Vol.62, No.3, 2020, pp.1143-1159, doi:10.32604/cmc.2020.04949
Access Control Policy Based on Friend Circle
  • Qin Liu1, Tinghuai Ma1, 2, *, Fan Xing1, Yuan Tian3, Abdullah Al-Dhelaan3, Mohammed Al-Dhelaan3
1 School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, 210044, China.
2 CICAEET, Jiangsu Engineering Centre of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing, 210044, China.
3 Computer Science Department, College of Computer and Information Sciences, King Saud University, Riyadh, 11362, Saudi Arabia.
* Corresponding Author: Tinghuai Ma. Email: .
Nowadays, the scale of the user’s personal social network (personal network, a network of the user and their friends, where the user we call “center user”) is becoming larger and more complex. It is difficult to find a suitable way to manage them automatically. In order to solve this problem, we propose an access control model for social network to protect the privacy of the central users, which achieves the access control accurately and automatically. Based on the hybrid friend circle detection algorithm, we consider the aspects of direct judgment, indirect trust judgment and malicious users, a set of multi-angle control method which could be adapted to the social network environment is proposed. Finally, we propose the solution to the possible conflict of rights in the right control, and assign the rights reasonably in the case of guaranteeing the privacy of the users.
Social network, privacy protection, circle of friends, access control.
Cite This Article
. , "Access control policy based on friend circle," Computers, Materials & Continua, vol. 62, no.3, pp. 1143–1159, 2020.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.