Controlled Information Sharing in Online Social Networks



What is Controlled Information Sharing?

Controlled Information Sharing

Controlled Information Sharing means:

  • You decide who can see your information

  • You decide what information to share

  • You decide when to share

Simple meaning

  • Not everyone can see everything you post.

Social media example

  • On Instagram, you choose who can see your story.

  • On WhatsApp, you choose who can see your profile photo.

Why This Topic is Important

  • Protects privacy

  • Avoids misuse of data

  • Keeps personal life safe

College example

  • You share notes only with classmates, not with strangers.

Access Control Models

Access Control Models

What is Access Control?

Access control means:

  • Rules that decide who can access what

Very simple words

  • Permission system

Daily life example

  • Hostel room key: only your room members can enter.

Types of Access Control Models

1. Owner-Based Control

  • Owner decides access

  • You control your own data

Example

  • You decide who can see your Facebook post.

2. Group-Based Control

  • Access depends on the group

Example

  • College WhatsApp group messages are visible only to group members.

3. Rule-Based Control

  • The system follows fixed rules

Example

  • Instagram automatically hides messages from unknown users.

Exam Tip 📝

  • Access control = permission rules

  • Owners, groups, and rules are common models

Access Control in Online Social Networks

Access Control in Online Social Networks

How Access Control Works in OSNs

OSN = Online Social Network (like Facebook, Instagram)

Steps:

  • User creates content

  • User selects privacy option

  • System checks rules

  • Content is shown or hidden

Common Access Options

  • Public

  • Friends only

  • Friends of friends

  • Private

Social media example

  • Instagram post set to “Friends only”

Why OSNs Need Access Control

  • Millions of users

  • Personal data involved

  • Risk of misuse

Relationship-Based Access Control (ReBAC)

What is Relationship-Based Access Control?

Big name, simple idea 👇
Access depends on relationship between users.

Relationship means:

  • Friend

  • Family

  • Classmate

  • Colleague

How ReBAC Works

  • System checks your relationship

  • Then gives access

Example

  • Only friends can see your WhatsApp status.

  • Only classmates can see class group messages.

Real-Life Example

  • Teacher shares marks only with students.

  • Parents group cannot see student-only messages.

Remember This 📌

  • ReBAC focuses on who you are connected to

  • Very common in social media apps

Privacy Settings in Commercial Online Social Networks

Privacy Settings in Commercial Online Social Networks

What are Privacy Settings?

Options that help users:

  • Control visibility

  • Protect personal data

Common Privacy Settings

Setting Meaning Example
Public Anyone can see Twitter posts
Friends Only friends Facebook posts
Private Only you Draft posts

Examples from Apps

  • WhatsApp: “Last seen – My contacts”

  • Instagram: Private account

  • Facebook: Friends-only posts

Why Privacy Settings Matter

  • Stop strangers

  • Avoid stalking

  • Protect photos and details

Exam Tip 📝

  • Privacy settings = main tool for controlled sharing

Existing Access Control Approaches

1. Simple List-Based Control

  • User selects allowed people

Example

  • WhatsApp broadcast list

2. Role-Based Control

  • Access based on role

Role means position or job.

College example

  • Admin can edit data

  • A student can only view

3. Relationship-Based Control

  • Based on the connection type

Example

  • LinkedIn shows job posts to connections

Comparison Table

Approach Based On Example
List-based Selected users WhatsApp list
Role-based Position Admin vs Student
Relationship-based Connection Friends only

Problems in Access Control

Common Issues

  • Complex settings

  • User confusion

  • Default public access

Example

  • User forgets to change privacy, the post becomes public.

Risks

  • Data misuse

  • Privacy loss

  • Fake profiles viewing data

Key Points to Remember 📌

  • Controlled sharing protects privacy

  • Access control decides visibility

  • Relationships play a big role

  • Privacy settings must be used carefully

Possible Exam Questions

Short Answer Questions

  1. Define controlled information sharing.

  2. What is access control?

  3. Explain relationship-based access control.

  4. What are privacy settings?

Long Answer Questions

  1. Explain access control models in online social networks.

  2. Describe relationship-based access control with examples.

  3. Discuss privacy settings in commercial social networks.

  4. Explain existing access control approaches.

Quick Revision Summary

  • Controlled sharing = You control your data

  • Access control = Permission rules

  • ReBAC = Access by relationship

  • Privacy settings = User safety tools

  • Goal = Safe and limited sharing

Final Memory Tip 🧠

👉 Post → Choose → Control → Protect

These notes are exam-ready, easy to revise, and beginner-friendly.