POLICY LANGUAGE FOR ACCESS CONTROL IN SOCIAL NETWORK CLOUD

被引:2
|
作者
Morovat, Katanosh [1 ]
Panda, Brajendra [1 ]
机构
[1] Univ Arkansas, Dept Comp Sci & Comp Engn, Fayetteville, AR 72701 USA
关键词
Access control; cloud computing; policy language; social network; well-formed format;
D O I
10.1109/SmartCloud.2016.15
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Over the past several decades, the number of people using online social networks for public relations or sharing documents have increased significantly. This worldwide use of social networks has made them to be an excellent candidate for using cloud. As a result, numerous access control methods have been proposed to maximize available resources. In addition, to protect these resources, access control policies have been devised. This research provides a model to protect shared data from unauthorized access. This model enforces finer-grained access control in a social network, and enables users to define policies to govern belonging resources and to input inquiries in order to access a resource in the most effective way. Policies and inquiries are converted to an easy-to-use format, which enhances the time and efficiency of evaluation of inputs. In this paper, we propose a well-formed notation for specifying a cloud-based social network and the associated access control policies. We show that our notation enables users to define policies in a simpler and more efficient way and that it helps users to protect their assets under a tight security. The main contribution of this work is that resource owners are able to protect their resources from unauthorized access in an easy and efficient way, and requestors are able to feed their access requests in a simple, clear, and effortless way as well.
引用
收藏
页码:313 / 318
页数:6
相关论文
共 50 条
  • [1] DATA INTEGRITY IN POLICY-BASED ATTRIBUTE ACCESS CONTROL IN SOCIAL NETWORK CLOUD
    Morovat, Katanosh
    Panda, Brajendra
    2019 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2019), 2019, : 20 - 25
  • [2] Request Evaluation for Policy-Based Attribute Access Control in Social Network Cloud
    Morovat, Katanosh
    Panda, Brajendra
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2016, : 399 - 406
  • [3] Modeling Access Control Policy of a Social Network
    Belbergui, Chaimaa
    Elkamoun, Najib
    Hilal, Rachid
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (06) : 198 - 206
  • [4] A novel social network access control model using logical authorization language in cloud computing
    Ma, Li
    Tao, Lixin
    Gai, Keke
    Zhong, Yong
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (14):
  • [5] Policy Derived Access Rights in the Social Cloud
    Hendrikx, Ferry
    Bubendorfer, Kris
    2013 IEEE 9TH INTERNATIONAL CONFERENCE ON E-SCIENCE (E-SCIENCE), 2013, : 365 - 368
  • [6] The OPL Access Control Policy Language
    Alm, Christopher
    Wolf, Ruben
    Posegga, Joachim
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2009, 5695 : 138 - 148
  • [7] Quantitative Policy Repair for Access Control on the Cloud
    Eiers, William
    Sankaran, Ganesh
    Bultan, Tevfik
    PROCEEDINGS OF THE 32ND ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2023, 2023, : 564 - 575
  • [8] PERSONALIZED LANGUAGE MODELING BY CROWD SOURCING WITH SOCIAL NETWORK DATA FOR VOICE ACCESS OF CLOUD APPLICATIONS
    Wen, Tsung-Hsien
    Lee, Hung-Yi
    Chen, Tai-Yuan
    Lee, Lin-Shan
    2012 IEEE WORKSHOP ON SPOKEN LANGUAGE TECHNOLOGY (SLT 2012), 2012, : 188 - 193
  • [9] A certified access control policy language: TEpla
    Eaman, Amir
    Felty, Amy
    INNOVATIONS IN SYSTEMS AND SOFTWARE ENGINEERING, 2024, 20 (01) : 49 - 64
  • [10] Student Awareness on Social Network Access Control Policy-An Evaluation of Facebook
    Ahmad, Suzana
    Zakaria, Nurhayati Binti
    ADVANCED SCIENCE LETTERS, 2017, 23 (11) : 11276 - 11281