Privacy-preserving data sharing scheme over cloud for social applications

被引:6
作者
Lyu, Chen [1 ]
Sun, Shi-Feng [2 ]
Zhang, Yuanyuan [2 ]
Pande, Amit [3 ]
Lu, Haining [2 ]
Gu, Dawu [2 ]
机构
[1] Shanghai Univ Finance & Econ, Sch Informat Management & Engn, Shanghai 200433, Peoples R China
[2] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[3] Univ Calif Davis, Dept Comp Sci, Davis, CA 95616 USA
基金
国家教育部博士点专项基金资助; 中国国家自然科学基金;
关键词
Social applications; Cloud storage servers; Privacy; Access control; Searchable encryption;
D O I
10.1016/j.jnca.2016.08.006
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Social applications are becoming one of the most popular applications for users to share data and communicate online. These applications deal with a lot of personal data, e.g., users' locations, interests and documents stored on the remote cloud storage servers. Therefore, we need to pay a deeper attention to data confidentiality and privacy. To address the problem of data confidentiality, existing solutions usually count the security requirement of data owner for data sharing in social applications. However, on the side of the data consumer or member, we want to securely and efficiently get our own interested data. Both the data owner and the member are two roles of users in data sharing applications, and there are little existing research efforts to investigate the implementation of achieving both of their requirements at the same time. In this paper, we propose DASS, a privacy-preserving DAta Sharing Scheme to comprehensively satisfy users' security requirements for social applications. Our solution consists of a fine-grained access control scheme, a dynamic social attribute management model, and a multi-user searchable encryption scheme. We have described our scheme and provided performance evaluation. Validations are done to demonstrate that our scheme is secure, fine-grained and efficient. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:44 / 55
页数:12
相关论文
共 34 条
[1]  
[Anonymous], 1996, SECURE SCHEMES SECRE
[2]  
[Anonymous], 2008, P 1 WORKSH ONL SOC N
[3]  
[Anonymous], 2009, NDSS
[4]  
Baden R, 2009, SIGCOMM 2009, P135
[5]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[6]  
Boldyreva A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P417
[7]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3621, P258
[8]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[9]   Social Network Sites: Definition, History, and Scholarship [J].
Boyd, Danah M. ;
Ellison, Nicole B. .
JOURNAL OF COMPUTER-MEDIATED COMMUNICATION, 2007, 13 (01) :210-230
[10]  
Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456