Skip to main content

SEDOSN: A Secure Decentralized Online Social Networking Framework

  • Conference paper
Embedded System Technology (ESTC 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 572))

Included in the following conference series:

Abstract

Today’s online social networking services (OSN) such as Facebook, Twitter are centralized. Users’ information may be leaked by these service providers, which results in potential privacy problems. Decentralized online social networking (DOSN) is provided to solve the problems. This paper presents a secure decentralized online social networking framework named SEDOSN. A peer-to-peer (p2p) online networking system is designed, and attribute-based encryption (ABE) technique is used. Different to existing ABE schemes which relies on a single authority or several authorities to authorize users and generating decryption keys for uses, we firstly proposed an ABE scheme with discretionary authorization. In our system, each user can authorize his friend, and generate decryption keys for his friend based on his friend’s attributes. We give our implementation and experiment results in the paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Tootoonchian, et al.: Locker: social access control for web 2.0. In: WOSN (2008)

    Google Scholar 

  2. Luo, W., Xie, Q., Hengartner, U.: Facecloak: an architecture for user privacy on social networking sites. In: International Conference on Computational Science and Engineering, CSE 2009, vol. 3. IEEE (2009)

    Google Scholar 

  3. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  4. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, SP 2007. IEEE (2007)

    Google Scholar 

  5. Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 195−203 (2007)

    Google Scholar 

  6. Rouselakis, Y., Waters, B.: Practical constructions and new proof methods for large universe attribute-based encryption. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. ACM (2013)

    Google Scholar 

  7. Pirretti, M., et al.: Secure attribute-based systems. In: Proceedings of the 13th ACM Conference on Computer and Communications Security. ACM (2006)

    Google Scholar 

  8. Baden, R., et al.: Persona: an online social network with user-defined privacy. In: ACM SIGCOMM Computer Communication Review, vol. 39., no. 4. ACM (2009)

    Google Scholar 

  9. Yeung, C.M.A., et al.: Decentralization: the future of online social networking. In: W3C Workshop on the Future of Social Networking Position Papers, vol. 2 (2009)

    Google Scholar 

  10. Nilizadeh, S., et al.: Cachet: a decentralized architecture for privacy preserving social networking with caching. In: Proceedings of the 8th International Conference on Emerging Networking Experiments and Technologies. ACM (2012)

    Google Scholar 

  11. Seong, S.-W., et al.: PrPl: a decentralized social networking infrastructure. In: Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond. ACM (2010)

    Google Scholar 

  12. Buchegger, S., et al.: PeerSoN: P2P social networking: early experiences and insights. In: Proceedings of the Second ACM EuroSys Workshop on Social Network Systems. ACM (2009)

    Google Scholar 

  13. Bocek, T.: TomP2P-A Distributed Multi Map (2009)

    Google Scholar 

  14. De Caro, A., Lovino, V.: jPBC: Java pairing based cryptography. In: 2011 IEEE Symposium on Computers and Communications, (ISCC). IEEE (2011)

    Google Scholar 

  15. Mὕller, S., Katzenbeisser, S., Eckert, C.: Distributed attribute-based encryption. In: Information Security and Cryptology, pp. 20−36 (2009)

    Google Scholar 

  16. Chase, M., Chow, S.: Improving privacy and security in multi-authority attribute-based encryption. In: Proceedings of the 16th ACM Conference on Computer and Communications security, pp. 121−130 (2009)

    Google Scholar 

  17. Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Advances in Cryptology, CEUROCRYPT 2011, pp. 568−588 (2011)

    Google Scholar 

  18. Jahid, S., Mittal, P., Borisov, N.: EASiER: encryption-based access control in social networks with efficient revocation. In: Proceedings of 6th ACM Symposium on Information, Computer and Communication Security, pp. 411–415 (2011)

    Google Scholar 

  19. Cheng, Y., Wang, Z.Y., Ma, J., Wu, J.J., Mei, S.Z., Ren, J.C.: Ciphertext-policy attribute-based encryption with efficient revocation. J. Zhejiang Univ. SCIENCE C 14(2), 85–97 (2013)

    Article  Google Scholar 

  20. Ren, K., Zhu, B., Li, J., Wan, Z.: Privacy-aware attribute-based encryption with user accountability. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 347–362. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

Download references

Acknowledgments

This work is supported by the National High Technology Research and Development Program (“863” Program) of China under Grant No. 2015AA016009, the National Natural Science Foundation of China under Grant No. 61232005, and the Science and Technology Program of Shen Zhen, China under Grant No. JSGG20140516162852628.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuejian Fang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media Singapore

About this paper

Cite this paper

Fang, Y., Wen, Z., Shen, Q., Yang, Y., Wu, Z. (2015). SEDOSN: A Secure Decentralized Online Social Networking Framework. In: Zhang, X., Wu, Z., Sha, X. (eds) Embedded System Technology. ESTC 2015. Communications in Computer and Information Science, vol 572. Springer, Singapore. https://doi.org/10.1007/978-981-10-0421-6_7

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0421-6_7

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0420-9

  • Online ISBN: 978-981-10-0421-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics