New Access Control Methodology for Online Social Network
Main Article Content
Abstract
A social networking sites are a platform to build social networks or social relations within people who share interests, activities, backgrounds or real-life connections with each other. A social network service mostly consists of a representation of each user like a profile, his or her social links, and a variety of additional services. Social network sites are web-based services that allow individuals to create a public profile, to create a list of users with whom to share connections, and view and cross the connections within the system.Most social network services are web-based and provide means for users to interact over the Internet, such as e-mail and instant messaging. Social network sites are varied and they incorporate new information and communication tools such as mobile connectivity, photo/video/sharing and blogging.But present social networking sites can not provide mechanism for restricting the information associated with multiple users. This paper shows different methods used by different authors.
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
IJCERT Policy:
The published work presented in this paper is licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0) license. This means that the content of this paper can be shared, copied, and redistributed in any medium or format, as long as the original author is properly attributed. Additionally, any derivative works based on this paper must also be licensed under the same terms. This licensing agreement allows for broad dissemination and use of the work while maintaining the author's rights and recognition.
By submitting this paper to IJCERT, the author(s) agree to these licensing terms and confirm that the work is original and does not infringe on any third-party copyright or intellectual property rights.
References
S. Kruk, S. Grzonkowski, A. Gzella, T.Woroniecki, and H. Choi.D-FOAF: Dis- tributed identity management with access rights delegation”. The Se- mantic WebASWC 2006, pages 140154, 2006
”Multiparty Access Control for Online Social Networks: Model and Mecha- nisms” Hongxin Hu, Member, IEEE, Gail-Joon Ahn, Senior Member, IEEE, and Jan Jorgensen.IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 25, NO. 7, JULY 2013
Fong, P.W.L., Siahaan, I.: Relationship-based access control policies and their policy languages. In: Proc. 16th ACM Symposium on Access Control Models and Technologies (SACMAT), ACM (2011) 51-60
Cheng, Y., Park, J., Sandhu, R.S.: Relationship-based access control for online social networks: beyond user-to-user relationships. In: Proc. 4th IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT), IEEE CS (2012) 646-655.
Carminati, B., Ferrari, E.: Enforcing relationships privacy through collaborative access control in web-based social networks. In: Proc. 5th International Conference on Collaborative Computing (CollaborateCom), IEEE CS (2009) 1-8
S. Kruk, S. Grzonkowski, A. Gzella, T.Woroniecki, and H. Choi.D-FOAF: Distributed identity management with access rights delegation”. The Se- mantic WebASWC 2006, pages 140154, 2006
B. Carminati, E. Ferrari, and A. Perego. Rule-based access control for social networks. In On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, pages 17341744. Springer, 2006
P. Fong, M. Anwar, and Z. Zhao. A privacy preservation model for facebookstyle social network systems. In Proceedings of the 14th Euro- pean conference on Research in computer security, pages 303320. Springer- Verlag, 2009.
E. Carrie. Access Control Requirements forWeb 2.0 Security and Privacy. In Proc. of Workshop on Web 2.0 Security and Privacy (W2SP). Citeseer, 2007.
F. Paci. Collective privacy management in social networks. In Proceedings of the 18th international conference on World wide web, pages 521530. ACM,2009.