Graph Neural Network-Based User Preference Model for Social Network Access Control
Abstract
The popularity and deepening of social networks have increased the risk of personal information leakage for users. To enhance the security of social networks, this study constructed an access control model based on the preferences of social network users. This model utilizes graph neural networks to generate access control strategies based on user preferences, and introduces a multi-layer attention mechanism to optimize the graph neural network. To better capture user preference information, the study sets the learning rate to 0.0001. The experimental results demonstrated that in the Twitter dataset, the accuracy of the proposed model reached 95.7% and the F1 score reached 96.2%, which were significantly higher than those of other models. These results indicated that the model could more accurately classify access control in social networks and reduce false positives. The area under the receiver operation characteristic curve of the proposed model was 0.982, which was higher than other models. The decision time was 13.77 seconds, significantly lower than other models. This indicated that the model could more effectively distinguish different types of user access requests and provide more reliable guarantees for secure access to social networks. The user's preferred social network access control model based on graph neural networks has superior performance, effectively ensuring the information security of social network users and laying the foundation for further development of access control technologyReferences
Gupta E, Sural S, Vaidya J, Atluri V. Enabling attribute-based access control in NoSQL databases. IEEE Transactions on Emerging Topics in Computing, 2022, 11(1): 208-223.
Kashmar N, Adda M, Ibrahim H. Access control metamodels: review, critical analysis, and research issues. Journal of Ubiquitous Systems and Pervasive Networks, 2022, 16(2): 93-102.
Sadeghi M, Sartor L, Rossi M. A semantic-based access control approach for systems of systems. ACM SIGAPP Applied Computing Review, 2022, 21(4): 5-19.
Thabit S, Yan L S, Tao Y, Abdullah A B. Trust management and data protection for online social networks. IET Communications, 2022, 16(12): 1355-1368.
Ameer S, Benson J, Sandhu R. Hybrid approaches (ABAC and RBAC) toward secure access control in smart home IoT. IEEE Transactions on Dependable and Secure Computing, 2022, 20(5): 4032-4051.
You M, Yin J, Wang H, Cao J, Wang K, Miao Y, Bertino E. A knowledge graph empowered online learning framework for access control decision-making. World Wide Web, 2023, 26(2): 827-848.
Gai K, She Y, Zhu L, Choo K K R, Wan Z. A blockchain-based access control scheme for zero trust cross-organizational data sharing. ACM Transactions on Internet Technology, 2023, 23(3): 1-25.
Wu H, Ye W, Guo Y. Data access control method of cloud network secure storage under Social Internet of Things environment. International Journal of System Assurance Engineering and Management, 2023, 14(4): 1379-1386.
Azbeg K, Ouchetto O, Andaloussi S J. Access control and privacy-preserving blockchain-based system for diseases management. IEEE Transactions on Computational Social Systems, 2022, 10(4): 1515-1527.
Zhang L, Zhang Y, Wu Q, Mu Y, Rezaeibagha F. A secure and efficient decentralized access control scheme based on blockchain for vehicular social networks. IEEE Internet of Things Journal, 2022, 9(18): 17938-17952.
Zhao Y, Yu H, Liang Y, Conti M, Bazzi W, Ren Y. A sanitizable access control with policy-protection for vehicular social networks. IEEE Transactions on Intelligent Transportation Systems, 2023, 25(3): 2956-2965.
Squicciarini A, Rajtmajer S, Gao Y, Semonsen J, Belmonte A, Agarwal P. An extended ultimatum game for multi-party access control in social networks. ACM Transactions on the Web (TWEB), 2022, 16(3): 1-23.
Dixit M S, Wajgi M D, Wanjari S. Real time user access control on social network using deep learning. International Journal for Research Publication and Seminar. 2022, 13(2): 246-251.
Wen W, Fan J, Zhang Y, Fang Y. APCAS: Autonomous privacy control and authentication sharing in social networks. IEEE Transactions on Computational Social Systems, 2022, 10(6): 3169-3180.
Safi S M, Movaghar A, Ghorbani M. Privacy protection scheme for mobile social network. Journal of King Saud University-Computer and Information Sciences, 2022, 34(7): 4062-4074.
Ahmed F, Wei L, Niu Y, Zhao T, Zhang W, Zhang D, Dong W. Toward fine‐grained access control and privacy protection for video sharing in media convergence environment. International Journal of Intelligent Systems, 2022, 37(5): 3025-3049.
Salem R B, Aimeur E, Hage H. A multi-party agent for privacy preference elicitation. Artificial Intelligence and Applications. 2023, 1(2): 98-105.
Patil R Y. A secure privacy preserving and access control scheme for medical internet of things (MIoT) using attribute-based signcryption. International Journal of Information Technology, 2024, 16(1): 181-191.
Zhonghua C, Goyal S B, Rajawat A S. Smart contracts attribute-based access control model for security & privacy of IoT system using blockchain and edge computing. The Journal of Supercomputing, 2024, 80(2): 1396-1425.
Mayeke N R, Arigbabu A T, Olaniyi O O, Okunleye O J, Adigwe C S. Evolving access control paradigms: a comprehensive multi-dimensional analysis of security risks and system assurance in cyber engineering. Asian Journal of Research in Computer Science, 2024, 17(5): 108-124.
DOI:
https://doi.org/10.31449/inf.v49i16.7705Downloads
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika







