Skip to main content
Log in

A novel authorization delegation scheme for multimedia social networks by using proxy re-encryption

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

To solve the existing problem of the multimedia social networks platforms, for instance, the copyrighted or private multimedia content can not be safely shared among users, we proposed a novel authorization delegation scheme based on the proxy re-encryption mechanism. This scheme enables one user to delegate digital rights/privileges to another or the group of users, and achieves fine-grained authorization delegation. The ciphertext of content encryption key (CEK) was re-encrypted by the proxy with re-encryption key, which is generated by delegator, and then the ciphertext was sent to the delegatee only who could decrypt the ciphertext. The CCA security of proxy re-encryption was formally proved that this scheme realized the authorization delegation while ensuring the confidentiality of both the sharing content and the delegator’s private key. Besides, the privileges can be revoked when the usage control policies have not yet been satisfied. Finally, we demonstrated in detail that the proposed scheme was applied to a multimedia social network prototype called by CyVOD MSN, and it achieved the security share of multimedia content and the functionality of digital rights management, together with better resolving the issue of limited access control list.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Ateniese G, Benson K, Hohenberger S (2009) Key-private proxy re-encryption. In Proceedings of Cryptographers’ Track at the RSA Conference. San Francisco, United States, pp 279–294

  2. Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. In Proceedings of International Conference on the Theory and Application of Cryptographic Techniques Espoo. Finland, pp 127–144

  3. Cui J, Wang X (2009) sns based information authorization delegation mechanism and implementation. In Proceedings of CIS 2009 International Conference on Computational Intelligence and Security. Beijing, China, pp 493–497

  4. Devigne J, Guerrini E, Laguillaumie F (2014) Proxy re-encryption scheme supporting a selection of delegatees. In Proceedings of the 7th International Conference on the Theory and Application of Cryptographic Techniques in Africa., Marrakesh, Morocco, pp 13–30

  5. Fabian B, Ermakova T, Junghanns P (2015) Collaborative and secure sharing of healthcare data in multi-clouds. Inf Syst 48(3):132–150

    Article  Google Scholar 

  6. Fotiou N, Machas A, Polyzos GC (2014) Access control delegation for the cloud. Proceedings of IEEE Conference on Computer Communications Workshops, Toronto, pp 13–18

    Google Scholar 

  7. Fu Z, Sun X, Liu Q, Zhou L (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun 98(1):190–200

    Article  Google Scholar 

  8. González-Manzano L, González-Tablas AI, de Fuentes JM (2014) SoNeUCONABC: an expressive usage control model for web-based social networks. Comput Secur 43(6):159–187

    Article  Google Scholar 

  9. Green M, Ateniese G (2007) Identity-based proxy re-encryption. In Proceedings of 5th International Conference on Applied Cryptography and Network Security. Zhuhai, China, pp 288–306

  10. Hu H, Ahn GJ, Jorgensen J (2013) Multiparty access control for online social networks: model and mechanisms. IEEE Trans Knowl Data Eng 25(7):1614–1627

    Article  Google Scholar 

  11. Jahid S, Mittal P, Borisov N (2011) EASiER: encryption based access control in social networks with efficient revocation. In Proceedings of the 6th International Symposium on Information, Computer and Communications Security. Hong Kong, China,pp 411–415

  12. Kaiiali M, Wankar R, Rao CR (2013) Grid authorization graph. Futur Gener Comput Syst 29(8):1909–1918

    Article  Google Scholar 

  13. Külcü Ö, Henkoğlu T (2014) Privacy in social networks: an analysis of Facebook. Int J Inf Manag 34(6):761–769

    Article  Google Scholar 

  14. Li M, Sun X, Wang H (2012) Multi-level delegations with trust management in access control systems. J Intell Inf Syst 39(3):611–626

    Article  Google Scholar 

  15. Liang K, Au MH, Liu JK (2014) A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing. Futur Gener Comput Syst 52(6):1–13

    Google Scholar 

  16. Liang X, Cao Z, Lin H (2009) Attribute based proxy re-encryption with delegating capabilities. In Proceedings of the 4th International Symposium on Information, Computer, and Communications Security. Sydney, NSW, Australia, pp 276–286

