Abstract
Mobile Social Networks (MSN) are attractive applications which enable users to share data with a group of friends and stay connected. WeChat, QQ are among the most popular applications of MSNs where personal multimedia files are shared among group contacts. However, the security risks accompanying such developments have raised concerns in people. The providers typically store users’ data, and offer few options for the users to custom and manage the dissipation of their data over the network. In this paper, we design a data sharing framework in which individuals retain ownership of their data. The scheme gives users flexible and granular access control over their data, and more importantly it provides protection from the untrusted data provider server. Experiments show the efficiency of our scheme.
Similar content being viewed by others
References
Baden R, Bender A, Spring N, Bhattacharjee B, Starin D (2009) Persona: an online social network with user-defined privacy ACM SIGCOMM Computer Communication Review, vol 39. ACM, pp 135–146
Beimel A (1996) Secure schemes for secret sharing and key distribution. PhD thesis, Israel Institute of Technology, Technion, Haifa, Israel
Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp 321–334
Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing Proceedings of Crypto on Advances in Cryptology. Springer, pp 213–229
Boyen X, Waters B (2007) Full-domain subgroup hiding and constant-size group signatures Proceedings of the International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, pp 1–15
Chen J, Song X, Nie L, Wang X, Zhang H, Chua T-S (2016) Micro tells macro: Predicting the popularity of micro-videos via a transductive model Proceedings of the 2016 ACM on Multimedia Conference. ACM, pp 898–907
Cheung L, Newport C (2007) Provably secure ciphertext policy abe. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp 456–465
Dong W, Dave V, Qiu L, Zhang Y (2011) Secure friend discovery in mobile social networks. Proc IEEE Int Conf Comput Commun 34(17):1647–1655
Gao H, Hu J, Huang T, Wang J, Chen Y (2011) Security issues in online social networks. IEEE Internet Comput 15(4):56–63
Green AAM, Rushanan M. libfenc: the functional encryption library. http://code.google.com/p/libfenc/
Green M, Hohenberger S, Waters B (2011) Outsourcing the decryption of abe ciphertexts. In: Proceedings of the 20th Usenix Conference on Security, pp 34–34
Hohenberger S, Waters B (2013) Attribute-based encryption with fast decryption. In: Public Key Cryptography, pp 162–179
Kate A, Zaverucha G, Goldberg I (2007) Pairing-based onion routing Privacy Enhancing Technologies. Springer, pp 95–112
Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In: Proceedings of Eurocrypt on Advances in Cryptology, pp 62–91
Liang X, Cao Z, Shao J, Lin H (2007) Short group signature without random oracles. Springer, Berlin Heidelberg
Liang X, Xu L, Zhang K, Lu R (2013) Fully anonymous profile matching in mobile social networks. IEEE J Select Areas Commun 31(9):641–655
Li J, Ren K, Bo Z, Wan Z (2009) Privacy-aware attribute-based encryption with user accountability. In: Information Security, pp 347–362
Li M, Cao N, Yu S, Lou W (2011) Findu: Privacy-preserving personal profile matching in mobile social networks. Proc IEEE Int Conf Comput Commun 2 (3):2435–2443
Liu X, Xia Y, Jiang S, Xia F, Wang Y (2013) Hierarchical attribute-based access control with authentication for outsourced data in cloud computing Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, pp 477–484
Liu X, Xia Y, Chen W, Xiang Y, Hassan MM, Alelaiwi A (2016) Semd: Secure and efficient message dissemination with policy enforcement in vanet. J Comput Syst Sci 82:1316–1328
Lynn B. Stanford pairings-based crypto library. http://crypto.stanford.edu/pbc/
Ostrovsky R, Sahai A, Waters B (2007) Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp 195–203
Sahai A., Waters B. (2005) Fuzzy identity-based encryption. In: Proceedings of Eurocrypto on Advances in Cryptology, pp 557–557
Sahai A, Seyalioglu H, Waters B (2012) Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Proceedings of Crypto on Advances in Cryptology, pp 199–217
