Social puzzles: context-based access control in online social networks

No Thumbnail Available
Authors
Jadliwala, Murtuza Shabbir
Maiti, Anindya
Namboodiri, Vinod
Advisors
Issue Date
2014-06-23
Type
Conference paper
Keywords
Online social networks , Access control , Privacy , Surveillance resistance
Research Projects
Organizational Units
Journal Issue
Citation
Jadliwala, M.; Maiti, A.; Namboodiri, V., "Social Puzzles: Context-Based Access Control in Online Social Networks," in Dependable Systems and Networks (DSN), 2014 44th Annual IEEE/IFIP International Conference on , vol., no., pp.299-310, 23-26 June 2014
Abstract

The increasing popularity of online social networks (OSNs) is spawning new security and privacy concerns. Currently, a majority of OSNs offer very naive access control mechanisms that are primarily based on static access control lists (ACL) or policies. But as the number of social connections grow, static ACL based approaches become ineffective and unappealing to OSN users. There is an increased need in social-networking and data-sharing applications to control access to data based on the associated context (e.g., event, location, and users involved), rather than solely on data ownership and social connections. Surveillance is another critical concern for OSN users, as the service provider may further scrutinize data posted or shared by users for personal gains (e.g., targeted advertisements), for use by corporate partners or to comply with legal orders. In this paper, we introduce a novel paradigm of context-based access control in OSNs, where users are able to access the shared data only if they have knowledge of the context associated with it. We propose two constructions for context-based access control in OSNs: the first is based on a novel application of Shamir's secret sharing scheme, whereas the second makes use of an attribute-based encryption scheme. For both constructions, we analyze their security properties, implement proof-of-concept applications for Facebook and empirically evaluate their functionality and performance. Our empirical measurements show that the proposed constructions execute efficiently on standard computing hardware, as well as, on portable mobile devices.

Table of Contents
Description
Click on the DOI link to access the article (may not be free).
Publisher
IEEE
Journal
Book Title
Series
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN);
PubMed ID
DOI
ISSN
1530-0889
EISSN