HUANG Qinlong, MA Zhaofeng, YANG Yixian, et al., “Secure Data Sharing and Retrieval Using Attribute-Based Encryption in Cloud-Based OSNs,” Chinese Journal of Electronics, vol. 23, no. 3, pp. 557-563, 2014,
Citation: HUANG Qinlong, MA Zhaofeng, YANG Yixian, et al., “Secure Data Sharing and Retrieval Using Attribute-Based Encryption in Cloud-Based OSNs,” Chinese Journal of Electronics, vol. 23, no. 3, pp. 557-563, 2014,

Secure Data Sharing and Retrieval Using Attribute-Based Encryption in Cloud-Based OSNs

Funds:  This work is supported by the National Natural Science Foundation of China (No.60803157, No.90812001, No.61272519).
  • Received Date: 2013-11-01
  • Rev Recd Date: 2014-03-01
  • Publish Date: 2014-07-05
  • The Online social networks (OSNs) offer attractive means for social interactions and data sharing, but also raise a number of security and privacy issues. Since the OSNs service provider is always semi-trusted, current solutions propose to encrypt data before sharing. However, data encryption causes a lot of inconveniences and large overheads for data dissemination and data retrieval. In this paper, we propose a secure data sharing and retrieval scheme in cloud-based OSNs. Based on ciphertext-policy attribute-based encryption, our scheme achieves multiparty access control, which allows data owners to outsource encrypted data to the OSNs service provider for sharing, and enables data disseminators to disseminate the data owners' data by customizing new access policy. Our scheme also provides searchable encryption scheme to support fast searches in massive amount of encrypted data from both data owners and data disseminators. Further, our scheme preserves the privacy of data owners and data retrievers during the data sharing and retrieval processes. In addition, the computation overhead of data retrievers is reduced by delegating most of the decryption operations to the OSNs service provider. The security and performance analysis results indicate that our scheme is secure and privacy-preserving.
  • loading
  • H. Hu, G.J. Ahn, "Multiparty authorization framework for data sharing in online social networks", Proceedings of 25th Annual WG 11.3 Conference on Data and Applications Security and Privacy, Richmond, VA, pp. 29-43, 2011.
    H. Shuai, W. Zhu, "Masque: Access control for interactive sharing of encrypted data in social networks", Proceedings of 6th International Conference on Network and System Security, Wuyishan, Fujian, China, pp.503-515, 2012.
    H. Liu, W. Cao, "Public proof of cloud storage from lattice assumption", Chinese Journal of Electronics, Vol.23, No.1, pp.186-190, 2014.
    H. Shuai, W. Zhu, X. Liu, "Publishing and sharing encrypted data with potential friends in online social networks", Security and Communication Networks, Vol.7, No.2, pp.409-421, 2014.
    J. Hur, "Improving security and efficiency in attribute-based data sharing", IEEE Transactions on Knowledge and Data Engineering, Vol.25, No.10, pp.2271-2282, 2013.
    J. Lai, R. Deng, C. Guan, J.Weng, "Attribute-based encryption with verifiable outsourced decryption", IEEE Transactions on Information Forensics and Security, Vol.8, No.8, pp.1343-1354, 2013.
    R. Curtmola, J. Garay, S. Kamara, R. Ostrovsky, "Searchable symmetric encryption: Improved definitions and efficient constructions", Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, Virginia, pp.79-88, 2006.
    D. Koo, J. Hur, H. Yoon, "Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage", Computers and Electrical Engineering, Vol.39, No.1, pp.34-46, 2013.
    D.H. Tran, H.L. Nguyen, W. Zha, W.K. Ng, "Towards security in sharing data on cloud-based social networks", Proceedings of the 8th International Conference on Information, Communications and Signal Processing, Singapore, Singapore, pp.1-5, 2011.
    N. Dien, J. Hwang, M. Yoo, "A new framework for secure sharing data on cloud-based social networks", Proceedings of 2012 International Conference on ICT Convergence, Jeju Island, Korea, pp.333-335, 2012.
    Q. Qiu, Z. Tang, F. Li, Y. Yu, "A personal DRM scheme based on social trust", Chinese Journal of Electronics, Vol.21, No.4, pp.719-724, 2012.
    R. Baden, A. Bender, N. Spring. "Persona: An online social network with user-defined privacy", Proceedings of ACM SIGCOMM 2009 Conference on Data Communication, Barcelona, Spain, pp.135-146, 2009.
    S. Jahid, P. Mittal, N. Borisov, "EASiER: Encryption-based access control in social networks with efficient revocation", Proceedings of the 6th International Symposium on Information, Computer and Communications Security, Hong Kong, China, pp.411-415, 2011.
    H. Hu, G.J. Ahn, J. Jorgensen, "Multiparty access control for online social networks: Model and mechanisms", IEEE Transactions on Knowledge and Data Engineering, Vol.25, No.7, pp.1614-1627, 2013.
    X. Song, D. Wagner, A. Perrig, "Practical techniques for searches on encrypted data", Proceedings of 2000 IEEE Symposium on Security and Privacy, Berkeley, CA, pp.44-55, 2000.
    D. Boneh, G.D. Crescenzo, R. Ostrovsky, G. Persiano, "Public key encryption with keyword search", Proceedings of Eurocrypt 2004, Vol.3027 of Lecture Notes in Computer Science, Springer-Verlag, pp.506-522, 2004.
    K. Kaushik, V. Varadharajan, R. Nallusamy, "Multi-user attribute based searchable encryption", Proceedings of 14th International Conference on Mobile Data Management, Milan, Italy, pp.200-205, 2013.
    The pairing-based cryptography library. http://crypto.stanford. edu/pbc. 2013-10-26.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (472) PDF downloads(1768) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return