DocumentCode :
1382372
Title :
Exploiting Trust-Based Social Networks for Distributed Protection of Sensitive Data
Author :
Xu, Shouhuai ; Li, Xiaohu ; Parker, Paul ; Wang, Xueping
Author_Institution :
Dept. of Comput. Sci ence, Univ. of Texas at San Antonio, San Antonio, TX, USA
Volume :
6
Issue :
1
fYear :
2011
fDate :
3/1/2011 12:00:00 AM
Firstpage :
39
Lastpage :
52
Abstract :
How can we protect sensitive data of average users? In this paper, we propose taking advantage of real-life social trust between average users (called “trust-based social networks”) as well as threshold cryptography. This leads to a new type of complex systems, for which we define and characterize the following novel properties: 1) attack-resilience, which captures the consequences of computers getting compromised; 2) security utility of anonymous social networks, which captures the security gained when the underlying social network links are not known to the attacker; 3) security utility of psychological soundness, which captures the security gained when a user keeps a decisive share of its sensitive data; 4) availability, which captures the effect when computers are not always responsive; 5) the trade-off between attack-resilience and availability.
Keywords :
cryptography; social networking (online); anonymous social networks; attack resilience; psychological soundness; real-life social trust; security utility; sensitive data protection; threshold cryptography; trust based social networks; Anonymity; availability; complex system; security; social network; social trust; threshold cryptography;
fLanguage :
English
Journal_Title :
Information Forensics and Security, IEEE Transactions on
Publisher :
ieee
ISSN :
1556-6013
Type :
jour
DOI :
10.1109/TIFS.2010.2093521
Filename :
5639080
Link To Document :
بازگشت