Skip to main content
Erschienen in: World Wide Web 6/2019

08.02.2019

A novel trust-based access control for social networks using fuzzy systems

verfasst von: Sadaf Vahabli, Reza Ravanmehr

Erschienen in: World Wide Web | Ausgabe 6/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Social networks are constantly expanding and attracting more and more users. The users of these networks share plenty of information with their friends, many of which are confidential and private. In this regard, maintaining the security and privacy of users is a major requirement in social networks. Although the traditional access control can help users keep their privacy by applying initial access levels, they are not effective for social networks, considering the dynamic nature of them. Therefore, in this paper, a novel trust-based access control approach has been presented for social network using fuzzy system. The proposed method, SNFTrust, is a combination of trust-based access control and fuzzy inference system which consists of three modules: the user module, the fuzzy trust module, and the access control module. In user module, the user request is analyzed to identify the type of relationships, and the property matrix is created based on user’s activity in social network. In fuzzy trust module, two fuzzy systems are combined to calculate the trust score and to specify the access right. Finally, the access control module enables access to the user account. The proposed approach was implemented using the dataset of a real microblog that attracted over 540 million users on the time we accessed the dataset. The results of experiments indicate that the amount of accuracy is 0.96 and the proposed method has the required flexibility, scalability and accuracy, which can be suitable to apply in various social networks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ahmad, A., Whitworth, B.: Access control taxonomy for social networks. 7th International Conference on Information Assurance and Security (IAS), pp. 256–261, (2011) Ahmad, A., Whitworth, B.: Access control taxonomy for social networks. 7th International Conference on Information Assurance and Security (IAS), pp. 256–261, (2011)
2.
Zurück zum Zitat Chen, S., Wang, G., Jia, W.: κ-FuzzyTrust: efficient trust computation for large-scale mobile social networks using a fuzzy implicit social graph. Inf. Sci. 318, 123–143 (2015)MathSciNetCrossRef Chen, S., Wang, G., Jia, W.: κ-FuzzyTrust: efficient trust computation for large-scale mobile social networks using a fuzzy implicit social graph. Inf. Sci. 318, 123–143 (2015)MathSciNetCrossRef
3.
Zurück zum Zitat Cheng, Y., Park, J., Sandhu, R.: Relationship-based access control for online social networks: beyond user-to-user relationships. Privacy, security, risk and trust (PASSAT). International Conference on Social Computing (SocialCom). 646–655 (2012) Cheng, Y., Park, J., Sandhu, R.: Relationship-based access control for online social networks: beyond user-to-user relationships. Privacy, security, risk and trust (PASSAT). International Conference on Social Computing (SocialCom). 646–655 (2012)
4.
Zurück zum Zitat Cheng, X., Fu, S., de Vreede, G.-J.: Understanding trust influencing factors in social media communication: a qualitative study. Int. J. Inf. Manag. 37(2), 25–35 (2017)CrossRef Cheng, X., Fu, S., de Vreede, G.-J.: Understanding trust influencing factors in social media communication: a qualitative study. Int. J. Inf. Manag. 37(2), 25–35 (2017)CrossRef
5.
Zurück zum Zitat Fire, M., Goldschmidt, R., Elovici, Y.: Online social networks: threats and solutions. IEEE Communications Surveys & Tutorials. 16(4), 2019–2036 (2014)CrossRef Fire, M., Goldschmidt, R., Elovici, Y.: Online social networks: threats and solutions. IEEE Communications Surveys & Tutorials. 16(4), 2019–2036 (2014)CrossRef
6.
Zurück zum Zitat Folorunso, O., Mustapha, O.A.: A fuzzy expert system to trust-based access control in crowdsourcing environments. App. Com. Inf. 11(2), 116–129 (2015) Folorunso, O., Mustapha, O.A.: A fuzzy expert system to trust-based access control in crowdsourcing environments. App. Com. Inf. 11(2), 116–129 (2015)
7.
Zurück zum Zitat Hao, F., Min, G., Lin, M., Luo, C., Yang, L.T.: MobiFuzzyTrust: an efficient fuzzy trust inference mechanism in mobile social networks. IEEE Transactions on Parallel and Distributed Systems. 25(11), 2944–2955 (2014)CrossRef Hao, F., Min, G., Lin, M., Luo, C., Yang, L.T.: MobiFuzzyTrust: an efficient fuzzy trust inference mechanism in mobile social networks. IEEE Transactions on Parallel and Distributed Systems. 25(11), 2944–2955 (2014)CrossRef
8.
Zurück zum Zitat Kizza, J.M.: Ethical, Privacy, and Security Issues in the Online Social Network Ecosystems. Ethics in Computing, Springer, pp. 227–253, (2016) Kizza, J.M.: Ethical, Privacy, and Security Issues in the Online Social Network Ecosystems. Ethics in Computing, Springer, pp. 227–253, (2016)
9.
Zurück zum Zitat Lang, B.: Trust degree based access control for social networks. Proceedings of the International Conference on Security and Cryptography (SECRYPT). 1–6 (2010) Lang, B.: Trust degree based access control for social networks. Proceedings of the International Conference on Security and Cryptography (SECRYPT). 1–6 (2010)
10.
Zurück zum Zitat Lee, K.H.: First course on fuzzy theory and applications, Springer Science & Business Media, vol. 27, (2006) Lee, K.H.: First course on fuzzy theory and applications, Springer Science & Business Media, vol. 27, (2006)
11.
Zurück zum Zitat Li, J., Zhang, Z., Zhang, W.: Mobitrust: trust management system in mobile social computing. IEEE 10th International Conference on Computer and Information Technology (CIT), pp.954–959, (2010) Li, J., Zhang, Z., Zhang, W.: Mobitrust: trust management system in mobile social computing. IEEE 10th International Conference on Computer and Information Technology (CIT), pp.954–959, (2010)
12.
Zurück zum Zitat Li, M., Sun, X., Wang, H., Zhang, Y., Zhang, J.: Privacy-aware access control with trust management in web service. World Wide Web. 14(4), 407–430 (2011)CrossRef Li, M., Sun, X., Wang, H., Zhang, Y., Zhang, J.: Privacy-aware access control with trust management in web service. World Wide Web. 14(4), 407–430 (2011)CrossRef
13.
Zurück zum Zitat Liu, G., Liu, Y., Liu, A., Li, Z., Zheng, K., Wang, Y., Zhou, X.: Context-aware trust network extraction in large-scale trust-oriented social networks. World Wide Web. 21(3), 713–738 (2018)CrossRef Liu, G., Liu, Y., Liu, A., Li, Z., Zheng, K., Wang, Y., Zhou, X.: Context-aware trust network extraction in large-scale trust-oriented social networks. World Wide Web. 21(3), 713–738 (2018)CrossRef
14.
Zurück zum Zitat Ma, S., He, J., Shuai, X.: An access control method based on scenario trust. Int. J. of Com. Int. Sys. 5(5), 942–952 (2012)CrossRef Ma, S., He, J., Shuai, X.: An access control method based on scenario trust. Int. J. of Com. Int. Sys. 5(5), 942–952 (2012)CrossRef
15.
Zurück zum Zitat Mahalle, P.N., Thakre, P.A., Prasad, N.R., Prasad, R.: A fuzzy approach to trust based access control in internet of things. 3rd international conference on wireless communications, vehicular technology, Information Theory and Aerospace & Electronic Systems (VITAE), pp. 1–5, (2013) Mahalle, P.N., Thakre, P.A., Prasad, N.R., Prasad, R.: A fuzzy approach to trust based access control in internet of things. 3rd international conference on wireless communications, vehicular technology, Information Theory and Aerospace & Electronic Systems (VITAE), pp. 1–5, (2013)
16.
Zurück zum Zitat Maqsood, T., Khalid, O., Irfan, R., Madani, S.A., Khan, S.U.: Scalability issues in online social networks.ACM Com. Sur. (CSUR) 49(2), No.40, (2016) Maqsood, T., Khalid, O., Irfan, R., Madani, S.A., Khan, S.U.: Scalability issues in online social networks.ACM Com. Sur. (CSUR) 49(2), No.40, (2016)
17.
Zurück zum Zitat Nepal, S., Sherchan, W., Paris, C.: Strust: a trust model for social networks. IEEE 10th international conference on trust, Security and Privacy in Computing and Communications (TrustCom), pp.841–846, (2011) Nepal, S., Sherchan, W., Paris, C.: Strust: a trust model for social networks. IEEE 10th international conference on trust, Security and Privacy in Computing and Communications (TrustCom), pp.841–846, (2011)
19.
Zurück zum Zitat Raad, E., Chbeir, R.: Privacy in online social networks. Security and Privacy Preserving in Social Networks. Springer, pp. 3–45, (2013) Raad, E., Chbeir, R.: Privacy in online social networks. Security and Privacy Preserving in Social Networks. Springer, pp. 3–45, (2013)
20.
Zurück zum Zitat Rathore, N.C., Tripathy, S.: A trust-based collaborative access control model with policy aggregation for online social networks. Soc. Net. Ana. Min. 7(1), 7 (2017)CrossRef Rathore, N.C., Tripathy, S.: A trust-based collaborative access control model with policy aggregation for online social networks. Soc. Net. Ana. Min. 7(1), 7 (2017)CrossRef
21.
