Access Control in Decentralized Online Social Networks: Applying a Policy-Hiding Cryptographic Scheme and Evaluating Its Performance
2014 (English)Conference paper (Refereed)
Privacy concerns in online social networking services have prompted a number of proposals for decentralized online social networks (DOSN) that remove the central provider and aim at giving the users control over their data and who can access it. This is usually done by cryptographic means. Existing DOSNs use cryptographic primitives that hide the data but reveal the access policies. At the same time, there are privacy-preserving variants of these cryptographic primitives that do not reveal access policies. They are, however, not suitable for usage in the DOSN context because of performance or storage constraints. A DOSN needs to achieve both privacy and performance to be useful. We analyze predicate encryption (PE) and adapt it to the DOSN context. We propose a univariate polynomial construction for access policies in PE that drastically increases performance of the scheme but leaks some part of the access policy to users with access rights. We utilize Bloom filters as a means of decreasing decryption time and indicate objects that can be decrypted by a particular user. We evaluate the performance of the adapted scheme in the concrete scenario of a news feed. Our PE scheme is best suited for encrypting for groups or small sets of separate identities.
Place, publisher, year, edition, pages
2014. 622-628 p.
, 2014 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS)
IdentifiersURN: urn:nbn:se:kth:diva-153288DOI: 10.1109/PerComW.2014.6815278ISI: 000341402900122ScopusID: 2-s2.0-84901304283ISBN: 978-1-4799-2736-4OAI: oai:DiVA.org:kth-153288DiVA: diva2:752634
12th IEEE International Conference on Pervasive Computing and Communication (PERCOM), MAR 24-28, 2014, Budapest, HUNGARY
QC 201410062014-10-062014-10-032015-06-02Bibliographically approved