Efficient Access Control in Multimedia Social Networks

  • Amit Sachan
  • Sabu Emmanuel


Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.


Social Network Access Control Multimedia Content Access Control Model Access Control Mechanism 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.



Thanks to the Agency for Science, Technology and Research (A-STAR), Singapore for supporting this work under the project “Digital Rights Violation Detection for Digital Asset Management” (Project No: 0721010022).


  1. 1.
    Andersson, A.: General balanced trees. J. Algorithms 30(1), 1–18 (1999) CrossRefMATHMathSciNetGoogle Scholar
  2. 2.
    Baden, R., Bender, A., Spring, N., Bhattacharjee, B., Starin, D.: Persona: an online social network with user-defined privacy. In: ACM SIGCOMM, pp. 135–146 (2009) CrossRefGoogle Scholar
  3. 3.
    Beato, M.K.F., Wouters, K.: Enforcing access control in social networks. In: HotPets, pp. 1–10 (2009) Google Scholar
  4. 4.
    Brickley, D., Miller, L.: FOAF vocabulary specification (2005) Google Scholar
  5. 5.
    Carminati, B., Ferrari, E., Perego, A.: Rule-based access control for social networks. In: On the Move to Meaningful Internet Systems: OTM Workshops, pp. 1734–1744 (2006) Google Scholar
  6. 6.
    Carminati, B., Ferrari, E., Perego, A.: Enforcing access control in web-based social networks. ACM Trans. Inf. Syst. Secur. 13(1), 191–233 (2009) CrossRefGoogle Scholar
  7. 7.
    Carminati, B., Ferrari, E., Perego, A.: Privacy-aware access control in social networks: Issues and solutions. In: Privacy and Anonymity in Information Management Systems, pp. 181–195 (2010) CrossRefGoogle Scholar
  8. 8.
    Facebook statistics. Available at:
  9. 9.
  10. 10.
    Diehl, E.: A four-layer model for security of digital rights management. In: 8th ACM Workshop on Digital Rights Management, pp. 19–28 (2008) CrossRefGoogle Scholar
  11. 11.
    Gates, C.: Access control requirements for web 2.0 security and privacy. In: IEEE Web 2.0 Privacy and Security Workshop (2007) Google Scholar
  12. 12.
    Governatori, G., Iannella, R.: Modelling and reasoning languages for social networks policies. In: 13th IEEE International Conference on Enterprise Distributed Object Computing (2009) Google Scholar
  13. 13.
    Graham, W.: Reaching users through facebook: A guide to implementing facebook athenaeum. Code4Lib J. (5) (2008) Google Scholar
  14. 14.
    Grzonkowski, S., Ensor, B., Kruk, S.R., Gzella, A., Decker, S., McDaniel, B.: A DRM solution based on social networks and enabling the idea of fair use. In: Proceedings of Media in Transition (2007) Google Scholar
  15. 15.
    Iannella, R.: Digital rights management (DRM) architectures. D-Lib Mag. 7(6) (2001) Google Scholar
  16. 16.
    Iannella, R.: A framework for the policy-oriented web in social networks. In: 7th International Workshop for Technical, Economic and Legal Aspects of Business Models for Virtual Goods (2009) Google Scholar
  17. 17.
    Kolovski, V., Katz, Y., Hendler, J., Weitzner, D., Berners-Lee, T.: Towards a policy-aware web. In: Semantic Web and Policy Workshop at the 4th International Semantic Web Conference (2005) Google Scholar
  18. 18.
    Loukides, G., Gkoulalas-Divanis, A.: Privacy challenges and solutions in the social web. ACM Crossroads 16(2), 14–18 (2009) CrossRefGoogle Scholar
  19. 19.
    Neilsen online technical report 2009. Available at:
  20. 20.
    Pfaff, B.: Performance analysis of BSTs in system software. ACM SIGMETRICS Perform. Eval. Rev. 32(1), 410–411 (2004) CrossRefGoogle Scholar
  21. 21.
    Sachan, A., Emmanuel, S., Kankanhalli, M.S.: Efficient license validation in MPML DRM architecture. In: 9th ACM Workshop on Digital Rights Management, pp. 73–82 (2009) CrossRefGoogle Scholar
  22. 22.
    Sachan, A., Emmanuel, S., Kankanhalli, M.S.: Efficient aggregate licenses validation in DRM. In: 15th Database Systems for Advanced Application (DASFAA), pp. 313–319 (2010) CrossRefGoogle Scholar
  23. 23.
    Sachan, A., Emmanuel, S., Kankanhalli, M.S.: An efficient access control method for multimedia social networks. In: 2nd ACM Multimedia Workshop on Social Media (WSM) (2010) Google Scholar
  24. 24.
    Shehab, M., Squicciarini, A., Ahn, G.J.: Beyond user-to-user access control for online social networks. In: Information and Communications Security, pp. 174–189 (2008) CrossRefGoogle Scholar
  25. 25.
    Squicciarini, A.C., Shehab, M., Paci, F.: Collective privacy management in social networks. In: 18th International Conference on World Wide Web, pp. 521–530 (2009) CrossRefGoogle Scholar
  26. 26.
    Tootoonchian, A., Gollu, K.K., Saroiu, S., Ganjali, Y., Wolman, A.: Lockr: social access control for web 2.0. In: First ACM Workshop on Online Social Networks, pp. 43–48 (2008) CrossRefGoogle Scholar
  27. 27.
    Wilfred, V., Bader, A., Muthucumaru, M.: An access control scheme for protecting personal data. In: Sixth Annual Conference on Privacy, Security and Trust (2008) Google Scholar
  28. 28.
    Williams, J.: Social networking applications in health care: threats to the privacy and security of health information. In: ICSE Workshop on Software Engineering in Health Care (2010) Google Scholar
  29. 29.
    Yeung, C.A., Liccardi, I., Lu, K., Seneviratne, K., Berners-Lee, T.: Decentralization: The future of online social networking. In: W3C Workshop on the Future of Social Networking (2009) Google Scholar
  30. 30.
    YouTube fact sheet. Available at:

Copyright information

© Springer-Verlag London Limited 2011

Authors and Affiliations

  1. 1.School of Computer EngineeringNanyang Technological UniversitySingaporeSingapore

Personalised recommendations