DocumentCode :
139764
Title :
Access control in decentralized online social networks: Applying a policy-hiding cryptographic scheme and evaluating its performance
Author :
Bodriagov, Oleksandr ; Kreitz, Gunnar ; Buchegger, Sonja
Author_Institution :
Sch. of Comput. Sci. & Commun., KTH R. Inst. of Technol., Stockholm, Sweden
fYear :
2014
fDate :
24-28 March 2014
Firstpage :
622
Lastpage :
628
Abstract :
Privacy concerns in online social networking services have prompted a number of proposals for decentralized online social networks (DOSN) that remove the central provider and aim at giving the users control over their data and who can access it. This is usually done by cryptographic means. Existing DOSNs use cryptographic primitives that hide the data but reveal the access policies. At the same time, there are privacy-preserving variants of these cryptographic primitives that do not reveal access policies. They are, however, not suitable for usage in the DOSN context because of performance or storage constraints. A DOSN needs to achieve both privacy and performance to be useful. We analyze predicate encryption (PE) and adapt it to the DOSN context. We propose a univariate polynomial construction for access policies in PE that drastically increases performance of the scheme but leaks some part of the access policy to users with access rights. We utilize Bloom filters as a means of decreasing decryption time and indicate objects that can be decrypted by a particular user. We evaluate the performance of the adapted scheme in the concrete scenario of a news feed. Our PE scheme is best suited for encrypting for groups or small sets of separate identities.
Keywords :
authorisation; cryptography; data structures; polynomials; social networking (online); Bloom filters; DOSN; PE; access control; cryptographic primitives; decentralized online social networks; decryption time; performance constraints; policy-hiding cryptographic scheme; predicate encryption; privacy concerns; privacy-preserving variants; storage constraints; univariate polynomial construction; Access control; Encryption; Polynomials; Privacy; Social network services; Vectors;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Pervasive Computing and Communications Workshops (PERCOM Workshops), 2014 IEEE International Conference on
Conference_Location :
Budapest
Type :
conf
DOI :
10.1109/PerComW.2014.6815278
Filename :
6815278
Link To Document :
بازگشت