Journal of Electronic Science and Technology, Volume. 23, Issue 1, 100302(2025)

Model and service for privacy in decentralized online social networks

George Pacheco Pinto, José Ronaldo Leles Jr., Cíntia da Costa Souza, Paulo R. de Souza, Frederico Araújo Durão, and Cássio Prazeres*
Author Affiliations
  • Department of Computer Science, Federal University of Bahia, Salvador, 40.170-110, Brazil
  • show less
    References(54)

    [1] [1] R. Verbgh, Redecentralizing the web, f good this time, in: O. Seneviratne, J. Hendler (Eds.), Linking the Wld’s Infmation: Essays on Tim BernersLee’s Invention of the Wld Wide, ACM, New Yk, USA, 2023, pp. 215–230.

    [4] [4] R. Verbgh, Decentralizing the semantic web through incentivized collabation, in: Proc. of the 17th Intl. Semantic Web Conf., Monterey, USA, 2018, pp. 1–5.

    [6] [6] M. Westerkamp, S. Göndör, A. Küpper, Tawki: towards selfsovereign social communication, in: Proc. of IEEE International Conference on Decentralized Applications Infrastructures (DAPPCON), Newark, USA, 2019, pp. 29–38.

    [7] [7] B. Guidi, A. Michienzi, K. Koidl, K. Kapanova, A multilayer social overlay f new generation dosns, in: Proc. of the 5th EAI Intl. Conf. on Smart Objects Technologies f Social Good, Valencia, Spain, 2019, pp. 114–119.

    [10] [10] E. Erdin, E. Klukovich, G. Gunduz, M.H. Gunes, POSN: a personal online social wk, in: Proc. of the 30th IFIP TC 11 Intl. Conf. on ICT Systems Security Privacy Protection, Hamburg, Germany, 2015, pp. 51–66.

    [11] [11] S. TaheriBoshrooyeh, A. Küpçü, Ö. Özkasap, Security privacy of distributed online social wks, in: Proc. of the 35th Intl. Conf. on Distributed Computing Systems Wkshops, Columbus, USA, 2015, pp. 112–119.

    [13] [13] A.J. Marcella Jr, C. Stucki, Privacy Hbook: Guidelines, Exposures, Policy Implementation, International Issues, John Wiley & Sons Inc., Hoboken, 2003.

    [14] De Salve A., Di Francesco Maesa D., Mori P., Ricci L., Puccia A.. A multi-layer trust framework for self sovereign identity on blockchain. Online Social Networks and Media, 37–38, 100265(2023).

    [15] Kayes I., Iamnitchi A.. Privacy and security in online social networks: a survey. Online Social Networks and Media, 3–4, 1-21(2017).

    [16] [16] M. Buffa, C. FaronZucker, Ontologybased access rights management, in: F. Guillet, G. Ritsd, D.A. Zighed (Eds.), Advances in Knowledge Discovery Management, Springer, Berlin, Germany, 2012, pp. 49–61.

    [17] [17] R. Bhatia, M. Singh, An implementation model f privacy aware access control in web services environment, in: Proc. of Intl. Conf. on ICT f Sustainable Development, Springer, Singape, 2016, pp. 475–484.

    [18] [18] M. Belaazi, H.B. Rahmouni, A. Bouhoula, An ontology regulating privacy iented access controls, in: Proc. of the 10th Intl. Conf. on Risks Security of Inter Systems, Mytilene, Greece, 2016, pp. 17–35.

    [19] [19] J. Ahmed, Privacy in online social wks: an ontological model f selfpresentation, in: Proc. of the 7th Intl. Conf. on Knowledge Engineering Semantic Web, Prague, Czech Republic, 2016, pp. 56–70.

    [21] [21] A. De Salve, B. Guidi, A. Michienzi, Exploiting community detection to recommend privacy policies in decentralized online social wks, in: Proc. of European Conf. on Parallel Processing, Turin, Italy, 2018, pp. 573–584.

