{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:01Z","timestamp":1750306081375,"version":"3.41.0"},"reference-count":38,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2018,4,24]],"date-time":"2018-04-24T00:00:00Z","timestamp":1524528000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2018,11,30]]},"abstract":"<jats:p>Data sharing and access control management is one of the issues still hindering the development of decentralized online social networks (DOSNs), which are now gaining more research attention with the recent developments in P2P computing, such as the secure public ledger\u2013based protocols (Blockchains) for monetary systems. In a previous work, we proposed an initial audit\u2013based model for access control in DOSNs. In this article, we focus on enhancing the audit strategies and the privacy issues emerging from records kept for audit purposes. We propose enhanced audit and collaboration strategies, for which experimental results, on a real online social network graph with simulated sharing behavior, show an improvement in the detection rate of bad behavior of more than 50% compared to the basic model. We also provide an analysis of the related privacy issues and discuss possible privacy-preserving alternatives.<\/jats:p>","DOI":"10.1145\/3134439","type":"journal-article","created":{"date-parts":[[2018,4,25]],"date-time":"2018-04-25T12:22:17Z","timestamp":1524658937000},"page":"1-19","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Enhanced Audit Strategies for Collaborative and Accountable Data Sharing in Social Networks"],"prefix":"10.1145","volume":"18","author":[{"given":"Leila","family":"Bahri","sequence":"first","affiliation":[{"name":"Royal Institute of Technology, Stockholm, Sweden"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Barbara","family":"Carminati","sequence":"additional","affiliation":[{"name":"University of Insubria, Varese, Italy"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Elena","family":"Ferrari","sequence":"additional","affiliation":[{"name":"University of Insubria, Varese, Italy"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Andrea","family":"Bianco","sequence":"additional","affiliation":[{"name":"University of Insubria, Varese, Italy"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2018,4,24]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2557547.2557574"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIC.2015.18"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2014.6815278"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/2033036.2033080"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1578002.1578010"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609962"},{"key":"e_1_2_1_7_1","first-page":"1","article-title":"SmartPay: A lightweight protocol to enforce trust preferences in mobile person-to-person payments","volume":"2","author":"Carminati Barbara","year":"2013","unstructured":"Barbara Carminati , Elena Ferrari , and Tran Hong Ngoc . 2013 . SmartPay: A lightweight protocol to enforce trust preferences in mobile person-to-person payments . ASE Science Journal 2 , 3, 1 -- 13 . Barbara Carminati, Elena Ferrari, and Tran Hong Ngoc. 2013. SmartPay: A lightweight protocol to enforce trust preferences in mobile person-to-person payments. ASE Science Journal 2, 3, 1--13.","journal-title":"ASE Science Journal"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-014-0258-2"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985797"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2011.5986118"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.5350374"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CTS.2014.6867557"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2006.08.028"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73729-2_35"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266843"},{"key":"e_1_2_1_16_1","volume-title":"Mantle: A novel DOSN leveraging free storage and local software. In Advanced Infocomm Technology","author":"Famulari Antonino","year":"2013","unstructured":"Antonino Famulari and Artur Hecker . 2013 . Mantle: A novel DOSN leveraging free storage and local software. In Advanced Infocomm Technology . Springer , 213--224. Antonino Famulari and Artur Hecker. 2013. Mantle: A novel DOSN leveraging free storage and local software. In Advanced Infocomm Technology. Springer, 213--224."},{"key":"e_1_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Elena Ferrari. 2010. Access Control in Data Management Systems. Morgan & Claypool.   Elena Ferrari. 2010. Access Control in Data Management Systems. Morgan & Claypool.","DOI":"10.1007\/978-3-031-01836-7"},{"key":"e_1_2_1_18_1","volume-title":"Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems","volume":"3","author":"Hang Chung-Wei","unstructured":"Chung-Wei Hang , Yonghong Wang , and Munindar P. Singh . 2008. An adaptive probabilistic trust model and its evaluation . In Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems , Volume 3 . 