Skip to main content

Development of a Protocol to Ensure the Safety of User Data in Social Networks, Based on the Backes Method

  • Conference paper
Knowledge-Based Software Engineering (JCKBSE 2014)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 466))

Included in the following conference series:

Abstract

This article discusses the security issues of user data in social networks, such approaches to security. Analyses existing approaches based on their own protocol is being developed that uses the social network representation as a queuing network. Arguments in favour of the proposed approach effectiveness are considered, it is implemented based on the method of Backes, as well as numerical simulation results of its work.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abe, M., Fuchsbauer, G., Groth, J., Haralambiev, K., Ohkubo, M.: Structure-preserving signatures and commitments to group elements. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 209–236. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  2. Backes, M., Maffei, M., Pecina, K.: Automated Synthesis of Privacy Preserving Distributed Applications. In: Proc. Network and Distributed System Security Symposium (NDSS 2012). Internet Society (2012)

    Google Scholar 

  3. Blazy, O., Fuchsbauer, G., Izabachène, M., Jambert, A., Sibert, H., Vergnaud, D.: Batch groth–sahai. In: Zhou, J., Yung, M. (eds.) ACNS 2010. LNCS, vol. 6123, pp. 218–235. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  4. Camenisch, J., Dubovitskaya, M., Lehmann, A., Neven, G., Paquin, C., Preiss, F.-S.: Concepts and Languages for Privacy-Preserving Attribute-Based Authentication. In: Fischer Hübner, S., de Leeuw, E., Mitchell, C. (eds.) IDMAN 2013. IFIP AICT, vol. 396, pp. 34–52. Springer, Heidelberg (2013)

    Google Scholar 

  5. Ghadafi, E., Smart, N.P., Warinschi, B.: Groth–Sahai proofs revisited. Springer (2010)

    Google Scholar 

  6. Groth, J., Sahai, A.: Efficient Non-interactive Proof Systems for Bilinear Groups. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 415–432. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  7. Lukjanov, V.S., Cherkovasky, I.V., Skakunov, A.V., Bykov, D.V.: Model of computer networks with certification centres: monograph, p. 242. VSTU, Volgograd (2009)

    Google Scholar 

  8. Maffei, M., Pecina, K.: Position Paper: Privacy-Aware Proof-Carrying Authorization. In: Proc. ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS 2011) (2011)

    Google Scholar 

  9. Maffei, M., Reinert, M.: Security and Privacy by Declarative Design. In: 2013 IEEE 26th Computer Security Foundations Symposium (CSF) (2013)

    Google Scholar 

  10. Chumak, A.A., Ukustov, S.S., Kravets, A.G., Voronin, J.F.: Social Networks Message Posting Support Module. World Applied Sciences Journal 24, 191–195 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Quyên, L.X., Kravets, A.G. (2014). Development of a Protocol to Ensure the Safety of User Data in Social Networks, Based on the Backes Method. In: Kravets, A., Shcherbakov, M., Kultsova, M., Iijima, T. (eds) Knowledge-Based Software Engineering. JCKBSE 2014. Communications in Computer and Information Science, vol 466. Springer, Cham. https://doi.org/10.1007/978-3-319-11854-3_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11854-3_33

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11853-6

  • Online ISBN: 978-3-319-11854-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics