5th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing

Research Article

Enforcing relationships privacy through collaborative access control in web-based Social Networks

Download
  • @INPROCEEDINGS{10.4108/ICST.COLLABORATECOM2009.8339 ,
        author={Barbara Carminati and Elena Ferrari},
        title={Enforcing relationships privacy through collaborative access control in web-based Social Networks},
        proceedings={5th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing},
        proceedings_a={COLLABORATECOM},
        year={2009},
        month={12},
        keywords={authorisation , cryptography , data privacy , groupware , social networking, ElGamal cryptosystem , Web-based social network , collaborative access control , relationship privacy , relationship-based access control},
        doi={10.4108/ICST.COLLABORATECOM2009.8339 }
    }
    
  • Barbara Carminati
    Elena Ferrari
    Year: 2009
    Enforcing relationships privacy through collaborative access control in web-based Social Networks
    COLLABORATECOM
    ICST
    DOI: 10.4108/ICST.COLLABORATECOM2009.8339
Barbara Carminati1,*, Elena Ferrari1,*
  • 1: DICOM, Università degli Studi dell'Insubria, Varese, Italy
*Contact email: barbara.carminati@uninsubria.it, elena.ferrari@uninsubria.it

Abstract

Web-based social networks (WBSNs) are today one of the hugest data source available on the Web and therefore data protection has become an urgent need. This has resulted in the proposals of some access control models for social networks. Quite all the models proposed so far enforce a relationship-based access control, where the granting of a resource depends on the relationships established in the network. An important issue is therefore to devise access control mechanisms able to enforce relationship-based access control by, at the same time, protecting relationships privacy. In this paper, we propose a solution to this problem, which enforces access control through a collaboration of selected nodes in the network. We exploit the ElGamal cryptosystem to preserve relationship privacy when relationship information is used for access control purposes.