1485--1488. Chung-Wei Hang, Yonghong Wang, and Munindar P. Singh. 2008. An adaptive probabilistic trust model and its evaluation. In Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems, Volume 3. 1485--1488."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2012.6197504"},{"key":"e_1_2_1_21_1","volume-title":"Proceedings of the 29th Australasian Computer Science Conference","volume":"48","author":"J\u00f8sang Audun","year":"2006","unstructured":"Audun J\u00f8sang , Ross Hayward , and Simon Pope . 2006 . Trust network analysis with subjective logic . In Proceedings of the 29th Australasian Computer Science Conference , Volume 48 . 85--94. Audun J\u00f8sang, Ross Hayward, and Simon Pope. 2006. Trust network analysis with subjective logic. In Proceedings of the 29th Australasian Computer Science Conference, Volume 48. 85--94."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775242"},{"volume-title":"Proceedings of the 25th AAAI Conference on Artificial Intelligence. 1222--1229","author":"Liu Guanfeng","key":"e_1_2_1_23_1","unstructured":"Guanfeng Liu , Yan Wang , and Mehmet A. Orgun . 2011b. Trust transitivity in complex social networks . In Proceedings of the 25th AAAI Conference on Artificial Intelligence. 1222--1229 . Guanfeng Liu, Yan Wang, and Mehmet A. Orgun. 2011b. Trust transitivity in complex social networks. In Proceedings of the 25th AAAI Conference on Artificial Intelligence. 1222--1229."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.03.006"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2968216"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2015.2510403"},{"key":"e_1_2_1_27_1","volume-title":"Retrieved","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A Peer-to-Peer Electronic Cash System . Retrieved March 14, 2018, from https:\/\/bitcoin.org\/bitcoin.pdf. Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. Retrieved March 14, 2018, from https:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.03.003"},{"key":"e_1_2_1_29_1","volume-title":"Retrieved","author":"Pava Moses L.","year":"2013","unstructured":"Moses L. Pava . 2013 . Auditing: Accounting . Retrieved March 14, 2018, from http:\/\/www.britannica.com\/EBchecked\/topic\/42575\/auditing. Moses L. Pava. 2013. Auditing: Accounting. Retrieved March 14, 2018, from http:\/\/www.britannica.com\/EBchecked\/topic\/42575\/auditing."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.225"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.38"},{"key":"e_1_2_1_32_1","volume-title":"Decentralized Applications: Harnessing Bitcoin\u2019s Blockchain Technology. O\u2019Reilly Media.","author":"Raval Siraj","year":"2016","unstructured":"Siraj Raval . 2016 . Decentralized Applications: Harnessing Bitcoin\u2019s Blockchain Technology. O\u2019Reilly Media. Siraj Raval. 2016. Decentralized Applications: Harnessing Bitcoin\u2019s Blockchain Technology. O\u2019Reilly Media."},{"key":"e_1_2_1_33_1","volume-title":"Retrieved","author":"Saran Cliff","year":"2014","unstructured":"Cliff Saran . 2014 . Tim Berners-Lee: Data Sharing Needs Accountability . Retrieved March 14, 2018, from http:\/\/www.computerweekly.com\/news\/2240232292\/Tim-Berners-Lee-Data-sharing-needs-accountability. Cliff Saran. 2014. Tim Berners-Lee: Data Sharing Needs Accountability. Retrieved March 14, 2018, from http:\/\/www.computerweekly.com\/news\/2240232292\/Tim-Berners-Lee-Data-sharing-needs-accountability."},{"key":"e_1_2_1_34_1","first-page":"171","article-title":"Camouflage of network traffic to resist attack","volume":"7","author":"Shu Li","year":"2007","unstructured":"Li Shu and William Weinstein . 2007 . Camouflage of network traffic to resist attack . US Patent 7 , 171 ,493. Li Shu and William Weinstein. 2007. Camouflage of network traffic to resist attack. US Patent 7,171,493.","journal-title":"US Patent"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622012500113"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-015-0298-5"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/2016945.2016952"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1349026.1349043"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.futures.2016.11.010"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134439","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134439","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:10Z","timestamp":1750217410000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134439"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,24]]},"references-count":38,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,11,30]]}},"alternative-id":["10.1145\/3134439"],"URL":"https:\/\/doi.org\/10.1145\/3134439","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"type":"print","value":"1533-5399"},{"type":"electronic","value":"1557-6051"}],"subject":[],"published":{"date-parts":[[2018,4,24]]},"assertion":[{"value":"2017-01-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-08-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-04-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}