Advanced Search
Volume 45 Issue 3
Mar.  2023
Turn off MathJax
Article Contents
NIU Shufen, GE Peng, SONG Mi, SU Yun. A Privacy Protection Scheme Based on Attribute Encryption in Mobile Social Networks[J]. Journal of Electronics & Information Technology, 2023, 45(3): 847-855. doi: 10.11999/JEIT221174
Citation: NIU Shufen, GE Peng, SONG Mi, SU Yun. A Privacy Protection Scheme Based on Attribute Encryption in Mobile Social Networks[J]. Journal of Electronics & Information Technology, 2023, 45(3): 847-855. doi: 10.11999/JEIT221174

A Privacy Protection Scheme Based on Attribute Encryption in Mobile Social Networks

doi: 10.11999/JEIT221174
Funds:  The National Natural Science Foundation of China (62241207, 62262060, 61562077), The Science and Technology Program of Gansu (22JR5RA158), The Industrial Support Plan of Gansu Provincial Department of Education (2022CYZC-17)
  • Received Date: 2022-09-08
  • Rev Recd Date: 2023-01-26
  • Available Online: 2023-02-03
  • Publish Date: 2023-03-10
  • In order to protect the privacy of ${\rm{users}}' $ personal information and friend preferences in social networks, a Ciphertext-Policy Attribute Based Encryption (CP-ABE) scheme that supports outsourced decryption is proposed. In this scheme, attribute lists are generated for the ${\rm{users}}' $ dating preference and self-description respectively, and attributes are hidden by converting the dating preference into ciphertext control policy and self-description into attribute key, thus realizing privacy protection. The proposed algorithm mechanism matches ${\rm{users}}' $ information and then decrypts it. ${\rm{Users}}' $ information is matched and verified by social platform. When the corresponding matching conditions are met, the algorithm outsources the computationally expensive bilinear pairing operation to the dating center. The user then decrypts the ciphertext. Invalid decryption is avoided by quickly eliminating mismatched users. Outsourced decryption reduces the computational burden and communication overhead of mobile devices while protecting information. Security analysis shows that the scheme is safe and effective, furthermore, performance evaluation shows that the proposed scheme is efficient and practical in terms of computational and communication overhead.
  • loading
  • [1]
    QIU Tie, CHEN Baochao, SANGAIAH A K, et al. A survey of mobile social networks: Applications, social characteristics, and challenges[J]. IEEE Systems Journal, 2018, 12(4): 3932–3947. doi: 10.1109/JSYST.2017.2764479
    [2]
    SAHAI A and WATERS B. Fuzzy identity-based encryption[C]. The 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, 2005: 457–473.
    [3]
    SAIDI A, NOUALI O, and AMIRA A. SHARE-ABE: An efficient and secure data sharing framework based on ciphertext-policy attribute-based encryption and Fog computing[J]. Cluster Computing, 2022, 25(1): 167–185. doi: 10.1007/s10586-021-03382-5
    [4]
    FU Xingbing, WANG Yinglun, YOU Lin, et al. Offline/Online lattice-based ciphertext policy attribute-based encryption[J]. Journal of Systems Architecture, 2022, 130: 102684. doi: 10.1016/j.sysarc.2022.102684
    [5]
    DENG Shijie, YANG Gaobo, DONG Wen, et al. Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation[J/OL]. Multimedia Tools and Applications, 2022.
    [6]
    LI Jiguo, ZHANG Yichen, NING Jianting, et al. Attribute based encryption with privacy protection and accountability for CloudIoT[J]. IEEE Transactions on Cloud Computing, 2022, 10(2): 762–773. doi: 10.1109/TCC.2020.2975184
    [7]
    WANG Shulan, ZHOU Junwei, LIU J K, et al. An efficient file hierarchy attribute-based encryption scheme in cloud computing[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(6): 1265–1277. doi: 10.1109/TIFS.2016.2523941
    [8]
    HUANG Qinlong, YANG Yixian, and FU Jingyi. PRECISE: Identity-based private data sharing with conditional proxy re-encryption in online social networks[J]. Future Generation Computer Systems, 2018, 86: 1523–1533. doi: 10.1016/j.future.2017.05.026
    [9]
    ZHOU Lei, LUO Entao, WANG Guojun, et al. Secure fine-grained friend-making scheme based on hierarchical management in mobile social networks[J]. Information Sciences, 2021, 554: 15–32. doi: 10.1016/j.ins.2020.12.012
    [10]
    CUI Weirong, DU Chenglie, CHEN Jinchao, et al. CP-ABE based privacy-preserving user profile matching in mobile social networks[J]. PLoS One, 2016, 11(6): e0157933. doi: 10.1371/journal.pone.0157933
    [11]
    CUI Hui, DENG R H, LAI Junzuo, et al. An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited[J]. Computer Networks, 2018, 133: 157–165. doi: 10.1016/j.comnet.2018.01.034
    [12]
    YANG Kan, HAN Qi, LI Hui, et al. An efficient and fine-grained big data access control scheme with privacy-preserving policy[J]. IEEE Internet of Things Journal, 2017, 4(2): 563–571. doi: 10.1109/JIOT.2016.2571718
    [13]
    PREMKAMAL P K, PASUPULETI S K, and ALPHONSE P J A. A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud[J]. Journal of Ambient Intelligence and Humanized Computing, 2019, 10(7): 2693–2707. doi: 10.1007/s12652-018-0967-0
    [14]
    ZHANG Zhishuo and ZHOU Shijie. A decentralized strongly secure attribute-based encryption and authentication scheme for distributed Internet of Mobile Things[J]. Computer Networks, 2021, 201: 108553. doi: 10.1016/j.comnet.2021.108553
    [15]
    FENG Chaosheng, YU Keping, ALOQAILY M, et al. Attribute-based encryption with parallel outsourced decryption for edge intelligent IoV[J]. IEEE Transactions on Vehicular Technology, 2020, 69(11): 13784–13795. doi: 10.1109/TVT.2020.3027568
    [16]
    LI Jiguo, SHA Fengjie, ZHANG Yichen, et al. Verifiable outsourced decryption of attribute-based encryption with constant ciphertext length[J]. Security and Communication Networks, 2017, 2017: 3596205. doi: 10.1155/2017/3596205
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(3)  / Tables(3)

    Article Metrics

    Article views (592) PDF downloads(106) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return