Loading...
A framework for protecting privacy on mobile social networks
Safi, S. M ; Sharif University of Technology | 2021
236
Viewed
- Type of Document: Article
- DOI: 10.1007/s11036-021-01761-1
- Publisher: Springer , 2021
- Abstract:
- In recent years, mobile social networks have largely been developed and gained considerable popularity. An approach to protecting privacy on mobile social networks is the use of encryption and access control. Good alternatives for use on mobile social networks are the Public Broadcast Encryption approach for appropriate concordance and consistency with the structure of social networks as well as the Attribute-Based Encryption owing to its capability and proper implementation of the access control policy. Accordingly, in this paper, a framework was presented based on the Public Broadcast Encryption and Attribute-Based Encryption. Using proxies, we outsourced some of these operations in the proposed framework to reduce the computational load of the end device, accelerate the encryption and decryption operations, and decrease the amount of storage memory for keeping the encryption and decryption parameters required by the users in the end-device. Cloud was also employed to store the shared data and user preferences in the social network. The results of investigating the privacy parameters reveal that our framework is superior to the four compared methods. Additionally, the results indicate that in terms of three important parameters in mobile social networks, namely communication, computation, and storage complexity, our method has less complexity and overhead than they have. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature
- Keywords:
- Access control ; Broadcasting ; Complex networks ; Data Sharing ; Digital storage ; Social networking (online) ; Access control policies ; Attribute-based encryptions ; Broadcast encryption ; Computational loads ; Encryption and decryption ; Mobile social networks ; Shared data ; Storage complexity ; Cryptography
- Source: Mobile Networks and Applications ; Volume 26, Issue 3 , 2021 , Pages 1281-1299 ; 1383469X (ISSN)
- URL: https://link.springer.com/article/10.1007/s11036-021-01761-1