Keeping identity secret in online social networks

Xinxin Zhao, Lingjun Li, Guoliang Xue

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper, we construct a system which can hide users' identity when they visit untrusted third party storage sites. We also define a fine-grained access control policy for the data owner to freely define who can access the record. That is to say, the data owner divide his friends into several groups and issues them corresponding credentials for accessing his data. However, he can adds a friend at any time in a revocation list (RL) so that that friend could not access the data owner's data any more even if he has credentials. We theoretically prove the security of our protocols, and evaluate the performance of our protocols through simulations.

Original languageEnglish (US)
Title of host publicationASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security
Pages55-56
Number of pages2
DOIs
StatePublished - Dec 1 2012
Event7th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2012 - Seoul, Korea, Republic of
Duration: May 2 2012May 4 2012

Publication series

NameASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security

Other

Other7th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2012
CountryKorea, Republic of
CitySeoul
Period5/2/125/4/12

Keywords

  • Access control
  • Hide identity
  • Online social network
  • Revocation

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Safety, Risk, Reliability and Quality

Fingerprint Dive into the research topics of 'Keeping identity secret in online social networks'. Together they form a unique fingerprint.

  • Cite this

    Zhao, X., Li, L., & Xue, G. (2012). Keeping identity secret in online social networks. In ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security (pp. 55-56). (ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security). https://doi.org/10.1145/2414456.2414488