Hierarchical Trust Level Evaluation for Pervasive Social Networking

Pervasive social networking (PSN) is a fundamental infrastructure in social networking that has played an important role in not only the Internet but also mobile domains. A practical and accurate evaluation system is required to ensure the further development of PSN. Secure and efficient communication is also an essential issue in PSN to increase its adoption in daily life. In this paper, we discuss the establishment of a hierarchical evaluation system to support secure and trustworthy PSN with multiple and variable nodes. The proposed hierarchical evaluation system is essentially based on a special symmetric balanced incomplete block design: the (7, 3, 1)-design and the tree structure. Together, they constitute a multilevel system that supports both our hierarchical trust level (HTL) evaluation system and key agreement scheme. The former solves the problem of trust evaluation in PSN, and the latter guarantees the secure communication of trusted nodes. Note that both security and performance analyses show that the proposed HTL evaluation system can support extensive adoption of efficient and secure PSN.

[1]  Yang Lu,et al.  A provably secure certificate-based encryption scheme against malicious CA attacks in the standard model , 2016, Inf. Sci..

[2]  Jianfeng Ma,et al.  A privacy preserving three-factor authentication protocol for e-Health clouds , 2016, The Journal of Supercomputing.

[3]  Guanling Chen,et al.  Analyzing Privacy Designs of Mobile Social Networking Applications , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[4]  Pietro Liò,et al.  Social Networking for Pervasive Adaptation , 2008, 2008 Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops.

[5]  Cheng-Chi Lee,et al.  A Chaotic Maps Based Key Agreement and User Anonymity Protocol without Using Smart Cards and Symmetric Key En/Decryptions , 2015 .

[6]  Jin Li,et al.  Identity-based chameleon hashing and signatures without key exposure , 2014, Inf. Sci..

[7]  Gene Tsudik,et al.  New multiparty authentication services and key agreement protocols , 2000, IEEE Journal on Selected Areas in Communications.

[8]  Jian Shen,et al.  An Efficient RFID Authentication Protocol Providing Strong Privacy and Security , 2016 .

[9]  Yue Shen,et al.  A practical reputation system for pervasive social chatting , 2013, J. Comput. Syst. Sci..

[10]  M. Macy,et al.  The evolution of trust and cooperation between strangers: A computational model. , 1998 .

[11]  Debiao He,et al.  One-to-many authentication for access control in mobile pay-TV systems , 2016, Science China Information Sciences.

[12]  Jian Shen,et al.  Performance Comparison of Typical Routing Protocols in Ad-hoc Networks , 2014, ICS.

[13]  Jian Shen,et al.  A Novel Routing Protocol Providing Good Transmission Reliability in Underwater Sensor Networks , 2015 .

[14]  Yue Shen,et al.  PerContRep: a practical reputation system for pervasive content services , 2014, The Journal of Supercomputing.

[15]  Lorrie Faith Cranor,et al.  Understanding and capturing people’s privacy policies in a mobile social networking application , 2009, Personal and Ubiquitous Computing.

[16]  Jianfeng Ma,et al.  Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy , 2016 .

[17]  Valtteri Niemi,et al.  Secure pervasive social networking based on multi-dimensional trust levels , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).

[18]  Richard Han,et al.  Solutions to Security and Privacy Issues in Mobile Social Networking , 2009, 2009 International Conference on Computational Science and Engineering.

[19]  Gustavo Alonso,et al.  Enabling social networking in ad hoc networks of mobile phones , 2009, Proc. VLDB Endow..

[20]  Donghai Guan,et al.  Trust Management for Ubiquitous Healthcare , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing with Applications.

[21]  Qian Wang,et al.  Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data , 2016, IEEE Transactions on Image Processing.

[22]  Peter Herrmann,et al.  Trust Management II - Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway , 2008, IFIPTM.

[23]  Jin Wang,et al.  An Efficient Verifiably Encrypted Signature from Weil Pairing , 2013 .

[24]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[25]  Jin Wang,et al.  Mutual Verifiable Provable Data Auditing in Public Cloud Storage , 2015 .

[26]  Jian Shen,et al.  An enhanced biometrics-based user authentication scheme for multi-server environments in critical systems , 2016, J. Ambient Intell. Humaniz. Comput..

[27]  Max Van Kleek,et al.  MyNet: A Platform for Secure P2P Personal and Social Networking Services , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).

[28]  Ilyong Chung,et al.  The design and analysis of an efficient load balancing algorithm employing the symmetric balanced incomplete block design , 2006, Inf. Sci..

[29]  Zheng Yan,et al.  Protect Pervasive Social Networking Based on Two-Dimensional Trust Levels , 2017, IEEE Systems Journal.

[30]  Zhiguo Hong,et al.  Stochastic Petri Net-based performance evaluation of hybrid traffic for social networks system , 2016, Neurocomputing.

[31]  Jian Shen,et al.  Identity-based key agreement protocol employing a symmetric balanced incomplete block design , 2012, Journal of Communications and Networks.

[32]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[33]  Jian Shen,et al.  An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks , 2016, J. Netw. Comput. Appl..

[34]  Ren-Hung Hwang,et al.  An Adaptive Sensor Data Segments Selection Method for Wearable Health Care Services , 2015, Journal of Medical Systems.

[35]  Wei Liang,et al.  A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity , 2016, Secur. Commun. Networks.

[36]  Xiong Li,et al.  A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security , 2016, Wireless Personal Communications.

[37]  Jian Shen,et al.  A secure identity-based dynamic group data sharing scheme for cloud computing , 2017 .

[38]  Mirco Musolesi,et al.  Sensing meets mobile social networks: the design, implementation and evaluation of the CenceMe application , 2008, SenSys '08.

[39]  Ben Y. Zhao,et al.  Preserving privacy in location-based mobile social applications , 2010, HotMobile '10.