Skip to main content

Masque: Access Control for Interactive Sharing of Encrypted Data in Social Networks

  • Conference paper
Network and System Security (NSS 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7645))

Included in the following conference series:

Abstract

Making friends by sharing personal data has become popular in online social networks (OSNs). Security is a major concern, as an OSN service provider (OSN-SP) is semi-trusted and for-profit, while malicious users might also gather data for improper uses. Encryption of data is a straightforward solution, but interactive sharing of encrypted data becomes a challenging task. In this paper, we propose Masque, a novel access control mechanism employing attribute-based encryption (ABE), as a hierarchical solution for interactive sharing of encrypted data in OSNs. Based on key-policy ABE, it allows the OSN-SP to manage users at a high level but without being able to access their sensitive data. At the same time, based on ciphertext-policy ABE, it enables users to customize their own access policies specifically.

This work was supported by the National Natural Science Foundation of China under Grants 60970138 and 61272479, and also by the Strategic Priority Research Program of Chinese Academy of Sciences under Grant XDA06010702.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Boneh, D., Franklin, M.K.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  2. Boneh, D., Boyen, X.: Efficient Selective-ID Secure Identity-Based Encryption without Random Oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223–238. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  3. Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  4. Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. In: 13th ACM Conference on Computer and Communications Security (CCS 2006), pp. 89–98 (October 2006)

    Google Scholar 

  5. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-Policy Attribute-Based Encryption. In: 28th IEEE Symposium on Security and Privacy (S&P 2007), pp. 321–334 (May 2007)

    Google Scholar 

  6. Pirretti, M., Traynor, P., McDaniel, P., Waters, B.: Secure Attribute-Based Systems. In: 16th ACM Conference on Computer and Communications Security (CCS 2009), pp. 799–873 (November 2009)

    Google Scholar 

  7. Traynor, P., Kevin, B., Enck, W., McDaniel, P.: Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems. In: 13th Network and Distributed System Security Symposium (NDSS 2008), pp. 799–873 (February 2008)

    Google Scholar 

  8. Badenand, R., Benderand, A., Spring, N., Bhattacharjee, B., Starin, D.: Persona: An Online Social Network with User-Defined Privacy. In: ACM Conference on Data Communication (SIGCOMM 2009), pp. 135–146 (August 2009)

    Google Scholar 

  9. Bobba, R., Fatemieh, O., Khan, F., Khanand, A., Gunter, C.A., Khurana, H., Prabhakaran, M.: Attribute-Based Messaging: Access Control and Confidentiality. In: ACM Conference on Data Communication (SIGCOMM 2009), vol. 13 (December 2010)

    Google Scholar 

  10. Yu, S., Wang, C., Ren, K., Lou, W.: Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing. In: 29th Conference on Computer Communications (INFOCOM 2010), pp. 14–19 ( March 2010)

    Google Scholar 

  11. Shoup, V.: Lower Bounds for Discrete Logarithms and Related Problems. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 256–266. Springer, Heidelberg (1997)

    Google Scholar 

  12. Harney, H., Colgrove, A., McDaniel, P.: Principles of Policy in Secure Groups. In: 18th Network and Distributed System Security Symposium (NDSS 2011), pp. 66–74 (August 2011)

    Google Scholar 

  13. Schwartz, J.T.: Fast Probabilistic Algorithms for Verification of Polynomial Identities. Journal of the ACM 27, 701–717 (1980)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shuai, H., Zhu, W.T. (2012). Masque: Access Control for Interactive Sharing of Encrypted Data in Social Networks. In: Xu, L., Bertino, E., Mu, Y. (eds) Network and System Security. NSS 2012. Lecture Notes in Computer Science, vol 7645. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34601-9_38

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34601-9_38

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34600-2

  • Online ISBN: 978-3-642-34601-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics