2015 IEEE 39th Annual Computer Software and Applications Conference 2015
DOI: 10.1109/compsac.2015.9
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographic Protocols for Enforcing Relationship-Based Access Control Policies

Abstract: Abstract-Relationship-based access control schemes have been studied to protect users' privacy in online social networks. In this paper, we propose cryptographic protocols for decentralized social networks to enforce relationship-based access control polices, i.e., k-common friends and k-depth. Our protocols are mainly built on pairing-based cryptosystems. We prove their security under the honest but curious adversary model, and we analyze their computation and communication complexities. Furthermore, we evalu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
2
2

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 32 publications
0
4
0
Order By: Relevance
“…In [3], access control policies are defined by semantic web technologies. The authors of in [9,2] propose to use hybrid logic as the policy language, this logic has been demonstrated quite powerful and later be used in several works including [22,7,14,17,6,15].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In [3], access control policies are defined by semantic web technologies. The authors of in [9,2] propose to use hybrid logic as the policy language, this logic has been demonstrated quite powerful and later be used in several works including [22,7,14,17,6,15].…”
Section: Related Workmentioning
confidence: 99%
“…Due to the different designs of the two OSNs' APIs, we can extract the category information of each location for Instagram while not for Twitter. Here, location category information on Instagram is from Foursquare, a popular location-based social network, in which different location categories are organized into a tree structure 15 . In this paper, we take the first layer of the category tree (nine categories) to label each location, including entertainment, university, food, nightlife, outdoor, professional, residence, store and transportation.…”
Section: Offline Behaviormentioning
confidence: 99%
“…Pang and Zhang [20] used cryptography to solve access control and privacy protection problems in social networks, which also pointed out a new development direction for access control technology in social networks. This kind of access control method is capable to describe situations like 'k-common friends' and 'k-depth'.…”
Section: B Cryptography Based Access Controlmentioning
confidence: 99%
“…Recently, Crampton and Sellwood [22] generalized relationship-based access control to other systems than social networks, they proposed path logic conditions for specifying policies and adopt principle matching for policy evaluation. Besides models, several security protocols based on cryptographic techniques are proposed to enforce relationship-based access control policies, e.g., see [23,24,25,26,27,28,29,30,31].…”
Section: Related Workmentioning
confidence: 99%