5th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing

Research Article

Enforcing relationships privacy through collaborative access control in web-based Social Networks

Download393 downloads
  • @INPROCEEDINGS{10.4108/ICST.COLLABORATECOM2009.8339 ,
        author={Barbara Carminati and Elena Ferrari},
        title={Enforcing relationships privacy through collaborative access control in web-based Social Networks},
        proceedings={5th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing},
        proceedings_a={COLLABORATECOM},
        year={2009},
        month={12},
        keywords={authorisation  cryptography  data privacy  groupware  social networking ElGamal cryptosystem  Web-based social network  collaborative access control  relationship privacy  relationship-based access control},
        doi={10.4108/ICST.COLLABORATECOM2009.8339 }
    }
    
  • Barbara Carminati
    Elena Ferrari
    Year: 2009
    Enforcing relationships privacy through collaborative access control in web-based Social Networks
    COLLABORATECOM
    ICST
    DOI: 10.4108/ICST.COLLABORATECOM2009.8339
Barbara Carminati1,*, Elena Ferrari1,*
  • 1: DICOM, Università degli Studi dell'Insubria, Varese, Italy
*Contact email: barbara.carminati@uninsubria.it, elena.ferrari@uninsubria.it

Abstract

Web-based social networks (WBSNs) are today one of the hugest data source available on the Web and therefore data protection has become an urgent need. This has resulted in the proposals of some access control models for social networks. Quite all the models proposed so far enforce a relationship-based access control, where the granting of a resource depends on the relationships established in the network. An important issue is therefore to devise access control mechanisms able to enforce relationship-based access control by, at the same time, protecting relationships privacy. In this paper, we propose a solution to this problem, which enforces access control through a collaboration of selected nodes in the network. We exploit the ElGamal cryptosystem to preserve relationship privacy when relationship information is used for access control purposes.