Skip to main content

2011 | OriginalPaper | Buchkapitel

Efficient Access Control in Multimedia Social Networks

verfasst von : Amit Sachan, Sabu Emmanuel

Erschienen in: Social Media Modeling and Computing

Verlag: Springer London

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Baden, R., Bender, A., Spring, N., Bhattacharjee, B., Starin, D.: Persona: an online social network with user-defined privacy. In: ACM SIGCOMM, pp. 135–146 (2009) CrossRef Baden, R., Bender, A., Spring, N., Bhattacharjee, B., Starin, D.: Persona: an online social network with user-defined privacy. In: ACM SIGCOMM, pp. 135–146 (2009) CrossRef
3.
Zurück zum Zitat Beato, M.K.F., Wouters, K.: Enforcing access control in social networks. In: HotPets, pp. 1–10 (2009) Beato, M.K.F., Wouters, K.: Enforcing access control in social networks. In: HotPets, pp. 1–10 (2009)
4.
Zurück zum Zitat Brickley, D., Miller, L.: FOAF vocabulary specification (2005) Brickley, D., Miller, L.: FOAF vocabulary specification (2005)
5.
Zurück zum Zitat Carminati, B., Ferrari, E., Perego, A.: Rule-based access control for social networks. In: On the Move to Meaningful Internet Systems: OTM Workshops, pp. 1734–1744 (2006) Carminati, B., Ferrari, E., Perego, A.: Rule-based access control for social networks. In: On the Move to Meaningful Internet Systems: OTM Workshops, pp. 1734–1744 (2006)
6.
Zurück zum Zitat Carminati, B., Ferrari, E., Perego, A.: Enforcing access control in web-based social networks. ACM Trans. Inf. Syst. Secur. 13(1), 191–233 (2009) CrossRef Carminati, B., Ferrari, E., Perego, A.: Enforcing access control in web-based social networks. ACM Trans. Inf. Syst. Secur. 13(1), 191–233 (2009) CrossRef
7.
Zurück zum Zitat Carminati, B., Ferrari, E., Perego, A.: Privacy-aware access control in social networks: Issues and solutions. In: Privacy and Anonymity in Information Management Systems, pp. 181–195 (2010) CrossRef Carminati, B., Ferrari, E., Perego, A.: Privacy-aware access control in social networks: Issues and solutions. In: Privacy and Anonymity in Information Management Systems, pp. 181–195 (2010) CrossRef
10.
Zurück zum Zitat Diehl, E.: A four-layer model for security of digital rights management. In: 8th ACM Workshop on Digital Rights Management, pp. 19–28 (2008) CrossRef Diehl, E.: A four-layer model for security of digital rights management. In: 8th ACM Workshop on Digital Rights Management, pp. 19–28 (2008) CrossRef
11.
Zurück zum Zitat Gates, C.: Access control requirements for web 2.0 security and privacy. In: IEEE Web 2.0 Privacy and Security Workshop (2007) Gates, C.: Access control requirements for web 2.0 security and privacy. In: IEEE Web 2.0 Privacy and Security Workshop (2007)
12.
Zurück zum Zitat Governatori, G., Iannella, R.: Modelling and reasoning languages for social networks policies. In: 13th IEEE International Conference on Enterprise Distributed Object Computing (2009) Governatori, G., Iannella, R.: Modelling and reasoning languages for social networks policies. In: 13th IEEE International Conference on Enterprise Distributed Object Computing (2009)
13.
Zurück zum Zitat Graham, W.: Reaching users through facebook: A guide to implementing facebook athenaeum. Code4Lib J. (5) (2008) Graham, W.: Reaching users through facebook: A guide to implementing facebook athenaeum. Code4Lib J. (5) (2008)
14.
Zurück zum Zitat Grzonkowski, S., Ensor, B., Kruk, S.R., Gzella, A., Decker, S., McDaniel, B.: A DRM solution based on social networks and enabling the idea of fair use. In: Proceedings of Media in Transition (2007) Grzonkowski, S., Ensor, B., Kruk, S.R., Gzella, A., Decker, S., McDaniel, B.: A DRM solution based on social networks and enabling the idea of fair use. In: Proceedings of Media in Transition (2007)
15.
Zurück zum Zitat Iannella, R.: Digital rights management (DRM) architectures. D-Lib Mag. 7(6) (2001) Iannella, R.: Digital rights management (DRM) architectures. D-Lib Mag. 7(6) (2001)
16.
Zurück zum Zitat Iannella, R.: A framework for the policy-oriented web in social networks. In: 7th International Workshop for Technical, Economic and Legal Aspects of Business Models for Virtual Goods (2009) Iannella, R.: A framework for the policy-oriented web in social networks. In: 7th International Workshop for Technical, Economic and Legal Aspects of Business Models for Virtual Goods (2009)
17.
