Citation: | HUANG Qinlong, MA Zhaofeng, YANG Yixian, et al., “Secure Data Sharing and Retrieval Using Attribute-Based Encryption in Cloud-Based OSNs,” Chinese Journal of Electronics, vol. 23, no. 3, pp. 557-563, 2014, |
H. Hu, G.J. Ahn, "Multiparty authorization framework for data sharing in online social networks", Proceedings of 25th Annual WG 11.3 Conference on Data and Applications Security and Privacy, Richmond, VA, pp. 29-43, 2011.
|
H. Shuai, W. Zhu, "Masque: Access control for interactive sharing of encrypted data in social networks", Proceedings of 6th International Conference on Network and System Security, Wuyishan, Fujian, China, pp.503-515, 2012.
|
H. Liu, W. Cao, "Public proof of cloud storage from lattice assumption", Chinese Journal of Electronics, Vol.23, No.1, pp.186-190, 2014.
|
H. Shuai, W. Zhu, X. Liu, "Publishing and sharing encrypted data with potential friends in online social networks", Security and Communication Networks, Vol.7, No.2, pp.409-421, 2014.
|
J. Hur, "Improving security and efficiency in attribute-based data sharing", IEEE Transactions on Knowledge and Data Engineering, Vol.25, No.10, pp.2271-2282, 2013.
|
J. Lai, R. Deng, C. Guan, J.Weng, "Attribute-based encryption with verifiable outsourced decryption", IEEE Transactions on Information Forensics and Security, Vol.8, No.8, pp.1343-1354, 2013.
|
R. Curtmola, J. Garay, S. Kamara, R. Ostrovsky, "Searchable symmetric encryption: Improved definitions and efficient constructions", Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, Virginia, pp.79-88, 2006.
|
D. Koo, J. Hur, H. Yoon, "Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage", Computers and Electrical Engineering, Vol.39, No.1, pp.34-46, 2013.
|
D.H. Tran, H.L. Nguyen, W. Zha, W.K. Ng, "Towards security in sharing data on cloud-based social networks", Proceedings of the 8th International Conference on Information, Communications and Signal Processing, Singapore, Singapore, pp.1-5, 2011.
|
N. Dien, J. Hwang, M. Yoo, "A new framework for secure sharing data on cloud-based social networks", Proceedings of 2012 International Conference on ICT Convergence, Jeju Island, Korea, pp.333-335, 2012.
|
Q. Qiu, Z. Tang, F. Li, Y. Yu, "A personal DRM scheme based on social trust", Chinese Journal of Electronics, Vol.21, No.4, pp.719-724, 2012.
|
R. Baden, A. Bender, N. Spring. "Persona: An online social network with user-defined privacy", Proceedings of ACM SIGCOMM 2009 Conference on Data Communication, Barcelona, Spain, pp.135-146, 2009.
|
S. Jahid, P. Mittal, N. Borisov, "EASiER: Encryption-based access control in social networks with efficient revocation", Proceedings of the 6th International Symposium on Information, Computer and Communications Security, Hong Kong, China, pp.411-415, 2011.
|
H. Hu, G.J. Ahn, J. Jorgensen, "Multiparty access control for online social networks: Model and mechanisms", IEEE Transactions on Knowledge and Data Engineering, Vol.25, No.7, pp.1614-1627, 2013.
|
X. Song, D. Wagner, A. Perrig, "Practical techniques for searches on encrypted data", Proceedings of 2000 IEEE Symposium on Security and Privacy, Berkeley, CA, pp.44-55, 2000.
|
D. Boneh, G.D. Crescenzo, R. Ostrovsky, G. Persiano, "Public key encryption with keyword search", Proceedings of Eurocrypt 2004, Vol.3027 of Lecture Notes in Computer Science, Springer-Verlag, pp.506-522, 2004.
|
K. Kaushik, V. Varadharajan, R. Nallusamy, "Multi-user attribute based searchable encryption", Proceedings of 14th International Conference on Mobile Data Management, Milan, Italy, pp.200-205, 2013.
|
The pairing-based cryptography library. http://crypto.stanford. edu/pbc. 2013-10-26.
|