Skip to main content

A Privacy Preserving Friend Discovery Strategy Using Proxy Re-encryption in Mobile Social Networks

  • Conference paper
  • First Online:
Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10066))

Abstract

In mobile social networks, based on secret sharing and CP-ABE, focusing on the security and privacy issues of friend discovery, we propose a matching scheme under different authorities and realize cross domain data access and sharing. By using proxy re-encryption technology, we hide users’ access policy, which can guarantee the security and privacy in the friend making process. Because agents attend encryption and decryption, the privacy can be largely enhanced and the bottleneck of single authority also will be solved. Security and performance analysis show that the relationship of ciphertext’s size and access policy is linear, which can resist collusion attack and meet CPA security, our scheme is superior to the existing schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Guo, L., Zhang, C., Sun, J., et al.: A privacy-preserving attribute-based authentication system for mobile health networks. IEEE Trans. Mob. Comput. 13(9), 1927–1941 (2014)

    Article  Google Scholar 

  2. Colman-Meixner, C., Develder, C., Tornatore, M., et al.: A survey on resiliency techniques in cloud computing infrastructures and applications. IEEE Commun. Surv. Tutorials 18(3), 2244–2281 (2016)

    Article  Google Scholar 

  3. Luo, E., Liu, Q., Wang, G.: Hierachical multi-authority and attribute-based encryption friend discovery scheme in mobile social networks. IEEE Commun. Lett. 20(9), 1772–1775 (2016)

    Article  Google Scholar 

  4. Xu, Q., Su, Z., Guo, S.: A game theoretical incentive scheme for relay selection services in mobile social networks. IEEE Trans. Veh. Technol. 65(8), 6692–6702 (2015)

    Article  Google Scholar 

  5. Salih, R.M., Lilien, L.T.: Protecting users’ privacy in healthcare cloud computing with APB-TTP. In: IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), 2015, pp. 236–238 (2015)

    Google Scholar 

  6. Manweiler, J., Scudellari, R., Cox, L.P.: SMILE: encounter-based trust for mobile social services. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 246–255 (2009)

    Google Scholar 

  7. Ge, A., Zhang, J., Zhang, R., et al.: Security analysis of a privacy-preserving decentralized key-policy attribute-based encryption scheme. IEEE Trans. Parallel Distrib. Syst. 24(11), 2319–2321 (2013)

    Article  MathSciNet  Google Scholar 

  8. Dong, W., Dave, V., Qiu, L., et al.: Secure friend discovery in mobile social networks. In: Proceedings of IEEE INFOCOM 2011, pp. 1647–1655 (2011)

    Google Scholar 

  9. Freedman, M.J., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 1–19 (2004)

    Google Scholar 

  10. Kissner, L., Song, D.: Privacy-preserving set operations. In: Annual International Cryptology Conference, pp. 241–257 (2005)

    Google Scholar 

  11. Sang, Y., Shen, H.: Efficient and secure protocols for privacy-preserving set operations. ACM Trans. Inf. Syst. Secur. 13(1), 315–326 (2009)

    Article  Google Scholar 

  12. Cristofaro, E., Kim, J., Tsudik, G.: Linear-complexity private set intersection protocols secure in malicious model. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 213–231. Springer, Heidelberg (2010). doi:10.1007/978-3-642-17373-8_13

    Chapter  Google Scholar 

  13. Li, M., Cao, N., Yu, S., et al.: Findu: privacy-preserving personal profile matching in mobile social networks. In: Proceedings of IEEE INFOCOM 2011, pp. 2435–2443 (2011)

    Google Scholar 

  14. Guo, L., Liu, X., Fang, Y., et al.: User-centric private matching for ehealth networks-a social perspective. In: IEEE Global Communications Conference (GLOBECOM), pp. 732–737 (2012)

    Google Scholar 

  15. Zhang, R., Zhang, Y., Sun, J., et al.: Fine-grained private matching for proximity-based mobile social networking. In: Proceedings of IEEE INFOCOM 2012, pp. 1969–1977 (2012)

    Google Scholar 

  16. Niu, B., Zhu, X., Liu, J., et al.: Weight-aware private matching scheme for proximity-based mobile social networks. In: IEEE Global Communications Conference (GLOBECOM), pp. 3170–3175 (2013)

    Google Scholar 

  17. Zhu, X., Chen, Z., Chi, H., et al.: Two-party and multi-party private matching for proximity-based mobile social networks. In: IEEE 2014 International Conference on Communications (ICC), pp. 926–931 (2014)

    Google Scholar 

  18. Zhou, Z., Huang, D., Wang, Z.: Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption. IEEE Trans. Comput. 64(1), 126–138 (2015)

    Article  MathSciNet  Google Scholar 

  19. Wang, J., Lang, B.: An efficient KP-ABE scheme for content protection in information-centric networking. In: 2016 IEEE Symposium on Computers and Communication (ISCC), pp. 830–837 (2016)

    Google Scholar 

  20. Touati, L., Challal, Y.: Collaborative KP-ABE for cloud-based internet of things applications. In: 2016 IEEE International Conference on Communications ICC, pp. 1–7 (2016)

    Google Scholar 

  21. Liu, P., Wang, J., Ma, H., et al.: Efficient verifiable public key encryption with keyword search based on KP-ABE. In: 2014 Ninth International Conference on Broadband and Wireless Computing (BWCCA), pp. 584–589 (2014)

    Google Scholar 

  22. Okamoto, T., Takashima, K.: Fully secure functional encryption with general relations from the decisional linear assumption. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 191–208. Springer, Heidelberg (2010). doi:10.1007/978-3-642-14623-7_11

    Chapter  Google Scholar 

  23. Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: International Workshop on Public Key Cryptography, pp. 53–70 (2011)

    Google Scholar 

  24. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy (SP 2007), pp. 321–334 (2007)

    Google Scholar 

  25. Ramesh, D., Priya, R.: Multi-authority scheme based CP-ABE with attribute revocation for cloud data storage. In: IEEE 2016 International Conference on Microelectronics, Computing and Communications (MicroCom), pp. 1–4 (2016)

    Google Scholar 

Download references

Acknowledgments

This work is supported in part by the National Natural Science Foundation of China under Grant Numbers 61632009, 61472451, 61272151. Hunan Provincial Natural Science Foundation of China under Grant Numbers 2016JJ305. High Level Talents Program of Higher Education in Guangdong Province under Funding Support Number 2016ZJ01. The Fundamental Research Funds for the Central Universities of Central South University 2016zzts060. The Hunan Provincial Education Department of China under grant number 2015C0589.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guojun Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Luo, E., Wang, W., Meng, D., Wang, G. (2016). A Privacy Preserving Friend Discovery Strategy Using Proxy Re-encryption in Mobile Social Networks. In: Wang, G., Ray, I., Alcaraz Calero, J., Thampi, S. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2016. Lecture Notes in Computer Science(), vol 10066. Springer, Cham. https://doi.org/10.1007/978-3-319-49148-6_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49148-6_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49147-9

  • Online ISBN: 978-3-319-49148-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics