skip to main content
10.1145/2414456.2414488acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Keeping identity secret in online social networks

Published: 02 May 2012 Publication History

Abstract

In this paper, we construct a system which can hide users' identity when they visit untrusted third party storage sites. We also define a fine-grained access control policy for the data owner to freely define who can access the record. That is to say, the data owner divide his friends into several groups and issues them corresponding credentials for accessing his data. However, he can adds a friend at any time in a revocation list (RL) so that that friend could not access the data owner's data any more even if he has credentials. We theoretically prove the security of our protocols, and evaluate the performance of our protocols through simulations.

References

[1]
R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin. Persona: An online social network with user-defined privacy. ACM SIGCOMM Computer Communication Review, 39(4): 135--146, 2009.
[2]
J. Camenisch, M. Dubovitskaya, and G. Neven. Oblivious transfer with access control. In Proceedings of the 16th ACM conference on Computer and communications security, pages 131--140. ACM, 2009.
[3]
R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In focs, page 136. Published by the IEEE Computer Society, 2001.
[4]
G. Danezis and P. Mittal. Sybilinfer: Detecting sybil nodes using social networks. NDSS., 2009.
[5]
J. Domingo-Ferrer, A. Viejo, F. Sebé, and Ú. González-Nicolás. Privacy homomorphisms for social networks with private relationships. Computer Networks, 52(15): 3007--3016, 2008.
[6]
M. Hay, G. Miklau, D. Jensen, D. Towsley, and P. Weis. Resisting structural re-identification in anonymized social networks. Proceedings of the VLDB Endowment, 1(1): 102--114, 2008.
[7]
M. Li, N. Cao, S. Yu, and W. Lou. Findu: Privacy-preserving personal profile matching in mobile social networks. In Proc. of Infocom, 2011.
[8]
A. Narayanan, N. Thiagarajan, M. Lakhani, M. Hamburg, and D. Boneh. Location privacy via private proximity testing. In Proc. of NDSS, 2011.
[9]
A. Squicciarini, M. Shehab, and F. Paci. Collective privacy management in social networks. In Proceedings of the 18th international conference on World wide web, pages 521--530. ACM, 2009.
[10]
J. Sun, X. Zhu, and Y. Fang. A privacy-preserving scheme for online social networks with efficient revocation. In INFOCOM, 2010 Proceedings IEEE, pages 1--9. IEEE, 2010.
[11]
B. Viswanath, A. Post, K. Gummadi, and A. Mislove. An analysis of social network-based sybil defenses. In Proceedings of the ACM SIGCOMM 2010 conference on SIGCOMM, pages 363--374. ACM, 2010.
[12]
G. Wondracek, T. Holz, E. Kirda, and C. Kruegel. A practical attack to de-anonymize social network users. In 2010 IEEE Symposium on Security and Privacy, pages 223--238. IEEE, 2010.
[13]
H. Yu, P. Gibbons, M. Kaminsky, and F. Xiao. Sybillimit: A near-optimal social network defense against sybil attacks. In Security and Privacy, 2008. SP 2008. IEEE Symposium on, pages 3--17. IEEE, 2008.

Index Terms

  1. Keeping identity secret in online social networks

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      ASIACCS '12: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
      May 2012
      119 pages
      ISBN:9781450316484
      DOI:10.1145/2414456
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 02 May 2012

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. access control
      2. hide identity
      3. online social network
      4. revocation

      Qualifiers

      • Research-article

      Conference

      ASIA CCS '12
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 418 of 2,322 submissions, 18%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 149
        Total Downloads
      • Downloads (Last 12 months)3
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 20 Jan 2025

      Other Metrics

      Citations

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media