Skip to main content
Log in

Ensuring efficient multimedia message sharing in mobile social network

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Mobile Social Networks (MSN) are attractive applications which enable users to share data with a group of friends and stay connected. WeChat, QQ are among the most popular applications of MSNs where personal multimedia files are shared among group contacts. However, the security risks accompanying such developments have raised concerns in people. The providers typically store users’ data, and offer few options for the users to custom and manage the dissipation of their data over the network. In this paper, we design a data sharing framework in which individuals retain ownership of their data. The scheme gives users flexible and granular access control over their data, and more importantly it provides protection from the untrusted data provider server. Experiments show the efficiency of our scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Baden R, Bender A, Spring N, Bhattacharjee B, Starin D (2009) Persona: an online social network with user-defined privacy ACM SIGCOMM Computer Communication Review, vol 39. ACM, pp 135–146

  2. Beimel A (1996) Secure schemes for secret sharing and key distribution. PhD thesis, Israel Institute of Technology, Technion, Haifa, Israel

    Google Scholar 

  3. Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp 321–334

  4. Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing Proceedings of Crypto on Advances in Cryptology. Springer, pp 213–229

  5. Boyen X, Waters B (2007) Full-domain subgroup hiding and constant-size group signatures Proceedings of the International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, pp 1–15

  6. Chen J, Song X, Nie L, Wang X, Zhang H, Chua T-S (2016) Micro tells macro: Predicting the popularity of micro-videos via a transductive model Proceedings of the 2016 ACM on Multimedia Conference. ACM, pp 898–907

  7. Cheung L, Newport C (2007) Provably secure ciphertext policy abe. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp 456–465

  8. Dong W, Dave V, Qiu L, Zhang Y (2011) Secure friend discovery in mobile social networks. Proc IEEE Int Conf Comput Commun 34(17):1647–1655

    Google Scholar 

  9. Gao H, Hu J, Huang T, Wang J, Chen Y (2011) Security issues in online social networks. IEEE Internet Comput 15(4):56–63

    Article  Google Scholar 

  10. Green AAM, Rushanan M. libfenc: the functional encryption library. http://code.google.com/p/libfenc/

  11. Green M, Hohenberger S, Waters B (2011) Outsourcing the decryption of abe ciphertexts. In: Proceedings of the 20th Usenix Conference on Security, pp 34–34

  12. Hohenberger S, Waters B (2013) Attribute-based encryption with fast decryption. In: Public Key Cryptography, pp 162–179

    Chapter  Google Scholar 

  13. Kate A, Zaverucha G, Goldberg I (2007) Pairing-based onion routing Privacy Enhancing Technologies. Springer, pp 95–112

  14. Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In: Proceedings of Eurocrypt on Advances in Cryptology, pp 62–91

  15. Liang X, Cao Z, Shao J, Lin H (2007) Short group signature without random oracles. Springer, Berlin Heidelberg

    Book  Google Scholar 

  16. Liang X, Xu L, Zhang K, Lu R (2013) Fully anonymous profile matching in mobile social networks. IEEE J Select Areas Commun 31(9):641–655

    Article  Google Scholar 

  17. Li J, Ren K, Bo Z, Wan Z (2009) Privacy-aware attribute-based encryption with user accountability. In: Information Security, pp 347–362

    Google Scholar 

  18. Li M, Cao N, Yu S, Lou W (2011) Findu: Privacy-preserving personal profile matching in mobile social networks. Proc IEEE Int Conf Comput Commun 2 (3):2435–2443

    Google Scholar 

  19. Liu X, Xia Y, Jiang S, Xia F, Wang Y (2013) Hierarchical attribute-based access control with authentication for outsourced data in cloud computing Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, pp 477–484

  20. Liu X, Xia Y, Chen W, Xiang Y, Hassan MM, Alelaiwi A (2016) Semd: Secure and efficient message dissemination with policy enforcement in vanet. J Comput Syst Sci 82:1316–1328

    Article  MathSciNet  Google Scholar 

  21. Lynn B. Stanford pairings-based crypto library. http://crypto.stanford.edu/pbc/

  22. Ostrovsky R, Sahai A, Waters B (2007) Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp 195–203

  23. Sahai A., Waters B. (2005) Fuzzy identity-based encryption. In: Proceedings of Eurocrypto on Advances in Cryptology, pp 557–557

    Google Scholar 

  24. Sahai A, Seyalioglu H, Waters B (2012) Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Proceedings of Crypto on Advances in Cryptology, pp 199–217

    Google Scholar 

  25. Song X, Ming Z-Y, Nie L, Zhao Y-L, Chua T-S (2016) Volunteerism tendency prediction via harvesting multiple social networks. ACM Trans Inf Syst 34 (2):10

    Article  Google Scholar 

  26. Song X, Nie L, Zhang L, Akbari M, Chua T-S (2017) Multiple social network learning and its application in volunteerism tendency prediction Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval. ACM, pp 213–222

