IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A Decentralized Security Framework for Web-Based Social Networks

A Decentralized Security Framework for Web-Based Social Networks
View Sample PDF
Author(s): Barbara Carminati (Universita degli Studi dell’Insubria, Italy), Elena Ferrari (Universita degli Studi dell’Insubria, Italy)and Andrea Perego (Universita degli Studi dell’Insubria, Italy)
Copyright: 2008
Volume: 2
Issue: 4
Pages: 32
Source title: International Journal of Information Security and Privacy (IJISP)
Editor(s)-in-Chief: Yassine Maleh (Sultan Moulay Slimane University, Morocco)and Ahmed A. Abd El-Latif (Menoufia University, Egypt)
DOI: 10.4018/jisp.2008100102

Purchase

View A Decentralized Security Framework for Web-Based Social Networks on the publisher's website for pricing and purchasing information.

Abstract

The wide diffusion and usage of social networking Web sites in the last years have made publicly available a huge amount of possible sensitive information, which can be used by third-parties with purposes different from the ones of the owners of such information. Currently, this issue has been addressed by enforcing into Web-based Social Networks (WBSNs) very simple protection mechanisms, or by using anonymization techniques, thanks to which it is possible to hide the identity of WBSN members while performing analysis on social network data. However, we believe that further solutions are needed, to allow WBSN members themselves to decide who can access their personal information and resources. To cope with this issue, in this article we illustrate a decentralized security framework for WBSNs, which provide both access control and privacy protection mechanisms. In our system, WBSN members can denote who is authorized to access the resources they publish and the relationships they participate in, in terms of the type, depth, and trust level of the relationships existing between members of a WBSN. Cryptographic techniques are then used to provide a controlled sharing of resources while preserving relationship privacy.

Related Content

Zhiqiang Wu. © 2024. 15 pages.
Musa Ugbedeojo, Marion O. Adebiyi, Oluwasegun Julius Aroba, Ayodele Ariyo Adebiyi. © 2024. 27 pages.
. © 2024.
Dongyan Zhang, Lili Zhang, Zhiyong Zhang, Zhongya Zhang. © 2024. 19 pages.
. © 2024.
Sabrine Ennaji, Nabil El Akkad, Khalid Haddouch. © 2023. 17 pages.
Zhen Gu, Guoyin Zhang. © 2023. 15 pages.
Body Bottom