Secure Pervasive Social Communications Based on Trust in a Distributed Way

被引:9
作者
Huang, Chaoyin [1 ]
Yan, Zheng [1 ,2 ]
Li, Ning [1 ]
Wang, Mingjun [1 ]
机构
[1] Xidian Univ, Sch Cyber Engn, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Aalto Univ, Dept Commun & Networking, Espoo 02150, Finland
来源
IEEE ACCESS | 2016年 / 4卷
关键词
Trust; social networking; data access control; attribute-based encryption; PRACTICAL REPUTATION SYSTEM; NETWORKING; ACCEPTANCE;
D O I
10.1109/ACCESS.2017.2647824
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Social network has extended its popularity from the Internet to mobile domain. Pervasive social networking (PSN) supports instant social activities based on self-organized mobile ad hoc networks. PSN is useful in reality when fixed networks are unavailable or inconvenient to access or when people are in vicinity. For supporting crucial PSN activities and enhancing user privacy, securing pervasive social communications becomes important. However, a solution based on a centralized server could be inapplicable in some specific situations (e.g., disasters and military activities) and suffers from DoS/DDoS attacks and internal attacks. How to automatically control data access in a trustworthy and efficient way in PSN is a challenge. In this paper, we propose two schemes to secure communication data in PSN purely based on local trust evaluated by PSN nodes in a distributed manner. Each node can control its data based on its trust in other nodes by applying attribute-based encryption. The advantages, security, and performance of the proposed scheme are evaluated and justified through serious analysis and implementation. The results show the efficiency and effectiveness of the schemes. In addition, we developed a mobile app based on Android platform to demonstrate the applicability and social acceptance of our schemes.
引用
收藏
页码:9225 / 9238
页数:14
相关论文
共 30 条
[1]   AWARENESS NETWORKING IN WIRELESS ENVIRONMENTS [J].
Ahtiainen, Ari ;
Kalliojarvi, Kari ;
Kasslin, Mika ;
Leppanen, Kari ;
Richter, Andreas ;
Ruuska, Paivi ;
Wijting, Carl .
IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2009, 4 (03) :48-54
[2]   TACIoT: multidimensional trust-aware access control system for the Internet of Things [J].
Bernal Bernabe, Jorge ;
Hernandez Ramos, Jose Luis ;
Skarmeta Gomez, Antonio F. .
SOFT COMPUTING, 2016, 20 (05) :1763-1779
[3]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[4]   An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks [J].
Chatterjee, Santanu ;
Das, Ashok Kumar .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (09) :1752-1771
[5]   Trust threshold based public key management in mobile ad hoc networks [J].
Cho, Jin-Hee ;
Chen, Ing-Ray ;
Chan, Kevin S. .
AD HOC NETWORKS, 2016, 44 :58-75
[6]  
Chow R., 2009, Proceedings of the 2009 ACM workshop on Cloud computing security, CCSW '09, P85, DOI DOI 10.1145/1655008.1655020
[8]  
Gaonkar S, 2008, MOBISYS'08: PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, P174
[9]  
Goh E.jin., 2003, PROC NETWORK DISTRIB, P131
[10]  
Goyal V., 2006, 13 ACM CONFCOMPUT CO, P89, DOI DOI 10.1145/1180405.1180418