  17. Liang K, Chu CK, Tan X (2014) Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts. Theor Comput Sci 539(6):87–105

    Article  MathSciNet  MATH  Google Scholar 

  18. Liu J, Huang X, Liu JK (2014) Secure sharing of personal health records in cloud computing: ciphertext-policy attribute-based signcryption. Futur Gener Comput Syst 52(11):1–10

    Article  Google Scholar 

  19. Liu Q, Wang G, Wu J (2014) Time-based proxy re-encryption scheme for secure data sharing in a cloud environment. Inf Sci 258(2):355–370

    Article  Google Scholar 

  20. Martin J, Gunnar D (2012) Usage and impact of model-based user authorization. Inf Resour Manag J 25(3):98–116

    Article  Google Scholar 

  21. Park J, Sandhu R (2004) The UCON ABC usage control model. ACM Trans Inf SystSecur (TISSEC) 7(1):128–174

    Article  Google Scholar 

  22. Qinlong H, Zhaofeng M, Yixian Y (2014) Improving security and efficiency for encrypted data sharing in online social networks. China Commun 11(3):104–117

    Article  Google Scholar 

  23. Raji F, Miri A, Jazi MD (2013) CP2: cryptographic privacy protection framework for online social networks. Comput Electr Eng 39(7):2282–2298

    Article  Google Scholar 

  24. Ranjbar A, Maheswaran M (2014) Using community structure to control information sharing in online social networks. Comput Commun 41(3):11–21

    Article  Google Scholar 

  25. Ruan C, Varadharajan V (2014) Dynamic delegation framework for role based access control in distributed data management systems. Distrib Parallel Database 32(2):245–269

    Article  Google Scholar 

  26. Seo JW, Yum DH, Lee PJ (2013) Comments on “unidirectional chosen-ciphertext secure proxy re-encryption. IEEE Trans Inf Theory 59(5):3256–3256

    Article  MathSciNet  Google Scholar 

  27. Shao J, Cao Z (2012) Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption. Inf Sci 206(11):83–95

    Article  MathSciNet  MATH  Google Scholar 

  28. Sohr K, Kuhlmann M, Gogolla M (2012) Comprehensive two-level analysis of role-based delegation and revocation policies with UML and OCL. Inf Softw Technol 54(12):1396–1417

    Article  Google Scholar 

  29. Son J, Kim D, Hussain R (2014) Conditional proxy re-encryption for secure big data group sharing in cloud environment. In Proceedings of 2014 I.E. Conference on Computer Communications Workshops. Toronto, Canada, pp 541–546

  30. Wu TS, Lin HY (2014) Provably secure proxy convertible authenticated encryption scheme based on RSA. Inf Sci 278(9):577–587

    Article  MathSciNet  Google Scholar 

  31. Xia Z, Wang X, Sun X (2015) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 99(2):1–13

    Google Scholar 

  32. Zhang Z, Wang Z, Niu D (2014) A novel approach to rights sharing-enabling digital rights management for mobile multimedia. Multimedia Tools Appl 6:1–17

    Google Scholar 

  33. Zhang Z, Yang L, Pei Q (2007) Research on usage control model with delegation characteristics based on OM-AM methodology. In Proceedings of 2007 IFIP International Conference on Network and Parallel Computing Workshops. Dalian, China, pp 238–243

Download references

Acknowledgments

The work was sponsored by National Natural Science Foundation of China Grant No.61370220, Program for Innovative Research Team (in Science and Technology) in University of Henan Province Grant No.15IRTSTHN010, Plan For Scientific Innovation Talent of Henan Province Grant No.134100510006, Program for Henan Province Science and Technology Grant No.142102210425,Key Program for Basic Research of The Education Department of Henan Province Grant No.13A520240 and No.14A520048,Training Foundation for Scientific Innovation Ability of Henan University of Science and Technology Grand No.2013ZCX022, Plan For Innovation Fund for Postgraduates of Henan University of Science & Technology Grant No. CXJJ-ZR12. We give thanks to Dr. Changwei Zhao, Ranran Sun for their technical assistance on CyVOD MSN prototype, and also would like to thank the reviewers and editor for their valuable comments, questions, and suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhiyong Zhang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Feng, W., Zhang, Z., Wang, J. et al. A novel authorization delegation scheme for multimedia social networks by using proxy re-encryption. Multimed Tools Appl 75, 13995–14014 (2016). https://doi.org/10.1007/s11042-015-2929-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-2929-2

Keywords

Navigation