Protect Pervasive Social Networking Based on Two-Dimensional Trust Levels

被引:21
作者
Yan, Zheng [1 ,2 ]
Wang, Mingjun [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Aalto Univ, Dept Comnet, Espoo 02150, Finland
来源
IEEE SYSTEMS JOURNAL | 2017年 / 11卷 / 01期
关键词
Access control; mobile ad hoc network (MANET); pervasive social networking (PSN); trust; trust level; AD HOC NETWORKS; MOBILE;
D O I
10.1109/JSYST.2014.2347259
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Social networking has extended its popularity from the Internet to mobile domains. Nowadays, the Internet can work collaboratively with cellular networks and self-organized mobile ad hoc networks to offer advanced pervasive social networking (PSN) at any time and in any place. It is important to secure data communications in PSN for protecting crucial instant social activities and supporting reliable social computing and data mining. Obviously, trust plays an important role in PSN for reciprocal activities among strangers. It helps people overcome perceptions of uncertainty and risk and engages in trusted social behaviors. In this paper, we utilize two dimensions of trust levels evaluated by either a trusted server or individual PSN nodes or both to control PSN data access in a heterogeneous manner on the basis of attribute-based encryption. We formally prove the security of our scheme and analyze its communication and computation complexity. Extensive analysis and performance evaluation based on implementation show that our proposed scheme is highly efficient and provably secure under relevant system and security models.
引用
收藏
页码:207 / 218
页数:12
相关论文
共 21 条
[1]   AWARENESS NETWORKING IN WIRELESS ENVIRONMENTS [J].
Ahtiainen, Ari ;
Kalliojarvi, Kari ;
Kasslin, Mika ;
Leppanen, Kari ;
Richter, Andreas ;
Ruuska, Paivi ;
Wijting, Carl .
IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2009, 4 (03) :48-54
[2]  
Beach Aaron, 2009, 2009 International Conference on Computational Science and Engineering (CSE), P1036, DOI 10.1109/CSE.2009.243
[3]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[4]   Analyzing Privacy Designs of Mobile Social Networking Applications [J].
Chen, Guanling ;
Rahman, Faruq .
EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, :83-88
[5]   Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey [J].
Govindan, Kannan ;
Mohapatra, Prasant .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2012, 14 (02) :279-298
[6]  
Goyal V., 2006, 13 ACM CONFCOMPUT CO, P89, DOI DOI 10.1145/1180405.1180418
[7]   URSA: Ubiquitous and robust access control for mobile ad hoc networks [J].
Luo, HY ;
Kong, JJ ;
Zerfos, P ;
Lu, SW ;
Zhang, LX .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2004, 12 (06) :1049-1063
[8]   The evolution of trust and cooperation between strangers: A computational model [J].
Macy, MW ;
Skvoretz, J .
AMERICAN SOCIOLOGICAL REVIEW, 1998, 63 (05) :638-660
[9]  
Miluzzo E, 2008, SENSYS'08: PROCEEDINGS OF THE 6TH ACM CONFERENCE ON EMBEDDED NETWORKED SENSOR SYSTEMS, P337
[10]  
Müller S, 2009, LECT NOTES COMPUT SC, V5461, P20, DOI 10.1007/978-3-642-00730-9_2