Keeping identity secret in online social networks

Xinxin Zhao, Lingjun Li, Guoliang Xue

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper, we construct a system which can hide users' identity when they visit untrusted third party storage sites. We also define a fine-grained access control policy for the data owner to freely define who can access the record. That is to say, the data owner divide his friends into several groups and issues them corresponding credentials for accessing his data. However, he can adds a friend at any time in a revocation list (RL) so that that friend could not access the data owner's data any more even if he has credentials. We theoretically prove the security of our protocols, and evaluate the performance of our protocols through simulations.

Original languageEnglish (US)
Title of host publicationASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security
Pages55-56
Number of pages2
DOIs
StatePublished - 2012
Event7th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2012 - Seoul, Korea, Republic of
Duration: May 2 2012May 4 2012

Other

Other7th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2012
CountryKorea, Republic of
CitySeoul
Period5/2/125/4/12

Fingerprint

Access control

Keywords

  • Access control
  • Hide identity
  • Online social network
  • Revocation

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Safety, Risk, Reliability and Quality

Cite this

Zhao, X., Li, L., & Xue, G. (2012). Keeping identity secret in online social networks. In ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security (pp. 55-56) https://doi.org/10.1145/2414456.2414488

Keeping identity secret in online social networks. / Zhao, Xinxin; Li, Lingjun; Xue, Guoliang.

ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security. 2012. p. 55-56.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Zhao, X, Li, L & Xue, G 2012, Keeping identity secret in online social networks. in ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security. pp. 55-56, 7th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2012, Seoul, Korea, Republic of, 5/2/12. https://doi.org/10.1145/2414456.2414488
Zhao X, Li L, Xue G. Keeping identity secret in online social networks. In ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security. 2012. p. 55-56 https://doi.org/10.1145/2414456.2414488
Zhao, Xinxin ; Li, Lingjun ; Xue, Guoliang. / Keeping identity secret in online social networks. ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security. 2012. pp. 55-56
@inproceedings{d291e3909d6d4e84962125cb57371cbc,
title = "Keeping identity secret in online social networks",
abstract = "In this paper, we construct a system which can hide users' identity when they visit untrusted third party storage sites. We also define a fine-grained access control policy for the data owner to freely define who can access the record. That is to say, the data owner divide his friends into several groups and issues them corresponding credentials for accessing his data. However, he can adds a friend at any time in a revocation list (RL) so that that friend could not access the data owner's data any more even if he has credentials. We theoretically prove the security of our protocols, and evaluate the performance of our protocols through simulations.",
keywords = "Access control, Hide identity, Online social network, Revocation",
author = "Xinxin Zhao and Lingjun Li and Guoliang Xue",
year = "2012",
doi = "10.1145/2414456.2414488",
language = "English (US)",
isbn = "9781450313032",
pages = "55--56",
booktitle = "ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security",

}

TY - GEN

T1 - Keeping identity secret in online social networks

AU - Zhao, Xinxin

AU - Li, Lingjun

AU - Xue, Guoliang

PY - 2012

Y1 - 2012

N2 - In this paper, we construct a system which can hide users' identity when they visit untrusted third party storage sites. We also define a fine-grained access control policy for the data owner to freely define who can access the record. That is to say, the data owner divide his friends into several groups and issues them corresponding credentials for accessing his data. However, he can adds a friend at any time in a revocation list (RL) so that that friend could not access the data owner's data any more even if he has credentials. We theoretically prove the security of our protocols, and evaluate the performance of our protocols through simulations.

AB - In this paper, we construct a system which can hide users' identity when they visit untrusted third party storage sites. We also define a fine-grained access control policy for the data owner to freely define who can access the record. That is to say, the data owner divide his friends into several groups and issues them corresponding credentials for accessing his data. However, he can adds a friend at any time in a revocation list (RL) so that that friend could not access the data owner's data any more even if he has credentials. We theoretically prove the security of our protocols, and evaluate the performance of our protocols through simulations.

KW - Access control

KW - Hide identity

KW - Online social network

KW - Revocation

UR - http://www.scopus.com/inward/record.url?scp=84871976532&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84871976532&partnerID=8YFLogxK

U2 - 10.1145/2414456.2414488

DO - 10.1145/2414456.2414488

M3 - Conference contribution

AN - SCOPUS:84871976532

SN - 9781450313032

SP - 55

EP - 56

BT - ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security

ER -