期刊文献+

支持多授权中心的移动社交网络朋友发现方案

Friends Discovery Scheme Supporting Multi-authority Centers in Mobile Social Networks
下载PDF
导出
摘要 社交网络的朋友发现机制容易导致用户隐私泄漏。为使用户得到良好的在线社交体验并确保其隐私数据安全,利用属性基加密和代理重加密技术,提出一种支持多授权中心与隐私保护的移动社交网络朋友发现方案。用户属性私钥由多个授权中心联合分发,以解决单授权机构的性能瓶颈问题。借助解密外包和固定密文加密技术减少用户的计算时间和存储开销。在此基础上,引入线性秘密共享矩阵,从而进行灵活的资源访问控制。分析结果表明,与已有的同类方案相比,该方案具有较低的计算复杂度和较灵活的用户撤销机制。 The friends discovery mechanism of social network is easy to lead to user privacy leaks. For users to get good online social experience and ensure the security of users' privacy data,using attribute-based encryption and agent re encryption technology,a mobile social network friends discovery scheme that supports multi-authority centers and privacy protection is proposed. User attribute private key is distributed by multi-authority centers to solve the performance bottleneck problem of single authority. With the help of decryption outsourcing and fixed ciphertext encryption technology,the computation time and storage cost of users are reduced. The linear secret sharing matrix is introduced and flexible resource access control strategy can be implemented. Analysis results show that the scheme has lower computational complexity and better user revocation mechanism compared with existing similar schemes.
作者 杨小东 杨苗苗 安发英 肖立坤 王彩芬 YANG Xiaodong;YANG Miaomiao;AN Faying;XIAO Likun;WANG Caifen(College of Computer Science and Engineering,Northwest Normal University,Lanzhou 730070,China;State Key Laboratory of Cryptology,Beijing 100878,China)
出处 《计算机工程》 CAS CSCD 北大核心 2018年第7期166-171,共6页 Computer Engineering
基金 国家自然科学基金(61662069 61262057 61562077) 中国博士后科学基金(2017M610817) 国家档案局科技计划项目(2014-X-33) 甘肃省科技计划项目(145RJDA325 1506RJZA130) 甘肃省高等学校科研项目(2014-A011) 兰州市科技计划项目(2013-4-22) 西北师范大学青年教师科研能力提升计划项目(WNU-LKQN-14-7)
关键词 移动社交网络 朋友发现 隐私保护 属性基加密 多授权中心 mobile social networks friends discovery privacy protection attribute-based encryption multi-authority centers
  • 相关文献

参考文献12

二级参考文献157

  • 1刘宴兵,刘飞飞.基于云计算的智能手机社交认证系统[J].通信学报,2012,33(S1):28-34. 被引量:7
  • 2吴吉义,沈千里,章剑林,沈忠华,平玲娣.云计算:从云安全到可信云[J].计算机研究与发展,2011,48(S1):229-233. 被引量:54
  • 3中国互联网络信息中心.第31次中国互联网络发展状况统计报告[ R].北京:中国互联网络信息中心,2012.4-5.
  • 4LEE C, LI C, CHANG R. A simple and efficient authentication scheme for mobile satellite communication systems[J]. InternationalJournal of Satellite Communications and Networking, 2012, 30(1): 29-38.
  • 5CHOW R,JAKOBSSON M, MASUOKA R, et al. Authentication in the clouds: a framework and its application to mobile users[A]. Pro?ceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop (CCSW)[C]. Chicago, USA, 2010.1-6.
  • 6YU S, WANG C, REN K, et al. Attribute based data sharing with attribute revocation[A]. Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS)[C]. Beijing, China, 2010.261-270.
  • 7LIJ, ZHAO G, CHEN X, et al. Fine-grained data access control sys?tems with user accountability in cloud computing[A]. Proceedings of the 2th International Conference on Cloud Computing (CloudCom)[C]. Indianapolis, USA, 2010.89-96.
  • 8ECHEVERRIA V, LIEBROCK L M, SHIN D. Permission manage?ment system: permission as a service in cloud computing[A]. The 34th Annual IEEE Computing Software and Applications Conference Workshops (COMPSAC)[C]. Seoul, South Korea, 2010.371-375.
  • 9UNAL D, CAGLAYAN M U. A formal role-based access control model for security policies in multi-domain mobile networks[J]. Computer Networks, 2013, 57(1): 330-350.
  • 10SHINJ, KIM Y, PARK W, et al. DFCloud: a TPM-based secure data access control method of cloud storage in mobile devices[A]. The 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings (CloudCom)[C]. 2012.

共引文献406

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部