Abstract
This article discusses the security issues of user data in social networks, such approaches to security. Analyses existing approaches based on their own protocol is being developed that uses the social network representation as a queuing network. Arguments in favour of the proposed approach effectiveness are considered, it is implemented based on the method of Backes, as well as numerical simulation results of its work.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Abe, M., Fuchsbauer, G., Groth, J., Haralambiev, K., Ohkubo, M.: Structure-preserving signatures and commitments to group elements. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 209–236. Springer, Heidelberg (2010)
Backes, M., Maffei, M., Pecina, K.: Automated Synthesis of Privacy Preserving Distributed Applications. In: Proc. Network and Distributed System Security Symposium (NDSS 2012). Internet Society (2012)
Blazy, O., Fuchsbauer, G., Izabachène, M., Jambert, A., Sibert, H., Vergnaud, D.: Batch groth–sahai. In: Zhou, J., Yung, M. (eds.) ACNS 2010. LNCS, vol. 6123, pp. 218–235. Springer, Heidelberg (2010)
Camenisch, J., Dubovitskaya, M., Lehmann, A., Neven, G., Paquin, C., Preiss, F.-S.: Concepts and Languages for Privacy-Preserving Attribute-Based Authentication. In: Fischer Hübner, S., de Leeuw, E., Mitchell, C. (eds.) IDMAN 2013. IFIP AICT, vol. 396, pp. 34–52. Springer, Heidelberg (2013)
Ghadafi, E., Smart, N.P., Warinschi, B.: Groth–Sahai proofs revisited. Springer (2010)
Groth, J., Sahai, A.: Efficient Non-interactive Proof Systems for Bilinear Groups. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 415–432. Springer, Heidelberg (2008)
Lukjanov, V.S., Cherkovasky, I.V., Skakunov, A.V., Bykov, D.V.: Model of computer networks with certification centres: monograph, p. 242. VSTU, Volgograd (2009)
Maffei, M., Pecina, K.: Position Paper: Privacy-Aware Proof-Carrying Authorization. In: Proc. ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS 2011) (2011)
Maffei, M., Reinert, M.: Security and Privacy by Declarative Design. In: 2013 IEEE 26th Computer Security Foundations Symposium (CSF) (2013)
Chumak, A.A., Ukustov, S.S., Kravets, A.G., Voronin, J.F.: Social Networks Message Posting Support Module. World Applied Sciences Journal 24, 191–195 (2013)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Quyên, L.X., Kravets, A.G. (2014). Development of a Protocol to Ensure the Safety of User Data in Social Networks, Based on the Backes Method. In: Kravets, A., Shcherbakov, M., Kultsova, M., Iijima, T. (eds) Knowledge-Based Software Engineering. JCKBSE 2014. Communications in Computer and Information Science, vol 466. Springer, Cham. https://doi.org/10.1007/978-3-319-11854-3_33
Download citation
DOI: https://doi.org/10.1007/978-3-319-11854-3_33
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11853-6
Online ISBN: 978-3-319-11854-3
eBook Packages: Computer ScienceComputer Science (R0)