Fine-Grained Secure Friend Discovery Scheme in Mobile Social Networks

被引:0
|
作者
Luo E.-T. [1 ,2 ]
Wang G.-J. [1 ]
Liu Q. [3 ]
Meng D.-C. [2 ]
机构
[1] School of Computer Science and Educational Software, Guangzhou University, Guangzhou
[2] School of Information Science and Engineering, Central South University, Changsha
[3] College of Computer Science and Engineering, Hu'nan University, Changsha
来源
Wang, Guo-Jun (csgjwang@gmail.com) | 2018年 / Chinese Academy of Sciences卷 / 29期
基金
中国国家自然科学基金; 湖南省自然科学基金;
关键词
Attribute-based encryption; Ciphertext-policy access control; Multi-authority; Opportunity calculation; Privacy-preserving;
D O I
10.13328/j.cnki.jos.005295
中图分类号
学科分类号
摘要
In mobile social networks, users can look for friends by matching their attributes. In order to solve the problem that the user's attribute is easy to be stolen by the attackers in the single authority center and performance bottleneck occurs in the peak of service, this work proposes a scheme where a multi-attribute management center hierarchically manages user attributes' sub-keys. The scheme involves several attribute centers which perform fine-grained management on different user attributes. After the friend requester's attributes meet the friend access control policy of the friend-making initiator, the friend requester can correctly combine the sub-keys into a complete decryption key and decrypt the user's data file to store in the friend-making server. By introducing hierarchical management in terms of attribute sub-keys, the proposed scheme not only effectively prevents key disclosure when the single-authority management center suffers from attacks, but also improves the computation efficiency of friend profile matching through cooperative work of multiple attribute center. Experiments are conducted to check whether the proposed scheme can challenge the chosen plaintext attack, and certify that the scheme can achieve CPA secure level while effectively protecting the user's privacy security. Extensive comparisons with existing schemes demonstrate the ability of the proposed scheme to entail the lowest computational overheads and provide excellent user experience. © Copyright 2018, Institute of Software, the Chinese Academy of Sciences. All rights reserved.
引用
收藏
页码:3223 / 3238
页数:15
相关论文
共 32 条
  • [1] Fu Y.Y., Zhang M., Feng D.G., Chen K.Q., Attribute privacy preservation in social networks based on node anatomy, Ruan Jian Xue Bao/Journal of Software, 25, 4, pp. 768-780, (2014)
  • [2] Zhang L., Li X.Y., Liu Y., Message in a sealed bottle: Privacy preserving friending in social networks, IEEE Trans. on Mobile Computing, 14, 9, pp. 1888-1902, (2015)
  • [3] Wang Y., Vasilakos A.V., Jin Q., Survey on mobile social networking in proximity (MSNP): Approaches, challenges and architecture, Wireless Networks, 20, 6, pp. 1295-1311, (2013)
  • [4] Guo L., Zhang C., Sun J., A privacy-preserving attribute-based authentication system for mobile health networks, IEEE Trans. on Mobile Computing, 13, 9, pp. 1927-1941, (2014)
  • [5] Guo L., Zhu X., Zhang C., Privacy-Preserving attribute-based friend search in geosocial networks with untrusted servers, Proc. of the Int'l Conf. Global Communications Conf, pp. 629-634, (2013)
  • [6] Lu R., Lin X., Liang X., Shen X., A secure handshake scheme with symptoms-matching for healthcare social network, Mobile Networks and Applications, 16, 6, pp. 683-694, (2011)
  • [7] Sarpong S., Xu C., A secure and efficient privacy-preserving attribute matchmaking protocol in proximity-based mobile social networks, Proc. of the Int'l Conf. Advanced Data Mining and Applications, pp. 305-318, (2014)
  • [8] Li M., Cao N., Yu S., Lou W., Findu: Privacy-Preserving personal profile matching in mobile social networks, Proc. of the Int'l Conf. Computer Communications (INFOCOM), pp. 2435-2443, (2011)
  • [9] Yan Z., Ding W., Niemi V., Two schemes of privacy-preserving trust evaluation, Future Generation Computer Systems, 62, pp. 175-189, (2015)
  • [10] Kiraz M.S., Genc Z.A., Kardas S., Security and efficiency analysis of the Hamming distance computation protocol based on oblivious transfer, Security & Communication Networks, 8, 18, pp. 4123-4135, (2015)