Multiparty Access Control
Multiparty Access Control
Multiparty Access Control
VOL. 25,
INTRODUCTION
HU ET AL.: MULTIPARTY ACCESS CONTROL FOR ONLINE SOCIAL NETWORKS: MODEL AND MECHANISMS
1615
In this section, we proceed with a comprehensive requirement analysis of MPAC in OSNs. Meanwhile, we discuss
several typical sharing patterns occurring in OSNs where
multiple users may have different authorization requirements to a single resource. We specifically analyze three
scenariosprofile sharing, relationship sharing, and content sharingto understand the risks posted by the lack of
collaborative control in OSNs. We leverage Facebook as the
running example in our discussion because it is currently
the most popular and representative social network
provider. In the meantime, we reiterate that our discussion
could be easily extended to other existing social network
platforms, such as Google [24].
Profile sharing. An appealing feature of some OSNs is to
support social applications written by third-party developers
to create additional functionalities built on the top of users
profile for OSNs [1]. To provide meaningful and attractive
services, these social applications consume user profile
attributes, such as name, birthday, activities, interests, and
so on. To make matters more complicated, social applications on current OSN platforms can also consume the
profile attributes of a users friends. In this case, users can
select particular pieces of profile attributes they are willing
to share with the applications when their friends use the
applications. At the same time, the users who are using the
applications may also want to control what information of
their friends is available to the applications because it is
possible for the applications to infer their private profile
attributes through their friends profile attributes [34]. This
means that when an application accesses the profile
attributes of a users friend, both the user and her friend
want to gain control over the profile attributes. If we
consider the application is an accessor, the user is a
disseminator, and the users friend is the owner of shared
profile attributes in this scenario, Fig. 1a demonstrates a
profile sharing pattern where a disseminator can share
others profile attributes to an accessor. Both the owner and
the disseminator can specify access control policies to
restrict the sharing of profile attributes.
Relationship sharing. Another feature of OSNs is that
users can share their relationships with other members.
Relationships are inherently bidirectional and carry potentially sensitive information that associated users may not
want to disclose. Most OSNs provide mechanisms that
users can regulate the display of their friend lists. A user,
however, can only control one direction of a relationship.
Let us consider, for example, a scenario where a user Alice
1616
VOL. 25,
HU ET AL.: MULTIPARTY ACCESS CONTROL FOR ONLINE SOCIAL NETWORKS: MODEL AND MECHANISMS
.
.
.
.
fu0 2 U j u; u0 2 UUrt g;
.
2 ROR membersu; rt ^ u0
2 ROR membersu00 ; rtg;
.
.
.
RT
1617
CT
1618
VOL. 25,
(E), along with their relations with data and their groups of
interest. Note that two users may be directly connected by
more than one edge labeled with different relationship
types in the relationship network. For example, in Fig. 3,
Alice (A) has a direct relationship of type colleagueOf with
Bob (B), whereas Bob (B) has a relationship of friendOf with
Alice (A). In addition, two users may have transitive
relationship, such as FOF, colleagues-of-colleagues and
classmates-of-classmates (LOL) in this example. Moreover,
this example shows that some data items have multiple
controllers. For instance, RelationshipA has two controllers:
the owner, Alice (A), and a stakeholder, Carol (C). Also,
some users may be the controllers of multiple data items.
For example, Carol (C) is a stakeholder of RelationshipA as
well as the contributor of ContentE . Furthermore, we can
notice there are two groups in this example that users can
participate in: the Fashion group and the Hiking group,
and some users, such as Bob (B) and Dave (D), may join in
multiple groups.
.
.
1.
p1 Alice; OW ; f<friendOf; RN>g;
<status01; 0:50>; permit:
2.
p2 Bob; ST ; f<colleageOf; RN>; <hiking; GN>g;
<summer:jpg; 0:75>; permit:
3.
p3 Carol; CB; f<Dave; UN>; < Edward; UN>g;
<play:avi; 1:00>; deny:
HU ET AL.: MULTIPARTY ACCESS CONTROL FOR ONLINE SOCIAL NETWORKS: MODEL AND MECHANISMS
1619
1620
VOL. 25,
HU ET AL.: MULTIPARTY ACCESS CONTROL FOR ONLINE SOCIAL NETWORKS: MODEL AND MECHANISMS
1621
decisioncontroller; effect
CBcontroller; data
friendOfU1; U2:
friendsOF friendsU1; U2;
friendsOF friendsU2; U3:
UDave _ UEdward^
UGack ; X^
1kn
colleageOfBob; X_
decisionC; permit:
decision votingC 0
aggregation weightK
decisionC; deny:
K sumfweightC :
N
controllerCg:aggregation decisionN
sumfdecision votingC weightC :
M
controllerCg:aggregation sensitivityM
decisioncontroller; effect
Uack
1kn
ack controller; X^
1kn
1622
decisioncontrollers; permit
N > M^
aggregation decisionN ^ aggregation sensitivityM:
decisioncontrollers; deny
not decisioncontrollers; permit:
Our strategy-based conflict resolution mechanism is
represented with ASP as well. For example,
.
OW controller; data:
CBcontroller; data:
weightcontrollers 0
ST controller; data:
decisioncontrollers; permit
N=K 1^
aggregation weightK ^ aggregation decisionN:
decisioncontrollers; deny
not decisioncontrollers; permit:
VOL. 25,
decisioncontrollers; deny:
decisiondeny
decisiondisseminator; deny:
decisionpermit
not decisiondeny:
check:-decision(permit),familyof(alice,x),
ow(alice,photoid),user(alice),
user(x),photo(photoid).
:-notcheck.
If any answer set is found, it means that there are family
members who can see the photo. Thus, from the perspective of Alices authorization, this photo is over shared to
some users. The possible solution is to adopt a more
restricted conflict resolution strategy or increase the weight
value of Alice.
Example 3 (Checking Undersharing). Bob has defined a
policy to authorize his friends to see a photo. He wants
to check if any friends cannot see this photo in current
system. The input query query can be specified
as follows:
HU ET AL.: MULTIPARTY ACCESS CONTROL FOR ONLINE SOCIAL NETWORKS: MODEL AND MECHANISMS
1623
check:-decision(deny),friendof(bob,x),
ow(alice,photoid),user(bob),
user(x),photo(photoid).
:-notcheck.
If an answer set contains check, this means that there
are friends who cannot view the photo. Regarding Bobs
authorization requirement, this photo is under shared with
his friends.
1624
VOL. 25,
HU ET AL.: MULTIPARTY ACCESS CONTROL FOR ONLINE SOCIAL NETWORKS: MODEL AND MECHANISMS
TABLE 1
Usability Evaluation for Facebook and
MController Privacy Controls
1625
DISCUSSIONS
1626
RELATED WORK
VOL. 25,
CONCLUSION
ACKNOWLEDGMENTS
This work was partially supported by the grants from the
US National Science Foundation (NSF-IIS-0900970 and NSFCNS-0831360).
REFERENCES
[1]
[2]
HU ET AL.: MULTIPARTY ACCESS CONTROL FOR ONLINE SOCIAL NETWORKS: MODEL AND MECHANISMS
1627