Abstract
Today’s online social networking services (OSN) such as Facebook, Twitter are centralized. Users’ information may be leaked by these service providers, which results in potential privacy problems. Decentralized online social networking (DOSN) is provided to solve the problems. This paper presents a secure decentralized online social networking framework named SEDOSN. A peer-to-peer (p2p) online networking system is designed, and attribute-based encryption (ABE) technique is used. Different to existing ABE schemes which relies on a single authority or several authorities to authorize users and generating decryption keys for uses, we firstly proposed an ABE scheme with discretionary authorization. In our system, each user can authorize his friend, and generate decryption keys for his friend based on his friend’s attributes. We give our implementation and experiment results in the paper.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Tootoonchian, et al.: Locker: social access control for web 2.0. In: WOSN (2008)
Luo, W., Xie, Q., Hengartner, U.: Facecloak: an architecture for user privacy on social networking sites. In: International Conference on Computational Science and Engineering, CSE 2009, vol. 3. IEEE (2009)
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, SP 2007. IEEE (2007)
Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 195−203 (2007)
Rouselakis, Y., Waters, B.: Practical constructions and new proof methods for large universe attribute-based encryption. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. ACM (2013)
Pirretti, M., et al.: Secure attribute-based systems. In: Proceedings of the 13th ACM Conference on Computer and Communications Security. ACM (2006)
Baden, R., et al.: Persona: an online social network with user-defined privacy. In: ACM SIGCOMM Computer Communication Review, vol. 39., no. 4. ACM (2009)
Yeung, C.M.A., et al.: Decentralization: the future of online social networking. In: W3C Workshop on the Future of Social Networking Position Papers, vol. 2 (2009)
Nilizadeh, S., et al.: Cachet: a decentralized architecture for privacy preserving social networking with caching. In: Proceedings of the 8th International Conference on Emerging Networking Experiments and Technologies. ACM (2012)
Seong, S.-W., et al.: PrPl: a decentralized social networking infrastructure. In: Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond. ACM (2010)
Buchegger, S., et al.: PeerSoN: P2P social networking: early experiences and insights. In: Proceedings of the Second ACM EuroSys Workshop on Social Network Systems. ACM (2009)
Bocek, T.: TomP2P-A Distributed Multi Map (2009)
De Caro, A., Lovino, V.: jPBC: Java pairing based cryptography. In: 2011 IEEE Symposium on Computers and Communications, (ISCC). IEEE (2011)
Mὕller, S., Katzenbeisser, S., Eckert, C.: Distributed attribute-based encryption. In: Information Security and Cryptology, pp. 20−36 (2009)
Chase, M., Chow, S.: Improving privacy and security in multi-authority attribute-based encryption. In: Proceedings of the 16th ACM Conference on Computer and Communications security, pp. 121−130 (2009)
Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Advances in Cryptology, CEUROCRYPT 2011, pp. 568−588 (2011)
Jahid, S., Mittal, P., Borisov, N.: EASiER: encryption-based access control in social networks with efficient revocation. In: Proceedings of 6th ACM Symposium on Information, Computer and Communication Security, pp. 411–415 (2011)
Cheng, Y., Wang, Z.Y., Ma, J., Wu, J.J., Mei, S.Z., Ren, J.C.: Ciphertext-policy attribute-based encryption with efficient revocation. J. Zhejiang Univ. SCIENCE C 14(2), 85–97 (2013)
Ren, K., Zhu, B., Li, J., Wan, Z.: Privacy-aware attribute-based encryption with user accountability. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 347–362. Springer, Heidelberg (2009)
Acknowledgments
This work is supported by the National High Technology Research and Development Program (“863” Program) of China under Grant No. 2015AA016009, the National Natural Science Foundation of China under Grant No. 61232005, and the Science and Technology Program of Shen Zhen, China under Grant No. JSGG20140516162852628.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer Science+Business Media Singapore
About this paper
Cite this paper
Fang, Y., Wen, Z., Shen, Q., Yang, Y., Wu, Z. (2015). SEDOSN: A Secure Decentralized Online Social Networking Framework. In: Zhang, X., Wu, Z., Sha, X. (eds) Embedded System Technology. ESTC 2015. Communications in Computer and Information Science, vol 572. Springer, Singapore. https://doi.org/10.1007/978-981-10-0421-6_7
Download citation
DOI: https://doi.org/10.1007/978-981-10-0421-6_7
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0420-9
Online ISBN: 978-981-10-0421-6
eBook Packages: Computer ScienceComputer Science (R0)