Journal of Electronic Science and Technology, Volume. 23, Issue 1, 100302(2025)

Model and service for privacy in decentralized online social networks

George Pacheco Pinto, José Ronaldo Leles Jr., Cíntia da Costa Souza, Paulo R. de Souza, Frederico Araújo Durão, and Cássio Prazeres*
Author Affiliations
  • Department of Computer Science, Federal University of Bahia, Salvador, 40.170-110, Brazil
  • show less
    Figures & Tables(22)
    DOSN-PRIV architecture.
    POD server structure.
    DOSN-PRIV: Classes and properties for access control and privacy.
    DOSN-PRIV model: Classes and properties for DOSN.
    DOSN-PRIV service.
    DOSN scenario modeling.
    Access control 1: Rules and answer.
    Access control 2: Rules and answers.
    Access control 3: Rules and answers.
    Access control 4: Rules and answer.
    Query 1.
    Query 2.
    Query 3.
    Service response time by privacy policies.
    Service response time per parameter.
    • Table 1. [in Chinese]

      View table
      View in Article

      Table 1. [in Chinese]

      Algorithm 1: Access control
        Input: webId // requestor user’s WebID
       1 begin
      // Location of DOSN-PRIV model in the POD
      2urLPOD = “...solidcommunity.net/dosn-priv.owl”
      // Load the DOSN-PRIV model and infer new knowledge in compliance with the policies declared in the model
      3model = loadModel (urlPOD, reasoner)
      // Execute an SPARQL query
      4queryResult = execute Query (model, WeblD)
      // Return data
      5return queryResults
       6 end
    • Table 1. Comparison criteria.

      View table
      View in Article

      Table 1. Comparison criteria.

      CriteriaDescription
      DomainThe technology used in the related work.
      SWRL rulesChecks whether the related work uses SWRL rules for access control.
      OntologyChecks whether the related work uses ontology.
      Privacy granularityIndicates the granularity (high or privacy granularity low) of data access control applied in related work.
    • Table 2. Comparison related work.

      View table
      View in Article

      Table 2. Comparison related work.

      AuthorsDomainSWRL rulesOntologyImplementationPrivacy granularity
      Jiang and Zhang (2019) [29]DOSNs/BlockchainHigh
      Belchior et al. (2020) [30]BlockchainHigh
      Rahman et al. (2020) [31]DOSNsHigh
      Esteves et al. (2021) [27]SolidHigh
      Abid and Daud (2021) [32]OSNHigh
      Braun and Käfer (2022) [33]SolidHigh
      Tama and Wicaksana (2023) [34]DOSNs/BlockchainHigh
      DOSN-PRIVSolidHigh
    • Table 3. Privacy requirements.

      View table
      View in Article

      Table 3. Privacy requirements.

      RequirementDescription
      R1Allow relationship-based access control.
      R2Allow fine-grained access control.
      R3Allow flexible access control.
      R4The user must be able to choose where to store their data and maintain complete control over them.
      R5The user must be able to choose where to store their data and maintain complete control over them.
    • Table 4. DOSN-PRIV model new terms.

      View table
      View in Article

      Table 4. DOSN-PRIV model new terms.

      TypeCreated terms
      Classdosn-priv:Permission, dosn-priv:Read, dosn-priv:Write, dosn-priv:Share, dosn-priv:Post, dosn-priv:Note, dosn-priv:Video, dosn-priv:Photo, dosn-priv:Access, dosn-priv:Public, dosn-priv:Private, dosn-priv:Controlled, and dosn-priv:Page
      Object propertydosn-priv:permissionType, dosn-priv:permissionOn, dosn-priv: Has comment, dosn-priv: Access Type, dosn-priv:Holds, dosn-priv:Removes, and dosn-priv:Has Page
      Data propertydosn-priv:Created Date Time, dosn-priv:NumComment, dosn-priv:Message, dosn-priv:url, and dosn-priv:Permission Read
    • Table 5. Factors and level.

      View table
      View in Article

      Table 5. Factors and level.

      FactorLevel
      Number of policies2, 4
      Number of parameters10, 20
      Number of requests25, 50, 75, 100
    • Table 6. Response time comparison with blockchain methods.

      View table
      View in Article

      Table 6. Response time comparison with blockchain methods.

      MethodFunctionalityTen-attributesAverage response time (ms) (per attribute)
      Jiang and Zhang (2019) [29]Update a postNumber of users335
      Belchior et al. (2020) [30]Request accessNumber of credentials339
      Tama and Wicaksana (2023) [34]Post contentNumber of words586
      Proposed methodRequest contentPrivacy parameters760
    Tools

    Get Citation

    Copy Citation Text

    George Pacheco Pinto, José Ronaldo Leles Jr., Cíntia da Costa Souza, Paulo R. de Souza, Frederico Araújo Durão, Cássio Prazeres. Model and service for privacy in decentralized online social networks[J]. Journal of Electronic Science and Technology, 2025, 23(1): 100302

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category:

    Received: Apr. 18, 2024

    Accepted: Jan. 30, 2025

    Published Online: Apr. 7, 2025

    The Author Email: Cássio Prazeres (prazeres@ufba.br)

    DOI:10.1016/j.jnlest.2025.100302

    Topics