Multimedia Tools and Applications

, Volume 76, Issue 3, pp 3279–3291 | Cite as

A formalized delegation model for multimedia social networks

Article

Abstract

In response to the issues of second-hand sharing and repeat delegation of the digital content in existing multimedia social networks, this paper proposed a novel formalized delegation model for multimedia social network. In accordance with this model, delegators can independently lay down delegation policies. Further, related delegation constraints and strategies were identified to solve delegation conflicts. When a conflict arises among several delegations, strategies could be used to solve the conflict. This delegation model can control the authorities and are delegated consistently until the authorization expires or is revoked. And also, the paper presented essential security policies that lead to revoking different authorities. A use case of real multimedia social network further verified the efficiency and effectiveness of the proposed model.

Keywords

Multimedia social networks Delegation model Formalism Security policy Revocation 

References

  1. 1.
    Donick M, Schonfeldt C, Thomanek A, et al. (2011) A model for assessing the degree of formalization and support of learning scenarios[C]//. Int Conf Interact Collab Learn:290–295Google Scholar
  2. 2.
    Feng W, Zhang Z, Wang J et al (2015) A novel authorization delegation for multimedia social networks by using proxy re-encryption. Multimed Tools Appl. doi:10.1007/s11042-015-2929-2 Google Scholar
  3. 3.
    Gomi H (2011) Access control model and design for delegation using authorization tokens.[C]// Privacy, Security, Risk and Trust (PASSAT) 2011 IEEE Third Int Conf Social Comput (SocialCom), 2011 IEEE Third Int Conf. IEEE:1239–1242Google Scholar
  4. 4.
    Hur J (2013) Improving security and efficiency in attribute-based data sharing [J]. IEEE Trans Knowl Data Eng 25(10):2271–2282CrossRefGoogle Scholar
  5. 5.
    Hur J, Noh DK (2011) Attribute-based access control with efficient revocation in data outsourcing systems[J]. IEEE Trans Parallel Distrib Syst 22(7):1214–1221CrossRefGoogle Scholar
  6. 6.
    Lei J (2013) Weighted directed graph-based authorization delegation model[J]. J Netw 8(12)Google Scholar
  7. 7.
    Sun D (2011) UCSSDAP Ubiquitous computing service security delegation authorization protocol. [C]//IEEE Int Conf Autom Logistics, ICAL:371–374Google Scholar
  8. 8.
    Toahchoodee M, Ray I (2011) On the formalization and analysis of a spatio-temporal role-based access control model [J]. J Comput Secur 19:399–452CrossRefGoogle Scholar
  9. 9.
    Wang F, Zhou L (2009) UCONDFNND - an effective delegation model[C]//. Web Inform Syst Mining, Int Conf. IEEE:557–561Google Scholar
  10. 10.
    Ye C, Wu Z, Zhong J, et al. (2008) Revocation in an attribute-based delegation model[C]// networking, architecture, and storage, 2008. NAS ’08. Int Conf. IEEE:171–172Google Scholar
  11. 11.
    Zhang M, Ogata K, Futatsugi K (2013) Formalization and verification of behavioral correctness of dynamic software updates[J]. Electronic Notes Theoret Comput Sci 294:12–23CrossRefGoogle Scholar
  12. 12.
    Zhang Z, Wang K (2015) A formal analytic approach to credible potential path and mining algorithms for multimedia social networks. Comput J 58(4):668–678CrossRefGoogle Scholar
  13. 13.
    Zhang Z, Wang Z, Niu D (2015) A novel approach to rights sharing-enabling digital rights management for mobile multimedia. Multimed Tools Appl 74(16):6255–6271CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  1. 1.School of Information EngineeringWuhan University of TechnologyWuhanPeople’s Republic of China
  2. 2.Network Information CenterNanyang Institute of TechnologyNanyangPeople’s Republic of China
  3. 3.School of SoftwareNanyang Institute of TechnologyNanyangPeople’s Republic of China
  4. 4.Information Engineering CollegeHenan University of Science and TechnologyLuoyangPeople’s Republic of China

Personalised recommendations