Service independent access control architecture for user generated content (UGC) and its implementation

Akira Yamada*, Ayumu Kubota, Yutaka Miyake, Kazuo Hashimoto

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review


Using Web-based content management systems such as Blog, an end user can easily publish User Generated Content (UGC). Although publishing of UGCs is easy, controlling access to them is a difficult problem for end users. Currently, most of Blog sites offer no access control mechanism, and even when it is available to users, it is not sufficient to control users who do not have an account at the site, not to mention that it cannot control accesses to content hosted by other UGC sites. In this paper, we propose new access control architecture for UGC, in which third party entities can offer access control mechanism to users independently of UGC hosting sites. With this architecture, a user can control accesses to his content that might be spread over many different UGC sites, regardless of whether those sites have access control mechanism or not. The key idea to separate access control mechanism from UGC sites is to apply cryptographic access control and we implemented the idea in such a way that it requires no modification to UGC sites and Web browsers. Our prototype implementation shows that the proposed access control architecture can be easily deployed in the current Web-based communication environment and it works quite well with popular Blog sites.

Original languageEnglish
Pages (from-to)1961-1970
Number of pages10
JournalIEICE Transactions on Information and Systems
Issue number10
Publication statusPublished - 2009
Externally publishedYes


  • Blog and cryptographic access control
  • User Generated Content (UGC)
  • Web

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Computer Vision and Pattern Recognition
  • Electrical and Electronic Engineering
  • Artificial Intelligence


Dive into the research topics of 'Service independent access control architecture for user generated content (UGC) and its implementation'. Together they form a unique fingerprint.

Cite this