An access control method for private data of online social network users

A social network and access control technology, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve problems such as inability to meet user-defined needs, inappropriate use control strategies, and inapplicability to social network users. Novel and practical, reasonable method and humanized effect

Active Publication Date: 2018-11-09
HENAN UNIV OF SCI & TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The usage control (Usage Control, UCON) theory and architecture can realize the continuity of the control strategy, thereby solving the problem of controllable use of data, but the current usage control methods are mainly used in the field of distributed network information systems and digital rights management, usage control The definition of policies is not suitable for applications in social network environments, and the encryption of data in the use of control methods adopts traditional symmetric or asymmetric encryption systems, which cannot meet the needs of fine-grained control policy customization in online social network application environments. At the same time, the distribution and management of keys also cause huge pressure on the storage and calculation of user terminals, especially not suitable for social network users using mobile terminals

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An access control method for private data of online social network users

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The present invention will be further described below in conjunction with the drawings and embodiments.

[0024] figure 1 It is a schematic model diagram of an embodiment of a method for accessing private data of an online social network user of the present invention. Such as figure 1 , The model of an embodiment of the present invention mainly includes:

[0025] (1) Social network server: a semi-trusted service platform for managing registered users, including a data server and a policy server. The data server is responsible for storing encrypted object data uploaded by users, and the policy server is responsible for storing user-defined access control policies.

[0026] (2) Authority server: A trusted third-party platform that grants different access authority to network users by issuing keys based on network user attributes to network users.

[0027] (3) OSNs network users: registered users of the social network server, and downloaded and installed the reference monitor from...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An access control method for private data of online social network users. When a data creator creates an object to be shared on a social network, he encrypts the object with his system public key and defined access control policies, and shares the encrypted object with the The access control policy is uploaded to the social network server; each user of the social network has a unique identification code and an attribute set including its subjective attributes and objective attributes; when an indirect sharer who has no direct social connection with the data creator sends a When the direct visitor who has obtained the object requests to share the object, his access is controlled by judging whether the objective attribute of the indirect sharer conforms to the access control policy defined by the data creator. The present invention satisfies fine-grained and sustainable access control requirements while implementing encrypted storage of user data on the server side, and solves the problems in the prior art that data creators cannot control indirect sharers to access objects.

Description

Technical field [0001] The present invention relates to the field of online social networks (OSNs, Online Social Networks), in particular to a method for accessing private data of online social network users. Background technique [0002] When traditional online social network access control implements fine-grained access control (Access Control), user data (such as photos, videos, text data uploaded by users, etc.) are stored in plaintext on the server of the online social network. The storage method requires that the online social network service provider must be credible. If the server is attacked or the service provider guards and steals, the security of the user's private data cannot be guaranteed. However, if the data is encrypted and stored on the server, it will affect the design and implementation of the access control strategy, making it difficult to achieve fine-grained access control. At present, the method that can achieve both fine-grained access control policies a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/58
CPCH04L63/0442H04L63/102H04L51/52
Inventor 王剑张雷鸣向菲
Owner HENAN UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products