RJXB软件学报Journal of Software1000-9825软件学报编辑部中国北京rjxb-29-10-322310.13328/j.cnki.jos.005295TP309计算机网络与信息安全COMPUTER NETWORKS AND INFORMATION SECURITY移动社交网络中细粒度朋友发现隐私保护机制Fine-Grained Secure Friend Discovery Scheme in Mobile Social Networks罗恩韬LUOEn-Tao
In mobile social networks, users can look for friends by matching their attributes. In order to solve the problem that the user's attribute is easy to be stolen by the attackers in the single authority center and performance bottleneck occurs in the peak of service, this work proposes a scheme where a multi-attribute management center hierarchically manages user attributes' sub-keys. The scheme involves several attribute centers which perform fine-grained management on different user attributes. After the friend requester's attributes meet the friend access control policy of the friend-making initiator, the friend requester can correctly combine the sub-keys into a complete decryption key and decrypt the user's data file to store in the friend-making server. By introducing hierarchical management in terms of attribute sub-keys, the proposed scheme not only effectively prevents key disclosure when the single-authority management center suffers from attacks, but also improves the computation efficiency of friend profile matching through cooperative work of multiple attribute center. Experiments are conducted to check whether the proposed scheme can challenge the chosen plaintext attack, and certify that the scheme can achieve CPA secure level while effectively protecting the user's privacy security. Extensive comparisons with existing schemes demonstrate the ability of the proposed scheme to entail the lowest computational overheads and provide excellent user experience.
密文访问控制策略多授权中心属性加密隐私保护机会计算ciphertext-policy access controlmulti-authorityattribute-based encryptionprivacy-preservingopportunity calculation国家自然科学基金61632009国家自然科学基金61472451国家自然科学基金61402543国家自然科学基金61272151国家自然科学基金61502163湖南省自然科学基金2015JJ3046湖南省教育厅科研项目2015C0589湖南省教育厅科研项目110351018002中南大学中央高校基本科研业务费专项资金2016zzts060中南大学中央高校基本科研业务费专项资金2016zzts339国家自然科学基金(61632009,61472451,61402543,61272151,61502163);湖南省自然科学基金(2015JJ3046);湖南省教育厅科研项目(2015C0589,110351018002);中南大学中央高校基本科研业务费专项资金(2016zzts060,2016zzts339)National Natural Science Foundation of China61632009National Natural Science Foundation of China61472451National Natural Science Foundation of China61402543National Natural Science Foundation of China61272151National Natural Science Foundation of China61502163Natural Science Foundation of Hu'nan Province, China2015JJ3046Hu'nan Provincial Education Department of China2015C0589Hu'nan Provincial Education Department of China110351018002Fundamental Research Funds for the Central Universities of Central South University2016zzts060Fundamental Research Funds for the Central Universities of Central South University2016zzts339National Natural Science Foundation of China (61632009, 61472451, 61402543, 61272151, 61502163); Natural Science Foundation of Hu'nan Province, China (2015JJ3046); Hu'nan Provincial Education Department of China (2015C0589, 110351018002); Fundamental Research Funds for the Central Universities of Central South University (2016zzts060, 2016zzts339)
随着移动社交网络(mobile social network, 简称MSN)和智能手机的飞速发展[1-4], 用户利用智能手机在移动社交网络中可以通过匹配彼此的个人属性文件, 找到具有共同兴趣爱好的朋友或者具有某类相似属性特征的用户.例如:用户可以通过在社交网络中随时分享心情、照片、活动、兴趣爱好等来不断地发现新的朋友, 从而进一步扩大自己的社交范围(例如, 微信、智圈、微聚等).
