Secure Pervasive Social Communications Based on Trust in a Distributed Way

被引:9
作者
Huang, Chaoyin [1 ]
Yan, Zheng [1 ,2 ]
Li, Ning [1 ]
Wang, Mingjun [1 ]
机构
[1] Xidian Univ, Sch Cyber Engn, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Aalto Univ, Dept Commun & Networking, Espoo 02150, Finland
来源
IEEE ACCESS | 2016年 / 4卷
关键词
Trust; social networking; data access control; attribute-based encryption; PRACTICAL REPUTATION SYSTEM; NETWORKING; ACCEPTANCE;
D O I
10.1109/ACCESS.2017.2647824
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Social network has extended its popularity from the Internet to mobile domain. Pervasive social networking (PSN) supports instant social activities based on self-organized mobile ad hoc networks. PSN is useful in reality when fixed networks are unavailable or inconvenient to access or when people are in vicinity. For supporting crucial PSN activities and enhancing user privacy, securing pervasive social communications becomes important. However, a solution based on a centralized server could be inapplicable in some specific situations (e.g., disasters and military activities) and suffers from DoS/DDoS attacks and internal attacks. How to automatically control data access in a trustworthy and efficient way in PSN is a challenge. In this paper, we propose two schemes to secure communication data in PSN purely based on local trust evaluated by PSN nodes in a distributed manner. Each node can control its data based on its trust in other nodes by applying attribute-based encryption. The advantages, security, and performance of the proposed scheme are evaluated and justified through serious analysis and implementation. The results show the efficiency and effectiveness of the schemes. In addition, we developed a mobile app based on Android platform to demonstrate the applicability and social acceptance of our schemes.
引用
收藏
页码:9225 / 9238
页数:14
相关论文
共 30 条
[21]   Technology Acceptance Model 3 and a Research Agenda on Interventions [J].
Venkatesh, Viswanath ;
Bala, Hillol .
DECISION SCIENCES, 2008, 39 (02) :273-315
[22]   HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing [J].
Wan, Zhiguo ;
Liu, Jun'e ;
Deng, Robert H. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (02) :743-754
[23]   Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers [J].
Wang, Guojun ;
Liu, Qin ;
Wu, Jie ;
Guo, Minyi .
COMPUTERS & SECURITY, 2011, 30 (05) :320-331
[24]   Hierarchical Attribute-Based Encryption for Fine-Grained Access Controlin Cloud Storage Services [J].
Wang, Guojun ;
Liu, Qin ;
Wu, Jie .
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, :735-737
[25]   Protect Pervasive Social Networking Based on Two-Dimensional Trust Levels [J].
Yan, Zheng ;
Wang, Mingjun .
IEEE SYSTEMS JOURNAL, 2017, 11 (01) :207-218
[26]   PerContRep: a practical reputation system for pervasive content services [J].
Yan, Zheng ;
Chen, Yu ;
Shen, Yue .
JOURNAL OF SUPERCOMPUTING, 2014, 70 (03) :1051-1074
[27]  
Yan Z, 2013, IEEE CONF COMM NETW, P100, DOI 10.1109/CNS.2013.6682697
[28]   A practical reputation system for pervasive social chatting [J].
Yan, Zheng ;
Chen, Yu ;
Shen, Yue .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2013, 79 (05) :556-572
[29]   Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing [J].
Yu, Shucheng ;
Wang, Cong ;
Ren, Kui ;
Lou, Wenjing .
2010 PROCEEDINGS IEEE INFOCOM, 2010,
[30]   Privacy-Preserved Access Control for Cloud Computing [J].
Zhou, Miao ;
Mu, Yi ;
Susilo, Willy ;
Au, Man Ho ;
Yan, Jun .
TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, :83-90