2018
DOI: 10.1145/3134439
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced Audit Strategies for Collaborative and Accountable Data Sharing in Social Networks

Abstract: Data sharing and access control management is one of the issues still hindering the development of decentralized online social networks (DOSNs), which are now gaining more research attention with the recent developments in P2P computing, such as the secure public ledger–based protocols (Blockchains) for monetary systems. In a previous work, we proposed an initial audit–based model for access control in DOSNs. In this article, we focus on enhancing the audit strategies and the privacy issues emerging from recor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 29 publications
0
3
0
Order By: Relevance
“…Authors like [28] proposed using Blockchain technology to detect harmful behavior on a social network using enhanced audit and collaboration strategies. Nevertheless, the authors do not consider if the audited data has been validated before.…”
Section: Data Reliabilitymentioning
confidence: 99%
“…Authors like [28] proposed using Blockchain technology to detect harmful behavior on a social network using enhanced audit and collaboration strategies. Nevertheless, the authors do not consider if the audited data has been validated before.…”
Section: Data Reliabilitymentioning
confidence: 99%
“…Data control refers to the amount of information that is shared among user to maintain anonymity [13].…”
Section: Data Control-basedmentioning
confidence: 99%
“…Enhanced Audit Strategies for Collaborative and Accountable Data Sharing in Social Networks. Issues concerning trust and regulation of data access are explained and faced by Bahri et al (2018), who in their article hope for a transition from the currently widely adopted centralized model of identity and data management to the adoption of a trust-less model, where Web users own and control their personal data. Instead of entrusting their privacy to service providers, and instead of relying on cryptography-based and computationally costly solutions, the idea is to rely on accountability and transparency in an open, trusted sharing environment.…”
Section: Measuring Moral Acceptability In E-deliberation: a Practicalmentioning
confidence: 99%