An Efficient and Secure User Revocation Scheme in Mobile Social Networks

被引:0
|
作者
Liang, Xiaohui [1 ]
Li, Xu [1 ,3 ]
Lu, Rongxing [1 ]
Lin, Xiaodong [2 ]
Shen, Xuemin [1 ]
机构
[1] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
[2] Univ Western Ontario, Fac Business & Informat Technol, Inst Technol, London, ON N6A 3K7, Canada
[3] INRIA Lille, Villeneuve Dascq, France
来源
2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011) | 2011年
关键词
Mobile social network; data encryption; user revocation; collusion attacks;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Mobile social network (MSN) is a promising networking and communication platform for users having similar interests (or attributes) to connect and interact with one another. For many recently introduced secure MSN data communication schemes, attribute-based encryption is often adopted to preserve user privacy and prevent outside attackers from eavesdropping. In this paper, we propose an efficient and secure user revocation scheme to address inside attacks based on an attribute-based encryption technique. The proposed scheme enables a trusted authority (TA) to flexibly control the data decryption capability of mobile social users. It disables malicious users from decrypting any data packet. As a result, proper user behavior is encouraged, inside attacks are reduced, and network security is enhanced. Through the analysis, we demonstrate that the proposed user revocation scheme is able to resist attribute collusion attacks and revoke collusion attacks. Extensive simulation results further confirm that the proposed scheme has much smaller communication overhead and much shorter delay than the existing solution [1].
引用
收藏
页数:5
相关论文
共 50 条
  • [41] ESAR: Enhanced Secure Authentication and Revocation Scheme for Vehicular Ad Hoc Networks
    Coruh, Uğur
    Bayat, Oğuz
    Journal of Information Security and Applications, 2022, 64
  • [42] Towards Secure Localized Certificate Revocation in Mobile Ad-Hoc Networks
    Masdari, Mohammad
    IETE TECHNICAL REVIEW, 2017, 34 (05) : 561 - 571
  • [43] A Lightweight Certificate Revocation Scheme for Hybrid Mobile ad Hoc Networks
    Xu, Huaqiang
    Wang, Rui
    Jia, Zhiping
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (01): : 287 - 302
  • [44] Public Integrity Auditing for Shared Data with Efficient and Secure User Revocation in Cloud Computing
    Gudeme, Jaya Rao
    Pasupuleti, Syam Kumar
    Kandukuri, Ramesh
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMMUNICATION AND COMPUTING TECHNOLOGY (ICACCT), 2018, : 588 - 593
  • [45] A Secure RFID Application Revocation Scheme for IoT
    Fan, Kai
    Du, Zhao
    Gong, Yuanyuan
    Wang, Yue
    Yan, Tongjiang
    Li, Hui
    Yang, Yintang
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (08): : 2027 - 2035
  • [46] A provable and secure mobile user authentication scheme for mobile cloud computing services
    Irshad, Azeem
    Chaudhry, Shehzad Ashraf
    Shafiq, Muhammad
    Usman, Muhammad
    Asif, Muhammad
    Ghani, Anwar
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (14)
  • [47] Energy Efficient and Secure Multi-User Broadcast Authentication Scheme in Wireless Sensor Networks
    Maidhili, Siri R.
    Karthik, G. M.
    2018 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2018,
  • [48] A Secure and Efficient Password-Based User Authentication Scheme for Hierarchical Wireless Sensor Networks
    Vorugunti, Chandra Sekhar
    Sarvabhatla, Mrudula
    PROCEEDINGS OF NINTH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR NETWORKS (WCSN 2013), 2014, 299 : 245 - 259
  • [49] Secure Electronic Cash Scheme with Anonymity Revocation
    Kang, Baoyuan
    Xu, Danhui
    MOBILE INFORMATION SYSTEMS, 2016, 2016
  • [50] An Efficient Secure scheme for Wireless Sensor Networks
    Elleuchi, Manel
    Cheikhrouhou, Omar
    Obeid, Abdulfattah M.
    Abid, Mohamed
    SECURITY OF INFORMATION AND NETWORKS (SIN'16), 2016, : 128 - 131