− In the current Facebook system, users cannot hide some of their friends from some
of their other friends. Therefore, our tool cannot derive the settings which would
protect the relationships between users.
9 Related Work
In this section, we review several existing access control models for social networks.
In [2][7], the authors propose a discretionary security model which adopts a rule-
based approach for specifying access to node resources. Like our model, their model
takes into account the type of relationships among users. Authorized users are denoted
in terms of the type, maximum depth and minimum trust levels of the relationships.
For example, by writing the rule
}
))8.0,3,,(,( friendOfArid
, Alice expresses the fact
that resource rid should be available only to her direct and indirect friends with a
maximum depth equal to 3 and a minimum trust level equal to 0.8. In [5], the same
authors propose an extension to their model for protecting the relationships. If two
nodes come into relationship then they negotiate a distribution rule specifying the
characteristics of the nodes that are authorized to know the existence of the
relationship. The relationship is then described in a certificate whose key is protected
by the distribution rule like any other resource. While the model described in [2][7][5]
provides the users with a highly expressive security policy, we fear that most users
would hardly understand the semantics of an access condition consisting of a
relationship type, a depth level in a graph, and a trust level. Moreover, as we already
underlined it at several occasions in this paper, we do not believe in a model where
users, who are not security specialists, need to manage their privacy policy. In [8],
the authors propose a multilevel security model for social networks which has some
similarities with our model. First, the privacy policy is mandatory i.e. accesses to
objects are controlled by strictly enforcing the Bell & LaPadula properties. Second,
classification levels of objects are specified by the creators. However, regarding the
specification of clearance levels, there is a major difference between their model and
our model. In [8], the clearance level of a user is computed as the average trust rating
specified for him/her by other users. This computation does not consider at all the
type of relationships between users. Therefore, their model seems more suitable to a
peer to peer file sharing system where edges between nodes do not represent
privileged relationships between users. In [9], the same authors propose a second
more sophisticated access control model for social networks. In this model, Alice sets
some initial parameters for computing three protection zones per data object: accept
zone, attestation zone, and deny zone. Users falling into the accept zone category get
unconditional access to Alice’s object. Users in the deny zone do not get any access.
Requests from users in the attest zone are validated on a per-request basis. Each zone
depends on the classification level that Alice has assigned to the data object, on the
trust levels that Alice has assigned to some users, on the type of relationships that
Alice has with some users, on the hop distance between Alice and the users in the
social graph, and on some experiential data resulting from the users’ prior actions.
Whenever Alice publishes an object, she has to specify a list of attesters. Attesters are
some of the attest zone members to whom Alice may grant access to her data object
88