Secure Pervasive Social Communications Based on Trust in a Distributed Way
Open Access
- 1 January 2016
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Access
- Vol. 4, 9225-9238
- https://doi.org/10.1109/access.2017.2647824
Abstract
Social network has extended its popularity from the Internet to mobile domain. Pervasive social networking (PSN) supports instant social activities based on self-organized mobile ad hoc networks. PSN is useful in reality when fixed networks are unavailable or inconvenient to access or when people are in vicinity. For supporting crucial PSN activities and enhancing user privacy, securing pervasive social communications becomes important. However, a solution based on a centralized server could be inapplicable in some specific situations (e.g., disasters and military activities) and suffers from DoS/DDoS attacks and internal attacks. How to automatically control data access in a trustworthy and efficient way in PSN is a challenge. In this paper, we propose two schemes to secure communication data in PSN purely based on local trust evaluated by PSN nodes in a distributed manner. Each node can control its data based on its trust in other nodes by applying attribute-based encryption. The advantages, security, and performance of the proposed scheme are evaluated and justified through serious analysis and implementation. The results show the efficiency and effectiveness of the schemes. In addition, we developed a mobile app based on Android platform to demonstrate the applicability and social acceptance of our schemes.Funding Information
- National Key Foundational Research and Development on Network and Space Security, China (2016YFB0800704)
- NSFC (61672410, U1536202)
- Natural Science Basic Research Plan in Shaanxi Province of China (2016ZDJC-06)
- PhD grant of the Ministry of Education, China (JY0300130104)
- 111 Project (B08038, B16037)
- Aalto University
This publication has 23 references indexed in Scilit:
- Trust threshold based public key management in mobile ad hoc networksAd Hoc Networks, 2016
- Policy-Controlled Authenticated Access to LLN-Connected Healthcare ResourcesIEEE Systems Journal, 2015
- TACIoT: multidimensional trust-aware access control system for the Internet of ThingsSoft Computing, 2015
- An effective ECC‐based user access control scheme with attribute‐based encryption for wireless sensor networksSecurity and Communication Networks, 2014
- Protect Pervasive Social Networking Based on Two-Dimensional Trust LevelsIEEE Systems Journal, 2014
- Hierarchical attribute-based encryption for fine-grained access control in cloud storage servicesPublished by Association for Computing Machinery (ACM) ,2010
- Controlling data in the cloudPublished by Association for Computing Machinery (ACM) ,2009
- Awareness networking in wireless environmentsIEEE Vehicular Technology Magazine, 2009
- Ciphertext-Policy Attribute-Based EncryptionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Attribute-based encryption for fine-grained access control of encrypted dataPublished by Association for Computing Machinery (ACM) ,2006