Automated and Dynamic Access Control Management in OSN

被引:0
|
作者
Abid, Sohail [1 ]
Daud, Imran [1 ]
机构
[1] Fdn Univ Islamabad, CS Dept, Rawalpindi Campus, Rawalpindi, Pakistan
关键词
OSNs; Social Network; Access Control; Security; Privacy; Dynamic; BLOCKCHAIN; FRAMEWORK; INTERNET; MODEL;
D O I
10.1109/ICIC53490.2021.9693032
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Online social networks (OSNs) are a platform that is used to share digital resources and to communicate with friends through messages in the OSN environment. The sharing of resources requires proper access control management to limit access as per the requirements of the users. Therefore, the privacy concerns in OSN have gained more attention in recent years. Existing solutions provided by the OSNs are to group the friends in static contact lists (e.g., friends, close friends, etc.). However, the contact lists may contain some irrelevant users, therefore, fine-grained access control management is required in these mechanisms. Moreover, in the existing systems, the predefined policies are implemented on a set of users that also include a group of users that may be irrelevant to the resource. In OSNs, privacy settings are managed by the users. However, due to the users' lack of technical knowledge, they are unable to set privacy settings. To palliate these limitations, we propose an automated and dynamic access control management (AD-ACM) to enhance the privacy of text-based resources in OSNs.
引用
收藏
页码:348 / 353
页数:6
相关论文
共 50 条
  • [31] A novel key management scheme for dynamic access control in a. user hierarchy
    Chen, TS
    Huang, JY
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 162 (01) : 339 - 351
  • [32] LHSC: An Effective Dynamic Key Management Scheme for Linear Hierarchical Access Control
    Odelu, Vanga
    Das, Ashok Kumar
    Goswami, Adrijit
    2013 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS (COMSNETS), 2013,
  • [33] An access control scheme with dynamic user management and cloud-aided decryption
    Shi, Jiaoli
    Huang, Chuanhe
    Wang, Jing
    He, Kai
    Shen, Xieyang
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5659 - 5672
  • [34] Towards automated negotiation of access control policies
    Bharadwaj, VG
    Baras, JS
    IEEE 4TH INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2003, : 111 - 119
  • [35] A framework for automated negotiation of access control policies
    Bharadwaj, VG
    Baras, JS
    DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL II, PROCEEDINGS, 2003, : 216 - 221
  • [36] Automated IT Audit of Windows Server Access Control
    Pongsrisomchai, Sutthinee
    Ngamsuriyaroj, Sudsanguan
    2019 21ST INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ICT FOR 4TH INDUSTRIAL REVOLUTION, 2019, : 539 - 544
  • [37] Access Control Management for Cloud
    Habiba, Mansura
    Islam, Md. Rafiqul
    Ali, A. B. M. Shawkat
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 485 - 492
  • [38] Integrated access control management
    Karjoth, G
    BRINGING TELECOMMUNICATION SERVICES TO THE PEOPLE - IS&N '95, 1995, 998 : 64 - 74
  • [39] Towards Automated Policy Generation for Dynamic Access Control in the Internet of Things Emergent Research Forum (ERF)
    Ragothaman, Kaushik
    Wang, Yong
    Vuggumudi, Srinivasulu
    DIGITAL INNOVATION AND ENTREPRENEURSHIP (AMCIS 2021), 2021,
  • [40] Corporate access control management
    Herwig, V
    Schlabitz, L
    WIRTSCHAFTSINFORMATIK, 2004, 46 (04): : 289 - 294