Access control method of user private data of online social networks

A social network and access control technology, which is applied in the direction of data exchange network, digital transmission system, electrical components, etc., can solve the problems that cannot meet the needs of customization, use control strategies are not applicable, and social network users are not applicable, etc., to achieve the method Novel and practical, reasonable method and humanized effect

Active Publication Date: 2016-06-29
HENAN UNIV OF SCI & TECH
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The usage control (UsageControl, UCON) theory and architecture can realize the continuity of the control strategy, thereby solving the problem of controllable use of data, but the current usage control method is mainly used in the field of distributed network information system and digital copyright management, usage control strategy The definition of is not applicable to the application in the social network environment, and the encryption of data in the use control method adopts the traditional symmetric or asymmetric encryption system, which cannot meet the needs of fine-grained control strategy customization in the online social network application environment , at the same time, the distribution and management of the key also causes a huge pressure on the storage and calculation of the user terminal, especially not suitable for social network users using mobile terminals

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method of user private data of online social networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0024] figure 1 It is a model schematic diagram of an embodiment of an access control method for online social network user private data in the present invention. Such as figure 1 , the model of an embodiment of the present invention mainly includes:

[0025] (1) Social network server: a semi-trusted service platform for managing registered users, including a data server and a policy server. The data server is responsible for storing encrypted object data uploaded by users, and the policy server is responsible for storing user-defined access control policies.

[0026] (2) Authority server: a trusted third-party platform that grants different access rights to network users by issuing keys based on network user attributes to network users.

[0027](3) OSNs network users: registered users of social network servers, and download and install reference mon...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an access control method of user private data of online social networks. The method comprises steps of/that when a data creator creates an object shared to a social network, encrypting the client by use of a system public key thereof and a defined access control strategy and loading the encrypted object and the access control strategy to a social network server; each user of the social network has a unique identity identification code and an attribute set including subjective attributes and objective attributes of the user; and when an indirect sharer does not have direct social relationship with the data creator makes a request for sharing of the object towards a direct visitor who has obtained the object, by judging whether the objective attribute of an indirect visitor satisfies the access control strategy defined by the data creator, controlling the visit of the indirect visitor. According to the invention, while encryption and storage of user data on a server end are achieved, requirements on access control of fine granularity and sustainability are met, so a problem that the data creator fails to control the indirect visitor to visit the object in the prior art is solved.

Description

technical field [0001] The invention relates to the field of online social networks (OSNs, Online Social Networks), in particular to an access control method for private data of online social network users. Background technique [0002] When traditional online social network access control implements fine-grained access control (AccessControl), user data (such as photos, videos, text data, etc. uploaded by users) are stored in plain text on the server of the online social network. The method requires that the online social network service provider must be credible. If the server is attacked or the service provider is guarded and stolen, the security of the user's private data will not be guaranteed. However, if the data is encrypted and stored on the server, it will affect the design and implementation of access control policies, making it difficult to achieve fine-grained access control. At present, the method that can realize both fine-grained access control policies and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/58
CPCH04L63/0442H04L63/102H04L51/52
Inventor 王剑张雷鸣向菲
Owner HENAN UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products