    [23] [23] E. Mansour, A.V. Sambra, S. Hawke, et al., A demonstration of the solid platfm f social web applications, in: Proc. of the 25th Intl. Conf. Companion on Wld Wide Web, Montréal, Canada, 2016, pp. 223–226.

    [24] [24] B. Dodson, I. Vo, T. Purtell, A. Cannon, M. Lam, Musubi: disintermediated interactive social feeds f mobile devices, in: Proc. of the 21st Intl. Conf. on Wld Wide Web, Lyon, France, 2012, pp. 211–220.

    [25] [25] M. Van Kleek, D.A. Smith, N. Shadbolt, M.C. Schraefel, A decentralized architecture f conSolidating personal infmation ecosystems: the webbox, in: Proc. of Personal Infmation Management (PIM), Seattle, USA, 2012, pp. 1–4.

    [26] [26] A. Bielenberg, L. Helm, A. Gentilucci, D. Stefanescu, H.G. Zhang, The growth of diaspa: decentralized online social wk in the wild, in: Proc. of IEEE INFOCOM Wkshops, lo, USA, 2012, pp. 13–18.

    [27] [27] B. Esteves, H.J. Pit, V. RodriguezDoncel, ODRL profile f expressing consent through granular access control policies in Solid, in: Proc. of the IEEE European Symposium. on Security Privacy Wkshops (EuroS&PW), Vienna, Austria, 2021, pp. 298–306.

    [28] [28] T. BernersLee, H. Sty, S. Capadisli, Web access control [Online]. Available, https:Solid.github.iowebaccesscontrolspec, June 2024.

    [30] [30] R. Belchi, B. Putz, G. Pernul, M. Creia, A. Voncelos, S. Guerreiro, SSIBAC: selfsovereign identity based access control, in: Proc. of the 19th Intl. Conf. on Trust, Security Privacy in Computing Communications (TrustCom), Guangzhou, China, 2020, pp. 1935–1943.

    [32] [32] S. Abid, I. Daud, Automated dynamic access control management in OSN, in: Proc. of the Intl. Conf. on Innovative Computing (ICIC), Lahe, Pakistan, 2021, pp. 1–6.

    [33] [33] C. Braun, T. Käfer, Attributebased access control on Solid pods using privacyfriendly credentials, in: Proc. of Poster Demo Track Wkshop Track of the 18th Intl. Conf. on Semantic Systems colocated with 18th Intl. Conf. on Semantic Systems (SEMANTiCS 2022), Vienna, Austria, 2022, pp. 1–5.

    [34] [34] D. Tama, A. Wicaksana, Perfmance evaluation of decentralized social media on near protocol blockchain, in: Proc. of the 17th Intl. Conf. on Ubiquitous Infmation Management Communication (IMCOM), Seoul, Kea, 2023, pp. 1–4.

    [35] Gates C.. Access control requirements for web 2.0 security and privacy. IEEE Web, 2, 1-3(2007).

    [36] [36] B. Carminati, E. Ferrari, Privacyaware access control in social wks: Issues solutions, in: J. Nin, J. Herranz (Eds.), Privacy Anonymity in Infmation Management Systems, Springer, London, UK, 2010, pp. 181–195.

    [37] [37] F. Raji, A. Miri, M.D. Jazi, Preserving privacy in online social wks, in: Proc. of the 4th CanadaFrance MITACS Conf. on Foundations Practice of Security, Paris, France, 2012, pp. 1–13.

    [38] [38] R. Sayaf, D. Clarke, Access control models f online social wks, in: I. Management Association (Ed.), Digital Arts Entertainment: Concepts, Methodologies, Tools, Applications, IGI Global, Hershey, PA, 2014, pp. 451–484.

    [39] [39] S. Capadisli, A. Guy, R. Verbgh, C. Lange, S. Auer, T. BernersLee, Decentralised authing, annotations notifications f a readwrite web with dokieli, in: Proc. of the 17th Intl. Conf. on Web Engineering, Rome, Italy, 2017, pp. 469–481.

