Call for Paper

CAE solicits original research papers for the May 2023 Edition. Last date of manuscript submission is April 30, 2023.

Read More

Social Network with Dynamic Identity-based Broadcast Encryption using Security Tree

Ali Meligy, Ayman Alazab. Published in Security.

Communications on Applied Electronics
Year of Publication: 2016
Publisher: Foundation of Computer Science (FCS), NY, USA
Authors: Ali Meligy, Ayman Alazab
10.5120/cae2016652168

Ali Meligy and Ayman Alazab. Article: Social Network with Dynamic Identity-based Broadcast Encryption using Security Tree. Communications on Applied Electronics 4(9):31-35, April 2016. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX

@article{key:article,
	author = {Ali Meligy and Ayman Alazab},
	title = {Article: Social Network with Dynamic Identity-based Broadcast Encryption using Security Tree},
	journal = {Communications on Applied Electronics},
	year = {2016},
	volume = {4},
	number = {9},
	pages = {31-35},
	month = {April},
	note = {Published by Foundation of Computer Science (FCS), NY, USA}
}

Abstract

In this paper, we suggest the security tree scheme using dynamic identity-based broadcast encryption, using this scheme, it is possible to parted a message to many linked nodes and represent these nodes as security tree and give every receiver permission to read special linked nodes from security tree.

References

  1. Jeong, H., Won, D.: Access-control-based Efficient Privacy Protection Method for Social Networking Services. Journal of The Korea Institute of Information Security & Cryptology 1(23), 81–88 (2013).
  2. Youngman Jung, Yoonho Nam, Jiye Kim, Woongryul Jeon, Hanwook Lee, and Dongho Won.: Key Management Scheme Using Dynamic Identity-Based Broadcast Encryption for Social Network Services College of Information and Communication Engineering, Sungkyunkwan University, 300 Cheoncheon-dong, Jangan-gu, Suwon-si, Gyeonggi-do, 440-746, Korea
  3. Yeung, C.A., Licaardi, L., Lu, K., Seneviratne, O., Lee, T.B.: Decentralization: The future of online social networking. In: Proc. Int. Joint Conf. W3C Workshop (2009).
  4. Datta, A., Buchegger, S., Vu, L.H., Strufe, T., Rzadca, K.: Decentralized online social networks. In: Handbook of Social Network Technologies and Applications, pp. 349–378 (2010).
  5. Cutillo, L.A., Molva, R., Strufe, T.: Privacy preserving social networking through decentralization. Wireless On-Demand Network Systems and Services, 145–152 (2009).
  6. Zhang. : Identity-Based Broadcast Encryption with Recipient Privacy. In 978-1-4244-5539- 3/10/$26.00 ©2010 IEEE (2010).
  7. Jiang, H., Xu, Q., Shang, J.: An efficient dynamic identity-based broadcast encryption scheme. In: 2010 Second International Symposium on Data, Privacy and E-Commerce (ISDPE), pp. 27–32 (2010).
  8. Boldyreva. : Identity-based Encryption with Efficient Revocation. In Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2008, ACM Press, 2008.
  9. Ajami, R., Ramadan, N., Mohamed, N., Al-Jaroodi, J.: Security Challenges and Approaches in Online Social Networks: A Survey. International Journal of Computer Science and Network Security 11(8) (August 2011).
  10. Zilpelwar, R.A., Bedi, R.K., Wadhai, V.M.: An Overview of Privacy and Security in SNS. International Journal of P2P Network Trends and Technology 2(1) (2012)\

Keywords

Social Network Service, Decentralized, DIBBE, Security Tree.