Font Size: a A A

Research On Resource Sharing And Control For Online Social Networks

Posted on:2017-05-07Degree:MasterType:Thesis
Country:ChinaCandidate:X Y LiFull Text:PDF
GTID:2308330485470923Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
There are a large number of users and resources(articles, pictures,videos,.etc) in online social networks. With more and more Internet users in online social networks released a wide range of resources, users for the shared resource access protect awareness is more and more stronger. The protection of shared resources in social networks is becoming more and more urgent. Take advantage of access control is one of the commonly used and effective methods.However, the access control of the current social network mainly has the following problems:1.In the resource access control stage, only the coarse granularity access is provided for the user to choose.The depth of the user relationship as a degree of trust, and the same depth of the user’s trust is equal, does not reflect the situation even in the same depth, the trust between the requester and the owner of the resource may also be different. Meanwhile, online social network is such a virtual environment, resource owners do not know well about the identity and trust of some requesters, and therefore can not make a correct judgment whether to share resources to the requesters.2.No distinction between resource access and forwarding control. Once the requester gets the resource access, the requester can be arbitrarily forwarded to the resource, may result in resource owners privacy leaks or resources are being stolen. 3.No punishment for the user’s dishonesty, other users of social networks are difficult to know the user’s dishonesty.The resource sharing control scheme in social networks proposed by this thesis can solve above problems. First, the owner can set access threshold for each resource. Use the user’s relationship depth, resource sharing history and distrust user distance to calculate the trust distance between the resource owner and requester, to reflect the degree of trust of the requester and the owner. The machine driven computing method replaces the resource owner to automatically determine whether the resources should be shared to the requester without the resource owner’s reply to each access resource request. For a person who has failed to achieve access, the request can be sent within the social network to the resource owner, the owner then decides whether to grant its access. Secondly, if the user wants to forward the resource, he needs to get access authorization, using game theory methods to make correct forwarding decisions, to avoid the refusal of a trusted user’s forwarding request or to agree to distrust user’s forwarding request. Based on the purpose of protecting the resource of the original author, the access conditions for the resource forwarder to the forwarding resource settings cannot be conflict with the access conditions set by the resource owner. Thirdly, inform dishonest users to the resource owners and their friends, dishonest users will quickly spread in the social circle. By setting distrust user distance to avoid the dishonest user to get access to the private resource.Finally, the feasibility of the scheme is verified by simulation, and the influence of related factors on the results of access and forward is analyzed. Scheme proposed in resource access phase and forward phase to protect resources in social networks, in order to achieve social network resources security controlled sharing and forwarding, meet the needs of the current social network resources protection.
Keywords/Search Tags:online social network, access control, resource sharing, game theory
PDF Full Text Request
Related items