An Efficient and Secure User Revocation Scheme in Mobile Social Networks

被引:0
|
作者
Liang, Xiaohui [1 ]
Li, Xu [1 ,3 ]
Lu, Rongxing [1 ]
Lin, Xiaodong [2 ]
Shen, Xuemin [1 ]
机构
[1] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
[2] Univ Western Ontario, Fac Business & Informat Technol, Inst Technol, London, ON N6A 3K7, Canada
[3] INRIA Lille, Villeneuve Dascq, France
关键词
Mobile social network; data encryption; user revocation; collusion attacks;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Mobile social network (MSN) is a promising networking and communication platform for users having similar interests (or attributes) to connect and interact with one another. For many recently introduced secure MSN data communication schemes, attribute-based encryption is often adopted to preserve user privacy and prevent outside attackers from eavesdropping. In this paper, we propose an efficient and secure user revocation scheme to address inside attacks based on an attribute-based encryption technique. The proposed scheme enables a trusted authority (TA) to flexibly control the data decryption capability of mobile social users. It disables malicious users from decrypting any data packet. As a result, proper user behavior is encouraged, inside attacks are reduced, and network security is enhanced. Through the analysis, we demonstrate that the proposed user revocation scheme is able to resist attribute collusion attacks and revoke collusion attacks. Extensive simulation results further confirm that the proposed scheme has much smaller communication overhead and much shorter delay than the existing solution [1].
引用
收藏
页数:5
相关论文
共 50 条
  • [1] SECRET: A Secure and Efficient Certificate Revocation Scheme for Mobile Ad Hoc Networks
    Mall, Dieynaba
    Konate, Karim
    Pathan, Al-Sakib Khan
    2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 137 - 143
  • [2] User revocation in secure adhoc networks
    Bruhadeshwar, B
    Kulkarni, SS
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2005, 3816 : 377 - 388
  • [3] Efficient public auditing scheme for non-administrator group with secure user revocation
    Chen, Jinliang
    Zhou, Tianqi
    Ji, Sai
    Tan, Haowen
    Zheng, Wenying
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 80
  • [4] Efficient secure group signature scheme with revocation
    Zhu, Rongbo
    Liu, Xiaozhu
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 787 - +
  • [5] Secure deduplication with efficient user revocation in cloud storage
    Wang, Yunling
    Miao, Meixia
    Wang, Jianfeng
    Zhang, Xuefeng
    COMPUTER STANDARDS & INTERFACES, 2021, 78 (78)
  • [6] Secure and Efficient Data Sharing with User Revocation in Cloud
    Mallela, Nalini Sri
    Devarakonda, Nagaraju
    ADVANCED COMPUTATIONAL AND COMMUNICATION PARADIGMS, VOL 2, 2018, 706 : 563 - 573
  • [7] A Privacy-Preserving Scheme for Online Social Networks with Efficient Revocation
    Sun, Jinyuan
    Zhu, Xiaoyan
    Fang, Yuguang
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [8] AN EFFICIENT FORWARD SECURE GROUP SIGNATURE SCHEME WITH REVOCATION
    Sun Huihui Chen Shaozhen (Department of Applied Mathematics
    Journal of Electronics(China), 2008, (06) : 797 - 802
  • [9] A Secure and Efficient Revocation Scheme for Anonymous Vehicular Communications
    Sun, Yipin
    Lu, Rongxing
    Lin, Xiaodong
    Shen, Xuemin
    Su, Jinshu
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS - ICC 2010, 2010,
  • [10] An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks
    Soobok Shin
    Hongjin Yeh
    Kangseok Kim
    Peer-to-Peer Networking and Applications, 2015, 8 : 674 - 683