TY - GEN
T1 - Resource Access Control in the Facebook Model
AU - Chronopoulos, Konstantinos
AU - Gouseti, Maria
AU - Kiayias, Aggelos
PY - 2013
Y1 - 2013
N2 - We study the fundamental security properties of resource access control as suggested by the operation of current social networks including Facebook. The “facebook model”, which treats the server as a trusted party, suggests two fundamental properties, “owner privacy” and “server consistency”, and two different modes of revocation, implicit and explicit. Through black-box experimentation, we determine Facebook’s implementation for resource access control and we analyze its security properties within our formal model. We demonstrate, by the construction of explicit attacks, that the current implementation is not secure: specifically, we attack privacy with implicit revocation and server consistency. We evaluate the implications of the attacks and we propose amendments that can align the current implementation with all its intended security properties. To the best of our knowledge this is the first time that a security analysis of the Facebook resource access control mechanism is performed within a proper security model.
AB - We study the fundamental security properties of resource access control as suggested by the operation of current social networks including Facebook. The “facebook model”, which treats the server as a trusted party, suggests two fundamental properties, “owner privacy” and “server consistency”, and two different modes of revocation, implicit and explicit. Through black-box experimentation, we determine Facebook’s implementation for resource access control and we analyze its security properties within our formal model. We demonstrate, by the construction of explicit attacks, that the current implementation is not secure: specifically, we attack privacy with implicit revocation and server consistency. We evaluate the implications of the attacks and we propose amendments that can align the current implementation with all its intended security properties. To the best of our knowledge this is the first time that a security analysis of the Facebook resource access control mechanism is performed within a proper security model.
U2 - 10.1007/978-3-319-02937-5_10
DO - 10.1007/978-3-319-02937-5_10
M3 - Conference contribution
SN - 978-3-319-02936-8
T3 - Lecture Notes in Computer Science (LNCS)
SP - 179
EP - 198
BT - Cryptology and Network Security
PB - Springer
ER -