Zurück zum Zitat Rathore, S., Sharma, P.K., Loia, V., Jeong, Y.-S., Park, J.H.: Social network security: issues, challenges, threats, and solutions. Inf. Sci. 421, 43–69 (2017)CrossRef Rathore, S., Sharma, P.K., Loia, V., Jeong, Y.-S., Park, J.H.: Social network security: issues, challenges, threats, and solutions. Inf. Sci. 421, 43–69 (2017)CrossRef
22.
Zurück zum Zitat Richthammer, C., Netter, M., Riesner, M., Sänger, J., Pernul, G.: Taxonomy of social network data types. EURASIP J. on Inf. Sec. 11, 1–17 (2014) Richthammer, C., Netter, M., Riesner, M., Sänger, J., Pernul, G.: Taxonomy of social network data types. EURASIP J. on Inf. Sec. 11, 1–17 (2014)
23.
Zurück zum Zitat Ruan, Y., Durresi, A.: A survey of trust management systems for online social communities–trust modeling, trust inference and attacks. Knowl.-Based Syst. 106, 150–163 (2016)CrossRef Ruan, Y., Durresi, A.: A survey of trust management systems for online social communities–trust modeling, trust inference and attacks. Knowl.-Based Syst. 106, 150–163 (2016)CrossRef
24.
Zurück zum Zitat Sayaf, R., Clarke, D.: Access control models for online social networks. Social Network Engineering for Secure Web Data and Services. IGI Global 32–65 (2014) Sayaf, R., Clarke, D.: Access control models for online social networks. Social Network Engineering for Secure Web Data and Services. IGI Global 32–65 (2014)
25.
Zurück zum Zitat Shehab, M., Cheek, G., Touati, H., Squicciarini, A.C., Cheng, P.-C.: Learning based access control in online social networks. Proceedings of the 19th international conference on World wide Web, pp.1179–1180, (2010) Shehab, M., Cheek, G., Touati, H., Squicciarini, A.C., Cheng, P.-C.: Learning based access control in online social networks. Proceedings of the 19th international conference on World wide Web, pp.1179–1180, (2010)
26.
Zurück zum Zitat Shekarpour, S., Katebi, S.: Modeling and evaluation of trust with an extension in semantic web. Web Semant. Sci. Serv. Agents World Wide Web. 8(1), 26–36 (2010)CrossRef Shekarpour, S., Katebi, S.: Modeling and evaluation of trust with an extension in semantic web. Web Semant. Sci. Serv. Agents World Wide Web. 8(1), 26–36 (2010)CrossRef
27.
Zurück zum Zitat Sherchan, W., Nepal, S., Paris, C.: A survey of trust in social networks. ACM Computing Surveys (CSUR). 45(4), 47 (2013)CrossRef Sherchan, W., Nepal, S., Paris, C.: A survey of trust in social networks. ACM Computing Surveys (CSUR). 45(4), 47 (2013)CrossRef
28.
Zurück zum Zitat Singh, S., Sidhu, J.: An approach for determining trustworthiness of individuals in a web-based social network. Arab. J. Sci. Eng. (Springer Science & Business Media BV). 41(2), 461–477 (2016)CrossRef Singh, S., Sidhu, J.: An approach for determining trustworthiness of individuals in a web-based social network. Arab. J. Sci. Eng. (Springer Science & Business Media BV). 41(2), 461–477 (2016)CrossRef
29.
Zurück zum Zitat Stachowiak, A.: Uncertainty-preserving trust prediction in social networks. Social Networks: A Framework of Computational Intelligence, Springer, pp. 99–122, (2014) Stachowiak, A.: Uncertainty-preserving trust prediction in social networks. Social Networks: A Framework of Computational Intelligence, Springer, pp. 99–122, (2014)
30.
Zurück zum Zitat Su, R., Zhang, Y., Fan, J., Wang, Y.: Application of fuzzy neural network in the trust-based access control model. 8th World Congress on Intelligent Control and Automation (WCICA), pp.1273–1276, (2010) Su, R., Zhang, Y., Fan, J., Wang, Y.: Application of fuzzy neural network in the trust-based access control model. 8th World Congress on Intelligent Control and Automation (WCICA), pp.1273–1276, (2010)
31.
Zurück zum Zitat Sun, X., Wang, H., Li, J., Zhang, Y.: Injecting purpose and trust into data anonymisation. Computers & Security. 30(5), 332–345 (2011)CrossRef Sun, X., Wang, H., Li, J., Zhang, Y.: Injecting purpose and trust into data anonymisation. Computers & Security. 30(5), 332–345 (2011)CrossRef
32.