\begin{document}
$
SK_{user}^{\left( k \right)}=\left( D_{user}^{\left( k \right)}={{g}^{\frac{ak,r{{u}^{\left( k \right)}}}{\beta k,1}}},D_{i,j}^{\left( k \right)}=\\{{g}^{ru_{i}^{\left( k \right)}}}\cdot H{{\left( a_{i,j}^{\left( k \right)} \right)}^{ru_{i,j}^{\left( k \right)}}},{D}{'}_{i,j}^{\left( k \right)}={{g}^{ru_{i,j}^{\left( k \right)}}},E_{i}^{\left( k \right)}=g\frac{r{{u}^{\left( k \right)}}+ru_{i}^{\left( k \right)}}{{{\beta }_{k,2}}} \right)
$
\end{document}
ReferencesFuYYZhangMFengDGChenKQAttribute privacy preservation in social networks based on node anatomy201425476878010.13328/j.cnki.jos.004565
Fu YY, Zhang M, Feng DG, Chen KQ. Attribute privacy preservation in social networks based on node anatomy. Ruan Jian Xue Bao/Journal of Software, 2014, 25(4):768-780(in Chinese with English abstract). http://www.jos.org.cn/1000-9825/4565.htm[doi:10.13328/j.cnki.jos.004565]
ZhangLLiXYLiuYMessage in a sealed bottle:Privacy preserving friending in social networks20151491888190210.1109/TMC.2014.2366773
Zhang L, Li XY, Liu Y. Message in a sealed bottle:Privacy preserving friending in social networks. IEEE Trans. on Mobile Computing, 2015, 14(9):1888-1902.[doi:10.1109/TMC.2014.2366773]
WangYVasilakosAVJinQSurvey on mobile social networking in proximity (MSNP):Approaches, challenges and architecture20132061295131110.1007/s11276-013-0677-7
Wang Y, Vasilakos AV, Jin Q. Survey on mobile social networking in proximity (MSNP):Approaches, challenges and architecture. Wireless Networks, 2013, 20(6):1295-1311.[doi:10.1007/s11276-013-0677-7]
GuoLZhangCSunJA privacy-preserving attribute-based authentication system for mobile health networks20141391927194110.1109/TMC.2013.84
Guo L, Zhang C, Sun J. A privacy-preserving attribute-based authentication system for mobile health networks. IEEE Trans. on Mobile Computing, 2014, 13(9):1927-1941.[doi:10.1109/TMC.2013.84]
doi: 10.1109/GLOCOM.2013.6831142]]]>
LuRLinXLiangXShenXA secure handshake scheme with symptoms-matching for healthcare social network201116668369410.1007/s11036-010-0274-2
Lu R, Lin X, Liang X, Shen X. A secure handshake scheme with symptoms-matching for healthcare social network. Mobile Networks and Applications, 2011, 16(6):683-694.[doi:10.1007/s11036-010-0274-2]
Sarpong S, Xu C. A secure and efficient privacy-preserving attribute matchmaking protocol in proximity-based mobile social networks. In: Proc. of the Int'l Conf. Advanced Data Mining and Applications. 2014. 305-318.
doi: 10.1109/INFCOM.2011.5935065]]]>
YanZDingWNiemiVTwo schemes of privacy-preserving trust evaluation201562C17518910.1016/j.future.2015.11.006
Yan Z, Ding W, Niemi V. Two schemes of privacy-preserving trust evaluation. Future Generation Computer Systems, 2015, 62(C):175-189.[doi:10.1016/j.future.2015.11.006]
KirazMSGencZAKardasSSecurity and efficiency analysis of the Hamming distance computation protocol based on oblivious transfer20158184123413510.1002/sec.1329
Kiraz MS, Genc ZA, Kardas S. Security and efficiency analysis of the Hamming distance computation protocol based on oblivious transfer. Security & Communication Networks, 2015, 8(18):4123-4135.[doi:10.1002/sec.1329]
OzdemirSPengMXiaoYPRDA:Polynomial regression-based privacy-preserving data aggregation for wireless sensor networks201315461562810.1002/wcm.2369
Ozdemir S, Peng M, Xiao Y. PRDA:Polynomial regression-based privacy-preserving data aggregation for wireless sensor networks. Wireless Communications & Mobile Computing, 2013, 15(4):615-628.[doi:10.1002/wcm.2369]
ZhangRZhangJZhangYSunJPrivacy-Preserving profile matching for proximity-based mobile social networking201331965666810.1109/JSAC.2013.SUP.0513057
Zhang R, Zhang J, Zhang Y, Sun J. Privacy-Preserving profile matching for proximity-based mobile social networking. IEEE Journal on Selected Areas in Communications, 2013, 31(9):656-668.[doi:10.1109/JSAC.2013.SUP.0513057]
Han J, Susilo W, Mu Y. Privacy-Preserving decentralized key-policy attribute-based encryption. IEEE Trans. on Parallel & Distributed Systems, 2012, 23(11):2150-2162.[doi:10.1109/TPDS.2012.50]
doi: 10.1145/1315245.1315270]]]>
doi: 10.1007/978-3-642-13190-5_4]]]>
doi: 10.1007/978-3-642-14623-7_11]]]>
doi: 10.1007/978-3-642-19379-8_4]]]>
doi: 10.1109/SP.2007.11]]]>
doi: 10.1145/1315245.1315302]]]>
ZhouZHuangDWangZEfficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption201564112613810.1109/TC.2013.200
Zhou Z, Huang D, Wang Z. Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption. IEEE Trans. on Computers, 2015, 64(1):126-138.[doi:10.1109/TC.2013.200]
ShamirAHow to share a secret1979221161261310.1145/359168.359176
Shamir A. How to share a secret. Communications of the ACM, 1979, 22(11):612-613.[doi:10.1145/359168.359176]
doi: 10.1109/AFIPS.1979.98]]]>
doi: 10.1007/BFb0055717]]]>
WeiFSZhangGMaJFMaCGPrivacy-Preserving multi-factor key exchange protocol in the standard model20162761511152210.13328/j.cnki.jos.005001
Wei FS, Zhang G, Ma JF, Ma CG. Privacy-Preserving multi-factor key exchange protocol in the standard model. Ruan Jian Xue Bao/Journal of Software, 2016, 27(6):1511-1522(in Chinese with English abstract). http://www.jos.org.cn/1000-9825/5001.htm[doi:10.13328/j.cnki.jos.005001]