A Secure Encounter-Based Key Transmission over Tor Network In Mobile Social Networks for Improving Security and Privacy

Mobile social networks are attractive applications which composed of a collection of different users from different countries. On that, the group of users can share personal information and stay connected with some of the users. Due to the lack of security infrastructure, the eavesdropper may intrude the conversation. In order to provide secure communication on mobile social networks an encounter-based system with Ciphertext-Policy Attribute Based Encryption (EBS-CPABE) is proposed. The proposed method provides efficient and secure communication with the proper security mechanisms. The Digital Signature Algorithm (DSA) is used for key generation. The key exchange mechanism is used to know about the authenticated users. A Ciphertext-Policy attribute-based encryption (CPABE) scheme is proposed for providing additional security as, if any server storing the data is compromised, then the confidentiality of the data will be compromised. In the proposed system for complex access control on encrypted data that we include Ciphertext-Policy Attribute-Based Encryption (CPABE). Also Tor network is built for enabling online anonymity. The performance of the proposed EBS is tested based on memory usage, execution time and delay rate. The experimental results obviously show that the proposed method performs well than the existing Encounter Based System (EBS).

[1]  Jörg Ott,et al.  PeerShare: A System Secure Distribution of Sensitive Data among Social Contacts , 2013, NordSec.

[2]  Adrian Perrig,et al.  SafeSlinger: An Easy-to-use and Secure Approach for Human Trust Establishment , 2011 .

[3]  Alexander Barg,et al.  Secret Key Generation for a Pairwise Independent Network Model , 2008, IEEE Transactions on Information Theory.

[4]  Justin Zhijun Zhan,et al.  Secure Collaborative Social Networks , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[5]  Ming Li,et al.  Privacy-Preserving Distributed Profile Matching in Proximity-Based Mobile Social Networks , 2013, IEEE Transactions on Wireless Communications.

[6]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[7]  Xiaowei Ying,et al.  On link privacy in randomizing social networks , 2010, Knowledge and Information Systems.

[8]  Richard Zippel,et al.  Probabilistic algorithms for sparse polynomials , 1979, EUROSAM.

[9]  Thomas E. Anderson,et al.  Privacy-preserving P2P data sharing with OneSwarm , 2010, SIGCOMM '10.

[10]  Richard Han,et al.  SecureWear: A Framework for Securing Mobile Social Networks , 2012 .

[11]  Yuguang Fang,et al.  Privacy and security for online social networks: challenges and opportunities , 2010, IEEE Network.

[12]  Hai Su,et al.  Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.

[13]  Xiaodong Lin,et al.  Complementing public key infrastructure to secure vehicular ad hoc networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.

[14]  Xiaohui Liang,et al.  A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs , 2012, IEEE Transactions on Intelligent Transportation Systems.

[15]  Amirreza Masoumzadeh,et al.  Preserving Structural Properties in Edge-Perturbing Anonymization Techniques for Social Networks , 2012, IEEE Transactions on Dependable and Secure Computing.