818:29-43. [10] YUAN Cheng, PARK J, SANDHU R. Relationship-based access control for online social networks: beyond user-to-user relationships[C] //Proceedings of the International Conference on Privacy, Security Risk and Trust. Los Alamitos: IEEE Computer Society, 2012:646-655. [11] 王媛, 孙宇清, 马乐乐. 面向社会网络的个性化隐私策略定义与实施[J]. 通信学报, 2012, 33(Z1): 239-249. WANG Yuan, SUN Yuqing, MA Lele. The definition and implementation of personalized privacy policy for social networks[J]. Journal of Communication, 2012, 33(Z1):239-249. [12] PANG Jun, ZHANG Yang. A new access control scheme for Facebook-style social networks[J].Computer and Security, 2015, 54:1-16. [13] BAEK S, KIM S. Trust-based access control model from sociological approach in dynamic online social network environment[J].Scientific World Journal, 2014: 936319.1-8. [14] ZHAO X, YUAN J, LI G, et al. Relationship strength estimation for online social networks with the study on Facebook[J].Neurocomputing, 2012, 95(14):89-97. [15] ADALI S, ESCRIVA R, GOLDBERG M K, et al.Measuring behavioral trust in social networks[C] //Proceedings of the IEEE International Conference on Intelligence and Security Informatics. Piscataway: IEEE, 2010:150-152. [16] 孟宪佳, 马建峰,卢笛,等.在社交网络中综合的信任评估模型[J].通信学报,2014,35(12):136-143. MENG Xianjia, MA Jianfeng, LU Di, et al. Integrated trust evaluation model in social networks[J]. Journal of Communication, 2014, 35(12):136-143. |
[1] | 李艳平,齐艳姣,张凯,魏旭光. 支持用户撤销的多授权机构的属性加密方案[J]. 山东大学学报(理学版), 2018, 53(7): 75-84. |
[2] | 康海燕,黄渝轩,陈楚翘. 基于视频分析的地理信息隐私保护方法[J]. 山东大学学报(理学版), 2018, 53(1): 19-29. |
[3] | 毕晓迪,梁英,史红周,田辉. 一种基于隐私偏好的二次匿名位置隐私保护方法[J]. 山东大学学报(理学版), 2017, 52(5): 75-84. |
[4] | 康海燕,马跃雷. 差分隐私保护在数据挖掘中应用综述[J]. 山东大学学报(理学版), 2017, 52(3): 16-23. |
[5] | 柳欣,徐秋亮,张波. 满足可控关联性的合作群签名方案[J]. 山东大学学报(理学版), 2016, 51(9): 18-35. |
[6] | 李宇溪,王恺璇,林慕清,周福才. 基于匿名广播加密的P2P社交网络隐私保护系统[J]. 山东大学学报(理学版), 2016, 51(9): 84-91. |
[7] | 查明明,王伟. FlowMonitor: Android隐私数据流向监控防护系统[J]. 山东大学学报(理学版), 2016, 51(9): 59-67. |
[8] | 唐乾,杨飞,黄琪,林果园. 基于TCB子集的访问控制信息安全传递模型[J]. 山东大学学报(理学版), 2016, 51(7): 98-106. |
[9] | 赵斌,何泾沙,张伊璇. 基于信息熵隶属度的决策属性权重确定方法[J]. 山东大学学报(理学版), 2016, 51(3): 86-90. |
[10] | 吕盟, 刘哲, 刘建伟. 企业级无线局域网可信域间访问控制方案[J]. 山东大学学报(理学版), 2014, 49(11): 82-88. |
[11] | 蔡红云, 田俊峰. 云计算中的数据隐私保护研究[J]. 山东大学学报(理学版), 2014, 49(09): 83-89. |
[12] | 杨晓晖, 王虹, 江丽军, 常思远. 一种基于信任度量的Web服务跨域访问控制模型[J]. 山东大学学报(理学版), 2014, 49(09): 115-122. |
[13] | 杨松涛, 马春光, 周长利, 张宗利. 一种地理围栏服务中的LBS隐私保护方法[J]. 山东大学学报(理学版), 2014, 49(09): 69-73. |
[14] | 邹德清, 杨凯, 张晓旭, 苑博阳, 冯明路. 虚拟域内访问控制系统的保护机制研究[J]. 山东大学学报(理学版), 2014, 49(09): 135-141. |
[15] | 康海燕, 杨孔雨, 陈建明. 基于K-匿名的个性化隐私保护方法研究[J]. 山东大学学报(理学版), 2014, 49(09): 142-149. |
|