通信学报 ›› 2014, Vol. 35 ›› Issue (8): 15-22.doi: 10.3969/j.issn.1000-436x.2014.08.004

• 学术论文 • 上一篇    下一篇

面向社交网络的隐私保护方案

吕志泉1,2,洪澄1,张敏1,冯登国1,陈开渠3   

  1. 1 中国科学院 软件研究所 可信计算与信息保障实验室,北京 100190
    2 中国科学院大学,北京 100049
    3 国家超级计算深圳中心,广东 深圳 518055
  • 出版日期:2014-08-25 发布日期:2017-06-29
  • 基金资助:
    国家自然科学基金资助项目;国家自然科学基金资助项目;国家自然科学基金资助项目;深圳市战略新兴产业发展专项资金基金资助项目

Privacy-perserving scheme for social networks

Zhi-quan LV1,2,Cheng HONG1,Min1 ZHANG1,Deng-guo FENG1,Kai-qu CHEN3   

  1. 1 TCA Institute of Software,Chinese Academy of Sciences,Beijing 100190, China
    2 University of Chinese Academy of Sciences, Beijing 100049, China
    3 National Supercomputing Center in Shenzhen, Shenzhen 518055, China
  • Online:2014-08-25 Published:2017-06-29
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;Shenzhen Special Funds for Development of New Industries

摘要:

针对社交网络的隐私安全问题,提出了一种新的社交网络隐私保护方案。首先设计了带陷门的属性加密算法,由属性权威机构与数据属主协同完成用户私钥的生成与分发,有效降低了数据属主的密钥管理代价。然后,通过令牌树机制控制用户对属性陷门的获取,实现了高效的属性撤销。安全性分析表明,该方案能够避免社交网络服务提供商与系统内部非授权用户的合谋攻击,且不泄漏用户的任何属性信息。实验结果证实,该方案在计算代价、存储代价等方面比现有方案更有优越性。

关键词: 社交网络, 隐私保护, 属性加密, 令牌树, 属性撤销

Abstract:

The security and privacy issues in SNS were studied and a privacy-preserving scheme PPSNS was proposed. PPSNS utilizes attribute-based encryption, allowing the SNS user to set up an enforcement of fine-grained access control upon the data he owns, thus the potential threats from unauthorized parties or even the SNS provider itself could be avoided. A token system in PPSNS is included to address the challenging issue of efficient attribute revocation. In addi-tion, the users in PPSNS don't have to manage as much information as they do in other encryption-based solutions, achieving a much lower cost in the client side. Analyses show that PPSNS is secure, and gives a better performance in computing and storage costs compared to most related works.

Key words: social network, privacy-preserving, attribute-based encryption, token tree, attribute revocation

No Suggested Reading articles found!