Zurück zum Zitat Kolovski, V., Katz, Y., Hendler, J., Weitzner, D., Berners-Lee, T.: Towards a policy-aware web. In: Semantic Web and Policy Workshop at the 4th International Semantic Web Conference (2005) Kolovski, V., Katz, Y., Hendler, J., Weitzner, D., Berners-Lee, T.: Towards a policy-aware web. In: Semantic Web and Policy Workshop at the 4th International Semantic Web Conference (2005)
18.
Zurück zum Zitat Loukides, G., Gkoulalas-Divanis, A.: Privacy challenges and solutions in the social web. ACM Crossroads 16(2), 14–18 (2009) CrossRef Loukides, G., Gkoulalas-Divanis, A.: Privacy challenges and solutions in the social web. ACM Crossroads 16(2), 14–18 (2009) CrossRef
20.
Zurück zum Zitat Pfaff, B.: Performance analysis of BSTs in system software. ACM SIGMETRICS Perform. Eval. Rev. 32(1), 410–411 (2004) CrossRef Pfaff, B.: Performance analysis of BSTs in system software. ACM SIGMETRICS Perform. Eval. Rev. 32(1), 410–411 (2004) CrossRef
21.
Zurück zum Zitat Sachan, A., Emmanuel, S., Kankanhalli, M.S.: Efficient license validation in MPML DRM architecture. In: 9th ACM Workshop on Digital Rights Management, pp. 73–82 (2009) CrossRef Sachan, A., Emmanuel, S., Kankanhalli, M.S.: Efficient license validation in MPML DRM architecture. In: 9th ACM Workshop on Digital Rights Management, pp. 73–82 (2009) CrossRef
22.
Zurück zum Zitat Sachan, A., Emmanuel, S., Kankanhalli, M.S.: Efficient aggregate licenses validation in DRM. In: 15th Database Systems for Advanced Application (DASFAA), pp. 313–319 (2010) CrossRef Sachan, A., Emmanuel, S., Kankanhalli, M.S.: Efficient aggregate licenses validation in DRM. In: 15th Database Systems for Advanced Application (DASFAA), pp. 313–319 (2010) CrossRef
23.
Zurück zum Zitat Sachan, A., Emmanuel, S., Kankanhalli, M.S.: An efficient access control method for multimedia social networks. In: 2nd ACM Multimedia Workshop on Social Media (WSM) (2010) Sachan, A., Emmanuel, S., Kankanhalli, M.S.: An efficient access control method for multimedia social networks. In: 2nd ACM Multimedia Workshop on Social Media (WSM) (2010)
24.
Zurück zum Zitat Shehab, M., Squicciarini, A., Ahn, G.J.: Beyond user-to-user access control for online social networks. In: Information and Communications Security, pp. 174–189 (2008) CrossRef Shehab, M., Squicciarini, A., Ahn, G.J.: Beyond user-to-user access control for online social networks. In: Information and Communications Security, pp. 174–189 (2008) CrossRef
25.
Zurück zum Zitat Squicciarini, A.C., Shehab, M., Paci, F.: Collective privacy management in social networks. In: 18th International Conference on World Wide Web, pp. 521–530 (2009) CrossRef Squicciarini, A.C., Shehab, M., Paci, F.: Collective privacy management in social networks. In: 18th International Conference on World Wide Web, pp. 521–530 (2009) CrossRef
26.
Zurück zum Zitat Tootoonchian, A., Gollu, K.K., Saroiu, S., Ganjali, Y., Wolman, A.: Lockr: social access control for web 2.0. In: First ACM Workshop on Online Social Networks, pp. 43–48 (2008) CrossRef Tootoonchian, A., Gollu, K.K., Saroiu, S., Ganjali, Y., Wolman, A.: Lockr: social access control for web 2.0. In: First ACM Workshop on Online Social Networks, pp. 43–48 (2008) CrossRef
27.
Zurück zum Zitat Wilfred, V., Bader, A., Muthucumaru, M.: An access control scheme for protecting personal data. In: Sixth Annual Conference on Privacy, Security and Trust (2008) Wilfred, V., Bader, A., Muthucumaru, M.: An access control scheme for protecting personal data. In: Sixth Annual Conference on Privacy, Security and Trust (2008)
28.
Zurück zum Zitat Williams, J.: Social networking applications in health care: threats to the privacy and security of health information. In: ICSE Workshop on Software Engineering in Health Care (2010) Williams, J.: Social networking applications in health care: threats to the privacy and security of health information. In: ICSE Workshop on Software Engineering in Health Care (2010)
29.
Zurück zum Zitat Yeung, C.A., Liccardi, I., Lu, K., Seneviratne, K., Berners-Lee, T.: Decentralization: The future of online social networking. In: W3C Workshop on the Future of Social Networking (2009) Yeung, C.A., Liccardi, I., Lu, K., Seneviratne, K., Berners-Lee, T.: Decentralization: The future of online social networking. In: W3C Workshop on the Future of Social Networking (2009)
Metadaten
Titel
Efficient Access Control in Multimedia Social Networks
verfasst von
Amit Sachan
Sabu Emmanuel
Copyright-Jahr
2011
Verlag
Springer London
DOI
https://doi.org/10.1007/978-0-85729-436-4_7