    [40] [40] S. Bechhofer, F. Van Harmelen, J. Hendler, et al., OWL web ontology language reference, W3C recommendation [Online]. Available, http:www.w3.gTRowlref, February 2004.

    [41] [41] A.V. Sambra, E. Mansour, S. Hawke, et al., Solid: a platfm f decentralized social applications based on linked data, MIT CSAIL & Qatar Computing Research Institute, Tech. Rep., 2016.

    [43] [43] C. Esposito, O. Hartig, R. Hne, C. Sun, Assessing the Solid protocol in relation to security & privacy obligations [Online]. Available, https:arxiv.gabs2210.08270, October 2022.

    [44] [44] N.F. Noy, D.L. McGuinness, Ontology Development 101: A Guide to Creating Your First Ontology, Stanfd University, Palo Alto, 2001.

    [45] [45] D. Brickley, L. Miller, FOAF Vocabulary Specification 0.99, namespace document, FOAF project [Online]. Available, http:xmlns.comfoaf0.1, January 2014.

    [46] [46] J. McKinney, R. Iannella, vCard ontolog. f describing people ganizations, W3C Interest Group Note, W3C [Online]. Available, http:www.w3.gTRvcardrdf, May 2014.

    [47] [47] M.S. Fox, International contact ontology: addresses, phone numbers emails [Online]. Available, http:ontology.eil.utonto.caicontact.html, April 2015.

    [48] [48] C. Mungall, M. Haendel, W. Dahdul, et al., Relation ontology: relationship types shared across multiple ontologies [Online]. Available, https:obofoundry.gontologyro.html, January 2020.

    [49] [49] D. Berrueta, D. Brickley, S. Decker, et al., SIOC ce ontology specification, W3C member submission, W3C [Online]. Available, http:www.w3.gSubmission2007SUBMsiocspec20070612, June 2007.

    [50] [50] E. Sirin, B. Parsia, B.C. Grau, A. Kalyanpur, Y. Katz, Pellet: a practical OWLDL reasoner, J. Web Semant. 5 (2) (2007) 51–53.

    [51] [51] R. Pzel, R. Malaka, A taskbased approach f ontology evaluation, in: Proc. of the ECAI Wkshop on Ontology Learning Population, Valencia, Spain, 2004, pp. 1–6.

    [52] [52] J.P. lo, A. Rivolli, K.J. Serique, D.A. Meira, SWRL edit: UMA ferramenta web para visualização e edição de regras SWRL, in: Proc. of the Anais Estendidos do XVIII Simpósio Brasileiro de Sistemas Multimídia e Web, São Paulo, Brazil, 2012, pp. 51–54.

    [53] [53] M.J. O’Conn, R.D. Shankar, M.A. Musen, A.K. Das, C. Nyulas, The SWRLAPI: a development environment f wking with SWRL rules, in: C. Dolbear, A. Ruttenberg, U. Sattler (Eds.), in: Proc. of the Fifth OWLED Wkshop on OWL: Experiences Directions, Collocated with the 7th International Semantic Web Conference (ISWC2008), Karlsruhe, Germany, 2008, pp. 26–27.

    Tools

    Get Citation

    Copy Citation Text

    George Pacheco Pinto, José Ronaldo Leles Jr., Cíntia da Costa Souza, Paulo R. de Souza, Frederico Araújo Durão, Cássio Prazeres. Model and service for privacy in decentralized online social networks[J]. Journal of Electronic Science and Technology, 2025, 23(1): 100302

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category:

    Received: Apr. 18, 2024

    Accepted: Jan. 30, 2025

    Published Online: Apr. 7, 2025

    The Author Email: Cássio Prazeres (prazeres@ufba.br)

    DOI:10.1016/j.jnlest.2025.100302

    Topics