Wireless Personal Communications

, Volume 100, Issue 2, pp 391–399 | Cite as

Trust-Based Access Control in Multi-role Environment of Online Social Networks

  • Vedashree Takalkar
  • Parikshit N. Mahalle


In the last decade, online social networks have seen a boom with respect to the use and applications. Many users upload large quantity of data that may risk the data security and access control. Trust-based access control strategy was used initially for the owner and his friends in order to restrict the data access using a well defined Trust Rule. The paper has implemented trust-based access control depending on the different roles played by the user. User plays different roles like owner, contributor, disseminator and stakeholder. Aggregated trust score computation and security level computation has been calculated in multi-role environment depending on different multi-role scenarios The proposed novel concept solves the access control problem where the user plays multiple roles that have been further discussed.


Social networks Access control Trust Role 


  1. 1.
    Takalkar, V., & Mahalle, P. N. (2015). Data confidentiality in online social networks: A survey. IJSR, 4(1), 78–82.Google Scholar
  2. 2.
  3. 3.
    Takalkar, V., & Mahalle, P. N. (2015). Trustbook: A Trust-based access control in online social networks. WPMC, Global Wireless Summit.Google Scholar
  4. 4.
    Hu, H., & Ahn, G.-J. (2011). Multiparty authorization framework for data sharing in online social networks data and applications security and privacy XXV. DBSec 2011. Lecture Notes in Computer Science, Vol 6818. Springer, Berlin, Heidelberg.Google Scholar
  5. 5.
    Hu, H., Ahn, G.-J., & Jorgensen, J. (2013). Multiparty access control for online social model and mechanisms. IEEE Transactions on Knowledge and Data Engineering, 25(7), 1614–1627.CrossRefGoogle Scholar
  6. 6.
    Omanakuttan, S., & Chatterjee, M. (2014). Experimental analysis on access control using trust parameter for social network. Berlin, Heidelberg: Springer.CrossRefGoogle Scholar
  7. 7.
    Chang, W.-L., Diaz, A. N., & Hung, P. C. K. (2014). Estimating trust value: A social network perspective. New York: Springer.Google Scholar
  8. 8.
    Ziegler, C.-N., & Lausen, G. (2005). Propagation models for trust and distrust in social networks. Springer.Google Scholar
  9. 9.
    Hang, C.-W., Wang, Y., & Singh, M. P. (2009). Operators for propagating trust and their evaluation in social networks. International Foundation for Autonomous Agents and Multiagent Systems.Google Scholar
  10. 10.
    Villegas, W. A trust based approach for protecting user data in social networks. In CASCON'07 Proceedings of the 2007 conference of the center for advanced studies on Collaborative research.Google Scholar
  11. 11.
    Kuter, U., & Golbeck, J. (2007). SUNNY: A new algorithm for trust inference in social networks using probabilistic confidence models’. Association for the Advancement of Artificial Intelligence (
  12. 12.
    Liu, G., Wang, Y., Orgun, M. A., & Lim, E.-P. (2013). Finding the optimal social trust path for the selection of trustworthy service providers in complex social networks. IEEE Transactions on Services Computing, 6(2), 152–167.CrossRefGoogle Scholar
  13. 13.
    Yeh, L.-Y., Huang, Y.-L., Joseph, A. D., Shieh, S. W., & Tsaur, W.-J. (2012). A batch-authenticated and key agreement framework for P2P-based online social network. IEEE Transactions on Vehicular Technology, 61(4), 1907–1924.CrossRefGoogle Scholar
  14. 14.
    Van Hieu, D., Wisitpongphan, N., & Meesad, P. Analysis of factors which impact facebook users’ attitudes and behaviours using decision tree techniques. In 11th JCSSE (International Joint Conference in Computer Science and Software Engineering).Google Scholar
  15. 15.
    Hur, J. (2013). Improving security and efficiency in attribute based data sharing. IEEE Transactions on Knowledge and Data Engineering, 25(10), 2271–2282.CrossRefGoogle Scholar
  16. 16.
    Yu, S., Wang, C., Ren, K., & Lou, W. (2010). Achieving secure, scalable, and fine-grained data access control in cloud computing. In INFOCOM, 2010 Proceedings IEEE.
  17. 17.
    Shehab, M., Squicciarini, A., Ahn, G.-J., & Kokkinou, I. (2012). Access control for online social networks third party applications. Computers & Security, 31, 897–911.CrossRefGoogle Scholar
  18. 18.
    Hur, J. (2013). Attribute-based secure data sharing with hidden policies in smart grid. IEEE Transactions on Parallel and Distributed Systems, 24(11), 2171–2180.CrossRefGoogle Scholar
  19. 19.
    Goyal, V., Wang, C., Ren, K., & Lou, W. (2010). Attribute Based Data Sharing with Attribute Revocation. ASIACCS’10, Beijing, China. Copyright 2010 ACM 978-1-60558-936-7, April 13–16, 2010.Google Scholar
  20. 20.
    Takalkar, V., & Mahalle, P. (2015). Handling data confidentiality attack due to data sharing using trust-based approach in online social networks. International Journal of Engineering Research and Technology 4(5).Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Computer Engineering, Smt. Kashibai Navale College of EngineeringSavitribai Phule Pune UniversityPuneIndia

Personalised recommendations