Graph Neural Network-Based User Preference Model for Social Network Access Control
Abstract
The popularity and deepening of social networks have increased the risk of personal information leakage for users. To enhance the security of social networks, this study constructed an access control model based on the preferences of social network users. This model utilizes graph neural networks to generate access control strategies based on user preferences, and introduces a multi-layer attention mechanism to optimize the graph neural network. To better capture user preference information, the study sets the learning rate to 0.0001. The experimental results demonstrated that in the Twitter dataset, the accuracy of the proposed model reached 95.7% and the F1 score reached 96.2%, which were significantly higher than those of other models. These results indicated that the model could more accurately classify access control in social networks and reduce false positives. The area under the receiver operation characteristic curve of the proposed model was 0.982, which was higher than other models. The decision time was 13.77 seconds, significantly lower than other models. This indicated that the model could more effectively distinguish different types of user access requests and provide more reliable guarantees for secure access to social networks. The user's preferred social network access control model based on graph neural networks has superior performance, effectively ensuring the information security of social network users and laying the foundation for further development of access control technology
Full Text:
PDFReferences
Gupta E, Sural S, Vaidya J, Atluri V. Enabling attribute-based access control in NoSQL databases. IEEE Transactions on Emerging Topics in Computing, 2022, 11(1): 208-223.
Kashmar N, Adda M, Ibrahim H. Access control metamodels: review, critical analysis, and research issues. Journal of Ubiquitous Systems and Pervasive Networks, 2022, 16(2): 93-102.
Sadeghi M, Sartor L, Rossi M. A semantic-based access control approach for systems of systems. ACM SIGAPP Applied Computing Review, 2022, 21(4): 5-19.
Thabit S, Yan L S, Tao Y, Abdullah A B. Trust management and data protection for online social networks. IET Communications, 2022, 16(12): 1355-1368.
Ameer S, Benson J, Sandhu R. Hybrid approaches (ABAC and RBAC) toward secure access control in smart home IoT. IEEE Transactions on Dependable and Secure Computing, 2022, 20(5): 4032-4051.
You M, Yin J, Wang H, Cao J, Wang K, Miao Y, Bertino E. A knowledge graph empowered online learning framework for access control decision-making. World Wide Web, 2023, 26(2): 827-848.
Gai K, She Y, Zhu L, Choo K K R, Wan Z. A blockchain-based access control scheme for zero trust cross-organizational data sharing. ACM Transactions on Internet Technology, 2023, 23(3): 1-25.
Wu H, Ye W, Guo Y. Data access control method of cloud network secure storage under Social Internet of Things environment. International Journal of System Assurance Engineering and Management, 2023, 14(4): 1379-1386.
Azbeg K, Ouchetto O, Andaloussi S J. Access control and privacy-preserving blockchain-based system for diseases management. IEEE Transactions on Computational Social Systems, 2022, 10(4): 1515-1527.
Zhang L, Zhang Y, Wu Q, Mu Y, Rezaeibagha F. A secure and efficient decentralized access control scheme based on blockchain for vehicular social networks. IEEE Internet of Things Journal, 2022, 9(18): 17938-17952.
Zhao Y, Yu H, Liang Y, Conti M, Bazzi W, Ren Y. A sanitizable access control with policy-protection for vehicular social networks. IEEE Transactions on Intelligent Transportation Systems, 2023, 25(3): 2956-2965.
Squicciarini A, Rajtmajer S, Gao Y, Semonsen J, Belmonte A, Agarwal P. An extended ultimatum game for multi-party access control in social networks. ACM Transactions on the Web (TWEB), 2022, 16(3): 1-23.
Dixit M S, Wajgi M D, Wanjari S. Real time user access control on social network using deep learning. International Journal for Research Publication and Seminar. 2022, 13(2): 246-251.
Wen W, Fan J, Zhang Y, Fang Y. APCAS: Autonomous privacy control and authentication sharing in social networks. IEEE Transactions on Computational Social Systems, 2022, 10(6): 3169-3180.
Safi S M, Movaghar A, Ghorbani M. Privacy protection scheme for mobile social network. Journal of King Saud University-Computer and Information Sciences, 2022, 34(7): 4062-4074.
Ahmed F, Wei L, Niu Y, Zhao T, Zhang W, Zhang D, Dong W. Toward fine‐grained access control and privacy protection for video sharing in media convergence environment. International Journal of Intelligent Systems, 2022, 37(5): 3025-3049.
Salem R B, Aimeur E, Hage H. A multi-party agent for privacy preference elicitation. Artificial Intelligence and Applications. 2023, 1(2): 98-105.
Patil R Y. A secure privacy preserving and access control scheme for medical internet of things (MIoT) using attribute-based signcryption. International Journal of Information Technology, 2024, 16(1): 181-191.
Zhonghua C, Goyal S B, Rajawat A S. Smart contracts attribute-based access control model for security & privacy of IoT system using blockchain and edge computing. The Journal of Supercomputing, 2024, 80(2): 1396-1425.
Mayeke N R, Arigbabu A T, Olaniyi O O, Okunleye O J, Adigwe C S. Evolving access control paradigms: a comprehensive multi-dimensional analysis of security risks and system assurance in cyber engineering. Asian Journal of Research in Computer Science, 2024, 17(5): 108-124.
DOI: https://doi.org/10.31449/inf.v49i16.7705

This work is licensed under a Creative Commons Attribution 3.0 License.