2019 IEEE Wireless Communications and Networking Conference (WCNC) 2019
DOI: 10.1109/wcnc.2019.8886021
|View full text |Cite
|
Sign up to set email alerts
|

Towards a distributed ABE based approach to protect privacy on online social networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…Two improved algorithms for rule pruning and policy refinement were also proposed to generate higher-quality mining strategies. Yahiatene et al [16] proposed a framework called CloudSN to mitigate privacy issues in OSNs. Using a distributed multi-authority ABE scheme, it provides flexible access to private data, which can only be accessed by users with the correct keys.…”
Section: Attribute Based Access Control Modelmentioning
confidence: 99%
“…Two improved algorithms for rule pruning and policy refinement were also proposed to generate higher-quality mining strategies. Yahiatene et al [16] proposed a framework called CloudSN to mitigate privacy issues in OSNs. Using a distributed multi-authority ABE scheme, it provides flexible access to private data, which can only be accessed by users with the correct keys.…”
Section: Attribute Based Access Control Modelmentioning
confidence: 99%
“…It is demonstrated that the scheme is secure in the random oracle model and has good practicality. Yahiatene et al [30] proposed a new framework to control access to the private data on online social networks. The framework is based on cloud storage and exploits a distributed multi-authority ABE model.…”
Section: Related Workmentioning
confidence: 99%
“…This challenge is specifically severe for medical and financial data because users have the right to decide who can review their sensitive medical and financial records. With attribute-based encryption (ABE) [4][5][6][7][8][9], we can make fine-grained access control much more manageable by only allowing some people with specified attributes (i.e., conditions) to access and view the files.…”
Section: Introduction 1motivationsmentioning
confidence: 99%