Access Control in Decentralized Online Social Networks: Applying a Policy-Hiding Cryptographic Scheme and Evaluating Its Performance

被引:0
|
作者
Bodriagov, Oleksandr [1 ]
Kreitz, Gunnar [1 ]
Buchegger, Sonja [1 ]
机构
[1] KTH Royal Inst Technol, Sch Comp Sci & Commun, Stockholm, Sweden
来源
2014 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS) | 2014年
关键词
INNER-PRODUCT ENCRYPTION; PRIVACY;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy concerns in online social networking services have prompted a number of proposals for decentralized online social networks (DOSN) that remove the central provider and aim at giving the users control over their data and who can access it. This is usually done by cryptographic means. Existing DOSNs use cryptographic primitives that hide the data but reveal the access policies. At the same time, there are privacy-preserving variants of these cryptographic primitives that do not reveal access policies. They are, however, not suitable for usage in the DOSN context because of performance or storage constraints. A DOSN needs to achieve both privacy and performance to be useful. We analyze predicate encryption (PE) and adapt it to the DOSN context. We propose a univariate polynomial construction for access policies in PE that drastically increases performance of the scheme but leaks some part of the access policy to users with access rights. We utilize Bloom filters as a means of decreasing decryption time and indicate objects that can be decrypted by a particular user. We evaluate the performance of the adapted scheme in the concrete scenario of a news feed. Our PE scheme is best suited for encrypting for groups or small sets of separate identities.
引用
收藏
页码:622 / 628
页数:7
相关论文
共 8 条
  • [1] A Policy-Hiding Attribute-Based Access Control Scheme in Decentralized Trust Management
    Ruan, Conghao
    Hu, Chunqiang
    Zhao, Ruifeng
    Liu, Zewei
    Huang, Hongyu
    Yu, Jiguo
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (20) : 17656 - 17665
  • [2] XACML-Based Access Control for Decentralized Online Social Networks
    Nasim, Robayet
    Buchegger, Sonja
    2014 IEEE/ACM 7TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC), 2014, : 671 - 676
  • [3] Access Control Policy Misconfiguration Detection in Online Social Networks
    Javed, Yousra
    Shehab, Mohamed
    2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), 2013, : 544 - 549
  • [4] Blockchain-based access control management for Decentralized Online Social Networks
    Rahman, Mohsin Ur
    Guidi, Barbara
    Baiardi, Fabrizio
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 144 : 41 - 54
  • [5] Relationship-Based Access Control for Resharing in Decentralized Online Social Networks
    Gay, Richard
    Hu, Jinwei
    Mantel, Heiko
    Mazaheri, Sogol
    FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2017), 2018, 10723 : 18 - 34
  • [6] A Community-Centric Access Control Scheme for Online Social Networks
    Asim, Yousra
    Naeem, Wajeeha
    Malik, Ahmad Kamran
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND DIGITAL SYSTEMS (C-CODE), 2017, : 222 - 227
  • [7] A Secure and Efficient Decentralized Access Control Scheme Based on Blockchain for Vehicular Social Networks
    Zhang, Leyou
    Zhang, Ye
    Wu, Qing
    Mu, Yi
    Rezaeibagha, Fatemeh
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (18) : 17938 - 17952
  • [8] A trust-based collaborative access control model with policy aggregation for online social networks
    Rathore N.C.
    Tripathy S.
    Social Network Analysis and Mining, 2017, 7 (1)