Zurück zum Zitat Takalkar, V., Mahalle, P.N.: Trust-based access control in multi-role environment of online social networks. Wirel. Pers. Commun. 100(2), 391–399 (2018)CrossRef Takalkar, V., Mahalle, P.N.: Trust-based access control in multi-role environment of online social networks. Wirel. Pers. Commun. 100(2), 391–399 (2018)CrossRef
33.
Zurück zum Zitat Wang, H., Cao, J., Zhang, Y.: A flexible payment scheme and its role-based access control. IEEE Trans. Knowl. Data Eng. 17(3), 425–436 (2005)CrossRef Wang, H., Cao, J., Zhang, Y.: A flexible payment scheme and its role-based access control. IEEE Trans. Knowl. Data Eng. 17(3), 425–436 (2005)CrossRef
34.
Zurück zum Zitat Wang, H., Zhang, Y., Cao, J.: Effective collaboration with information sharing in virtual universities. IEEE Trans. Knowl. Data Eng. 21(6), 840–853 (2009)CrossRef Wang, H., Zhang, Y., Cao, J.: Effective collaboration with information sharing in virtual universities. IEEE Trans. Knowl. Data Eng. 21(6), 840–853 (2009)CrossRef
35.
Zurück zum Zitat Wang, Y., Zhai, E., Lua, E.K., Hu, J., Chen, Z.: isac: intimacy based access control for social network sites. In: Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC/ATC), pp. 517–524, (2012) Wang, Y., Zhai, E., Lua, E.K., Hu, J., Chen, Z.: isac: intimacy based access control for social network sites. In: Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC/ATC), pp. 517–524, (2012)
36.
Zurück zum Zitat Yager, R.R., Zadeh, L.A.: An Introduction to Fuzzy Logic Applications in Intelligent Systems. Springer US, (1992) Yager, R.R., Zadeh, L.A.: An Introduction to Fuzzy Logic Applications in Intelligent Systems. Springer US, (1992)
37.
Zurück zum Zitat Yin, G., Jiang, F., Cheng, S., Li, X., He, X.: Autrust: a practical trust measurement for adjacent users in social networks. Second International Conference on Cloud and Green Computing (CGC), pp.360–367, (2012) Yin, G., Jiang, F., Cheng, S., Li, X., He, X.: Autrust: a practical trust measurement for adjacent users in social networks. Second International Conference on Cloud and Green Computing (CGC), pp.360–367, (2012)
38.
Zurück zum Zitat Zhan, J., Fang, X.: A novel trust computing system for social networks. Privacy, security, Risk and Trust (PASSAT) and IEEE Third Inernational Conference on Social Computing (SocialCom), pp. 1284–1289, (2011) Zhan, J., Fang, X.: A novel trust computing system for social networks. Privacy, security, Risk and Trust (PASSAT) and IEEE Third Inernational Conference on Social Computing (SocialCom), pp. 1284–1289, (2011)
39.
Zurück zum Zitat Zhang, J., Tao, X., Wang, H.: Outlier detection from large distributed databases. World Wide Web. 17(4), 539–568 (2014)CrossRef Zhang, J., Tao, X., Wang, H.: Outlier detection from large distributed databases. World Wide Web. 17(4), 539–568 (2014)CrossRef
40.
Zurück zum Zitat Zhao, K., Pan, L.: A machine learning based trust evaluation framework for online social networks. IEEE 13th international conference on trust, Security and Privacy in Computing and Communications (TrustCom), pp. 69–74, (2014) Zhao, K., Pan, L.: A machine learning based trust evaluation framework for online social networks. IEEE 13th international conference on trust, Security and Privacy in Computing and Communications (TrustCom), pp. 69–74, (2014)
41.
Zurück zum Zitat Zhao, B., Xiao, C., Zhang, Y., Zhai, P., Wang, Z.: Assessment of recommendation trust for access control in open networks. Clust. Comput. 1–7 (2018) Zhao, B., Xiao, C., Zhang, Y., Zhai, P., Wang, Z.: Assessment of recommendation trust for access control in open networks. Clust. Comput. 1–7 (2018)
Metadaten
Titel
A novel trust-based access control for social networks using fuzzy systems
verfasst von
Sadaf Vahabli
Reza Ravanmehr
Publikationsdatum
08.02.2019
Verlag
Springer US
Erschienen in
World Wide Web / Ausgabe 6/2019
Print ISSN: 1386-145X
Elektronische ISSN: 1573-1413
DOI
https://doi.org/10.1007/s11280-019-00668-y

Weitere Artikel der Ausgabe 6/2019

World Wide Web 6/2019 Zur Ausgabe