  27. Tootoonchian A, Saroiu S, Ganjali Y, Wolman A (2009) Lockr: better privacy for social networks Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies,. ACM, pp 169–180

  28. Wang W, Yan Y, Zhang L, Hong R, Sebe N (2016) Collaborative sparse coding for multiview action recognition. IEEE MultiMed 23(4):80–87

    Article  Google Scholar 

  29. Waters B (2009) Dual system encryption: Realizing fully secure ibe and hibe under simple assumptions. In: Proceedings of Crypto on Advances in Cryptology, pp 619–636

    Chapter  Google Scholar 

  30. Waters B (2011) Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In: Public Key Cryptography, pp 53–70

    Chapter  Google Scholar 

  31. Xia Y, Ren X, Peng Z, Zhang J, Li S (2014) Effectively identifying the influential spreaders in large-scale social networks. Multimedia Tools and Applications, pp 1–13

  32. Xia Y, Liu X, Xia F, Wang G (2016) A reduction of security notions in designated confirmer signatures. Theor Comput Sci 618:1–20

    Article  MathSciNet  Google Scholar 

  33. Zhang L, Song M, Li N, Bu J, Chen C (2009) Feature selection for fast speech emotion recognition Proceedings of the 17th ACM international conference on Multimedia. ACM, pp 753–756

  34. Zhang R, Zhang R, Sun J, Yan U (2012) Fine-grained private matching for proximity-based mobile social networking. Proc IEEE Int Conf Comput Commun 131 (5):1969–1977

    Google Scholar 

  35. Zhang L, Han Y, Yi Y, Song M, Yan S, Qi T (2013) Discovering discriminative graphlets for aerial image categories recognition. IEEE Trans Image Process 22(12):5071–5084

    Article  MathSciNet  Google Scholar 

  36. Zhang L, Song M, Qi Z, Liu X, Bu J, Chen C (2013) Probabilistic graphlet transfer for photo cropping, vol 22

    Article  MathSciNet  Google Scholar 

  37. Zhang L, Gao Y, Xia Y, Lu K, Shen J, Ji R (2014) Representative discovery of structure cues for weakly-supervised image segmentation. IEEE Trans Multimed 16 (2):470–479

    Article  Google Scholar 

  38. Zhang L, Yi Y, Gao Y, Yu Y, Wang C, Li X (2014) A probabilistic associative model for segmenting weakly supervised images. IEEE Trans Image Process 23(9):4150–4159

    Article  MathSciNet  Google Scholar 

  39. Zhang L, Gao Y, Zimmermann R, Qi T, Li X (2014) Fusion of multichannel local and global structural cues for photo aesthetics evaluation. IEEE Trans Image Process 23(3):1419–1429

    Article  MathSciNet  Google Scholar 

  40. Zhang J, Nie L, Wang X, He X, Huang X, Chua TS (2016) Shorter-is-better Venue category estimation from micro-video Proceedings of the 2016 ACM on Multimedia Conference. ACM, pp 1415– 1424

  41. Zhang L, Hong R, Gao Y, Ji R, Dai Q, Li X (2016) Image categorization by learning a propagated graphlet path. IEEE Trans Neural Netw Learn Syst 27(3):674–685

    Article  MathSciNet  Google Scholar 

  42. Zhang L, Wang M, Hong R, Yin B-C, Li X (2016) Large-scale aerial image categorization using a multitask topological codebook. IEEE Trans Cybern 46 (2):535–545

    Article  Google Scholar 

  43. Zhang L, Yang Y, Wang M, Hong R, Nie L, Li X (2016) Detecting densely distributed graph patterns for fine-grained image categorization. IEEE Trans Image Process 25(2):553–565

    Article  MathSciNet  Google Scholar 

  44. Zhang L, Gao Y, Xia Y, Dai Q, Li X (2017) A fine-grained image categorization system by cellet-encoded spatial pyramid modeling. IEEE Trans Indust Electron 62(1):564–571

    Article  Google Scholar 

  45. Zhang L, Xia Y, Ji R, Li X (2017) Spatial-aware object-level saliency prediction by learning graphlet hierarchies. IEEE Trans Indust Electron 62(2):1301–1308

    Article  Google Scholar 

  46. Zhang L, Gao Y, Ji R, Dai Q, Li X Actively learning human gaze shifting paths for photo cropping. IEEE Transcations on Image Processing, pages 2235–2245

Download references

Acknowledgments

This research is supported in part by the following funds: National Natural Science Foundation of China under grant number 61502134, 61472113, and 61304188, Zhejiang Provincial Natural Science Foundation of China under grant number LZ13F020004 and LR14F020003, Zhejiang Provincial Science and Technology Innovation Program under grant number 2013TD03, and Hangzhou Science and Technology Development Plan under grant number 20170533B04.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xuejiao Liu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, X., Sun, J., Yang, W. et al. Ensuring efficient multimedia message sharing in mobile social network. Multimed Tools Appl 78, 31003–31017 (2019). https://doi.org/10.1007/s11042-017-4543-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4543-y

Keywords

Navigation