Skip to main content

Efficient Access Control in Multimedia Social Networks

  • Chapter
Social Media Modeling and Computing

Abstract

Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Andersson, A.: General balanced trees. J. Algorithms 30(1), 1–18 (1999)

    Article  MATH  MathSciNet  Google Scholar 

  2. Baden, R., Bender, A., Spring, N., Bhattacharjee, B., Starin, D.: Persona: an online social network with user-defined privacy. In: ACM SIGCOMM, pp. 135–146 (2009)

    Chapter  Google Scholar 

  3. Beato, M.K.F., Wouters, K.: Enforcing access control in social networks. In: HotPets, pp. 1–10 (2009)

    Google Scholar 

  4. Brickley, D., Miller, L.: FOAF vocabulary specification (2005)

    Google Scholar 

  5. Carminati, B., Ferrari, E., Perego, A.: Rule-based access control for social networks. In: On the Move to Meaningful Internet Systems: OTM Workshops, pp. 1734–1744 (2006)

    Google Scholar 

  6. Carminati, B., Ferrari, E., Perego, A.: Enforcing access control in web-based social networks. ACM Trans. Inf. Syst. Secur. 13(1), 191–233 (2009)

    Article  Google Scholar 

  7. Carminati, B., Ferrari, E., Perego, A.: Privacy-aware access control in social networks: Issues and solutions. In: Privacy and Anonymity in Information Management Systems, pp. 181–195 (2010)

    Chapter  Google Scholar 

  8. Facebook statistics. Available at: http://www.facebook.com/press/info.php?statistics

  9. Flickr. www.flickr.com/

  10. Diehl, E.: A four-layer model for security of digital rights management. In: 8th ACM Workshop on Digital Rights Management, pp. 19–28 (2008)

    Chapter  Google Scholar 

  11. Gates, C.: Access control requirements for web 2.0 security and privacy. In: IEEE Web 2.0 Privacy and Security Workshop (2007)

    Google Scholar 

  12. Governatori, G., Iannella, R.: Modelling and reasoning languages for social networks policies. In: 13th IEEE International Conference on Enterprise Distributed Object Computing (2009)

    Google Scholar 

  13. Graham, W.: Reaching users through facebook: A guide to implementing facebook athenaeum. Code4Lib J. (5) (2008)

    Google Scholar 

  14. Grzonkowski, S., Ensor, B., Kruk, S.R., Gzella, A., Decker, S., McDaniel, B.: A DRM solution based on social networks and enabling the idea of fair use. In: Proceedings of Media in Transition (2007)

    Google Scholar 

  15. Iannella, R.: Digital rights management (DRM) architectures. D-Lib Mag. 7(6) (2001)

    Google Scholar 

  16. Iannella, R.: A framework for the policy-oriented web in social networks. In: 7th International Workshop for Technical, Economic and Legal Aspects of Business Models for Virtual Goods (2009)

    Google Scholar 

  17. Kolovski, V., Katz, Y., Hendler, J., Weitzner, D., Berners-Lee, T.: Towards a policy-aware web. In: Semantic Web and Policy Workshop at the 4th International Semantic Web Conference (2005)

    Google Scholar 

  18. Loukides, G., Gkoulalas-Divanis, A.: Privacy challenges and solutions in the social web. ACM Crossroads 16(2), 14–18 (2009)

    Article  Google Scholar 

  19. Neilsen online technical report 2009. Available at: http://en-us.nielsen.com/

  20. Pfaff, B.: Performance analysis of BSTs in system software. ACM SIGMETRICS Perform. Eval. Rev. 32(1), 410–411 (2004)

    Article  Google Scholar 

  21. Sachan, A., Emmanuel, S., Kankanhalli, M.S.: Efficient license validation in MPML DRM architecture. In: 9th ACM Workshop on Digital Rights Management, pp. 73–82 (2009)

    Chapter  Google Scholar 

  22. Sachan, A., Emmanuel, S., Kankanhalli, M.S.: Efficient aggregate licenses validation in DRM. In: 15th Database Systems for Advanced Application (DASFAA), pp. 313–319 (2010)

    Chapter  Google Scholar 

  23. Sachan, A., Emmanuel, S., Kankanhalli, M.S.: An efficient access control method for multimedia social networks. In: 2nd ACM Multimedia Workshop on Social Media (WSM) (2010)

    Google Scholar 

  24. Shehab, M., Squicciarini, A., Ahn, G.J.: Beyond user-to-user access control for online social networks. In: Information and Communications Security, pp. 174–189 (2008)

    Chapter  Google Scholar 

  25. Squicciarini, A.C., Shehab, M., Paci, F.: Collective privacy management in social networks. In: 18th International Conference on World Wide Web, pp. 521–530 (2009)

    Chapter  Google Scholar 

  26. Tootoonchian, A., Gollu, K.K., Saroiu, S., Ganjali, Y., Wolman, A.: Lockr: social access control for web 2.0. In: First ACM Workshop on Online Social Networks, pp. 43–48 (2008)

    Chapter  Google Scholar 

  27. Wilfred, V., Bader, A., Muthucumaru, M.: An access control scheme for protecting personal data. In: Sixth Annual Conference on Privacy, Security and Trust (2008)

    Google Scholar 

  28. Williams, J.: Social networking applications in health care: threats to the privacy and security of health information. In: ICSE Workshop on Software Engineering in Health Care (2010)

    Google Scholar 

  29. Yeung, C.A., Liccardi, I., Lu, K., Seneviratne, K., Berners-Lee, T.: Decentralization: The future of online social networking. In: W3C Workshop on the Future of Social Networking (2009)

    Google Scholar 

  30. YouTube fact sheet. Available at: http://www.youtube.com/t/fact_sheet

Download references

Acknowledgement

Thanks to the Agency for Science, Technology and Research (A-STAR), Singapore for supporting this work under the project “Digital Rights Violation Detection for Digital Asset Management” (Project No: 0721010022).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amit Sachan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag London Limited

About this chapter

Cite this chapter

Sachan, A., Emmanuel, S. (2011). Efficient Access Control in Multimedia Social Networks. In: Hoi, S., Luo, J., Boll, S., Xu, D., Jin, R., King, I. (eds) Social Media Modeling and Computing. Springer, London. https://doi.org/10.1007/978-0-85729-436-4_7

Download citation

  • DOI: https://doi.org/10.1007/978-0-85729-436-4_7

  • Publisher Name: Springer, London

  • Print ISBN: 978-0-85729-435-7

  • Online ISBN: 978-0-85729-436-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics