Table of Content

Open Access iconOpen Access

ARTICLE

crossmark

Access Control Policy Based on Friend Circle

Qin Liu1, Tinghuai Ma1, 2, *, Fan Xing1, Yuan Tian3, Abdullah Al-Dhelaan3, Mohammed Al-Dhelaan3

1 School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, 210044, China.
2 CICAEET, Jiangsu Engineering Centre of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing, 210044, China.
3 Computer Science Department, College of Computer and Information Sciences, King Saud University, Riyadh, 11362, Saudi Arabia.

* Corresponding Author: Tinghuai Ma. Email: email.

Computers, Materials & Continua 2020, 62(3), 1143-1159. https://doi.org/10.32604/cmc.2020.04949

Abstract

Nowadays, the scale of the user’s personal social network (personal network, a network of the user and their friends, where the user we call “center user”) is becoming larger and more complex. It is difficult to find a suitable way to manage them automatically. In order to solve this problem, we propose an access control model for social network to protect the privacy of the central users, which achieves the access control accurately and automatically. Based on the hybrid friend circle detection algorithm, we consider the aspects of direct judgment, indirect trust judgment and malicious users, a set of multi-angle control method which could be adapted to the social network environment is proposed. Finally, we propose the solution to the possible conflict of rights in the right control, and assign the rights reasonably in the case of guaranteeing the privacy of the users.

Keywords


Cite This Article

Q. Liu, T. Ma, F. Xing, Y. Tian, A. Al-Dhelaan et al., "Access control policy based on friend circle," Computers, Materials & Continua, vol. 62, no.3, pp. 1143–1159, 2020. https://doi.org/10.32604/cmc.2020.04949



cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 4020

    View

  • 2270

    Download

  • 0

    Like

Related articles

Share Link