Abstract
In mobile social networks, based on secret sharing and CP-ABE, focusing on the security and privacy issues of friend discovery, we propose a matching scheme under different authorities and realize cross domain data access and sharing. By using proxy re-encryption technology, we hide users’ access policy, which can guarantee the security and privacy in the friend making process. Because agents attend encryption and decryption, the privacy can be largely enhanced and the bottleneck of single authority also will be solved. Security and performance analysis show that the relationship of ciphertext’s size and access policy is linear, which can resist collusion attack and meet CPA security, our scheme is superior to the existing schemes.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Guo, L., Zhang, C., Sun, J., et al.: A privacy-preserving attribute-based authentication system for mobile health networks. IEEE Trans. Mob. Comput. 13(9), 1927–1941 (2014)
Colman-Meixner, C., Develder, C., Tornatore, M., et al.: A survey on resiliency techniques in cloud computing infrastructures and applications. IEEE Commun. Surv. Tutorials 18(3), 2244–2281 (2016)
Luo, E., Liu, Q., Wang, G.: Hierachical multi-authority and attribute-based encryption friend discovery scheme in mobile social networks. IEEE Commun. Lett. 20(9), 1772–1775 (2016)
Xu, Q., Su, Z., Guo, S.: A game theoretical incentive scheme for relay selection services in mobile social networks. IEEE Trans. Veh. Technol. 65(8), 6692–6702 (2015)
Salih, R.M., Lilien, L.T.: Protecting users’ privacy in healthcare cloud computing with APB-TTP. In: IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), 2015, pp. 236–238 (2015)
Manweiler, J., Scudellari, R., Cox, L.P.: SMILE: encounter-based trust for mobile social services. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 246–255 (2009)
Ge, A., Zhang, J., Zhang, R., et al.: Security analysis of a privacy-preserving decentralized key-policy attribute-based encryption scheme. IEEE Trans. Parallel Distrib. Syst. 24(11), 2319–2321 (2013)
Dong, W., Dave, V., Qiu, L., et al.: Secure friend discovery in mobile social networks. In: Proceedings of IEEE INFOCOM 2011, pp. 1647–1655 (2011)
Freedman, M.J., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 1–19 (2004)
Kissner, L., Song, D.: Privacy-preserving set operations. In: Annual International Cryptology Conference, pp. 241–257 (2005)
Sang, Y., Shen, H.: Efficient and secure protocols for privacy-preserving set operations. ACM Trans. Inf. Syst. Secur. 13(1), 315–326 (2009)
Cristofaro, E., Kim, J., Tsudik, G.: Linear-complexity private set intersection protocols secure in malicious model. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 213–231. Springer, Heidelberg (2010). doi:10.1007/978-3-642-17373-8_13
Li, M., Cao, N., Yu, S., et al.: Findu: privacy-preserving personal profile matching in mobile social networks. In: Proceedings of IEEE INFOCOM 2011, pp. 2435–2443 (2011)
Guo, L., Liu, X., Fang, Y., et al.: User-centric private matching for ehealth networks-a social perspective. In: IEEE Global Communications Conference (GLOBECOM), pp. 732–737 (2012)
Zhang, R., Zhang, Y., Sun, J., et al.: Fine-grained private matching for proximity-based mobile social networking. In: Proceedings of IEEE INFOCOM 2012, pp. 1969–1977 (2012)
Niu, B., Zhu, X., Liu, J., et al.: Weight-aware private matching scheme for proximity-based mobile social networks. In: IEEE Global Communications Conference (GLOBECOM), pp. 3170–3175 (2013)
Zhu, X., Chen, Z., Chi, H., et al.: Two-party and multi-party private matching for proximity-based mobile social networks. In: IEEE 2014 International Conference on Communications (ICC), pp. 926–931 (2014)
Zhou, Z., Huang, D., Wang, Z.: Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption. IEEE Trans. Comput. 64(1), 126–138 (2015)
Wang, J., Lang, B.: An efficient KP-ABE scheme for content protection in information-centric networking. In: 2016 IEEE Symposium on Computers and Communication (ISCC), pp. 830–837 (2016)
Touati, L., Challal, Y.: Collaborative KP-ABE for cloud-based internet of things applications. In: 2016 IEEE International Conference on Communications ICC, pp. 1–7 (2016)
Liu, P., Wang, J., Ma, H., et al.: Efficient verifiable public key encryption with keyword search based on KP-ABE. In: 2014 Ninth International Conference on Broadband and Wireless Computing (BWCCA), pp. 584–589 (2014)
Okamoto, T., Takashima, K.: Fully secure functional encryption with general relations from the decisional linear assumption. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 191–208. Springer, Heidelberg (2010). doi:10.1007/978-3-642-14623-7_11
Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: International Workshop on Public Key Cryptography, pp. 53–70 (2011)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy (SP 2007), pp. 321–334 (2007)
Ramesh, D., Priya, R.: Multi-authority scheme based CP-ABE with attribute revocation for cloud data storage. In: IEEE 2016 International Conference on Microelectronics, Computing and Communications (MicroCom), pp. 1–4 (2016)
Acknowledgments
This work is supported in part by the National Natural Science Foundation of China under Grant Numbers 61632009, 61472451, 61272151. Hunan Provincial Natural Science Foundation of China under Grant Numbers 2016JJ305. High Level Talents Program of Higher Education in Guangdong Province under Funding Support Number 2016ZJ01. The Fundamental Research Funds for the Central Universities of Central South University 2016zzts060. The Hunan Provincial Education Department of China under grant number 2015C0589.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Luo, E., Wang, W., Meng, D., Wang, G. (2016). A Privacy Preserving Friend Discovery Strategy Using Proxy Re-encryption in Mobile Social Networks. In: Wang, G., Ray, I., Alcaraz Calero, J., Thampi, S. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2016. Lecture Notes in Computer Science(), vol 10066. Springer, Cham. https://doi.org/10.1007/978-3-319-49148-6_17
Download citation
DOI: https://doi.org/10.1007/978-3-319-49148-6_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-49147-9
Online ISBN: 978-3-319-49148-6
eBook Packages: Computer ScienceComputer Science (R0)