Song X, Ming Z-Y, Nie L, Zhao Y-L, Chua T-S (2016) Volunteerism tendency prediction via harvesting multiple social networks. ACM Trans Inf Syst 34 (2):10
Song X, Nie L, Zhang L, Akbari M, Chua T-S (2017) Multiple social network learning and its application in volunteerism tendency prediction Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval. ACM, pp 213–222
Tootoonchian A, Saroiu S, Ganjali Y, Wolman A (2009) Lockr: better privacy for social networks Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies,. ACM, pp 169–180
Wang W, Yan Y, Zhang L, Hong R, Sebe N (2016) Collaborative sparse coding for multiview action recognition. IEEE MultiMed 23(4):80–87
Waters B (2009) Dual system encryption: Realizing fully secure ibe and hibe under simple assumptions. In: Proceedings of Crypto on Advances in Cryptology, pp 619–636
Waters B (2011) Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In: Public Key Cryptography, pp 53–70
Xia Y, Ren X, Peng Z, Zhang J, Li S (2014) Effectively identifying the influential spreaders in large-scale social networks. Multimedia Tools and Applications, pp 1–13
Xia Y, Liu X, Xia F, Wang G (2016) A reduction of security notions in designated confirmer signatures. Theor Comput Sci 618:1–20
Zhang L, Song M, Li N, Bu J, Chen C (2009) Feature selection for fast speech emotion recognition Proceedings of the 17th ACM international conference on Multimedia. ACM, pp 753–756
Zhang R, Zhang R, Sun J, Yan U (2012) Fine-grained private matching for proximity-based mobile social networking. Proc IEEE Int Conf Comput Commun 131 (5):1969–1977
Zhang L, Han Y, Yi Y, Song M, Yan S, Qi T (2013) Discovering discriminative graphlets for aerial image categories recognition. IEEE Trans Image Process 22(12):5071–5084
Zhang L, Song M, Qi Z, Liu X, Bu J, Chen C (2013) Probabilistic graphlet transfer for photo cropping, vol 22
Zhang L, Gao Y, Xia Y, Lu K, Shen J, Ji R (2014) Representative discovery of structure cues for weakly-supervised image segmentation. IEEE Trans Multimed 16 (2):470–479
Zhang L, Yi Y, Gao Y, Yu Y, Wang C, Li X (2014) A probabilistic associative model for segmenting weakly supervised images. IEEE Trans Image Process 23(9):4150–4159
Zhang L, Gao Y, Zimmermann R, Qi T, Li X (2014) Fusion of multichannel local and global structural cues for photo aesthetics evaluation. IEEE Trans Image Process 23(3):1419–1429
Zhang J, Nie L, Wang X, He X, Huang X, Chua TS (2016) Shorter-is-better Venue category estimation from micro-video Proceedings of the 2016 ACM on Multimedia Conference. ACM, pp 1415– 1424
Zhang L, Hong R, Gao Y, Ji R, Dai Q, Li X (2016) Image categorization by learning a propagated graphlet path. IEEE Trans Neural Netw Learn Syst 27(3):674–685
Zhang L, Wang M, Hong R, Yin B-C, Li X (2016) Large-scale aerial image categorization using a multitask topological codebook. IEEE Trans Cybern 46 (2):535–545
Zhang L, Yang Y, Wang M, Hong R, Nie L, Li X (2016) Detecting densely distributed graph patterns for fine-grained image categorization. IEEE Trans Image Process 25(2):553–565
Zhang L, Gao Y, Xia Y, Dai Q, Li X (2017) A fine-grained image categorization system by cellet-encoded spatial pyramid modeling. IEEE Trans Indust Electron 62(1):564–571
Zhang L, Xia Y, Ji R, Li X (2017) Spatial-aware object-level saliency prediction by learning graphlet hierarchies. IEEE Trans Indust Electron 62(2):1301–1308
Zhang L, Gao Y, Ji R, Dai Q, Li X Actively learning human gaze shifting paths for photo cropping. IEEE Transcations on Image Processing, pages 2235–2245
Acknowledgments
This research is supported in part by the following funds: National Natural Science Foundation of China under grant number 61502134, 61472113, and 61304188, Zhejiang Provincial Natural Science Foundation of China under grant number LZ13F020004 and LR14F020003, Zhejiang Provincial Science and Technology Innovation Program under grant number 2013TD03, and Hangzhou Science and Technology Development Plan under grant number 20170533B04.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Liu, X., Sun, J., Yang, W. et al. Ensuring efficient multimedia message sharing in mobile social network. Multimed Tools Appl 78, 31003–31017 (2019). https://doi.org/10.1007/s11042-017-4543-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-4543-y