Open Access Open Access  Restricted Access Subscription or Fee Access

Scalable Access Limitation for Privacy-Aware Media Sharing

B. Gopinathan, S. Shalini, M. Sumithra, V. Thenmozhi

Abstract


The social networks has made it easier than ever for users to share their text file, document and other media content with anybody from anywhere. It’s easy to access the user-generated media content which brings about the privacy concerns. Traditional access control mechanisms were implemented for a single access policy is made for a specific piece of the content, cannot satisfy the user privacy requirements in large-scale media data sharing systems. Instead, configuring many levels of access privileges for the shared media data content is needed. On one hand, it determines the principle of social networks in information circulation. On the other hand, it accords with the diverse social relationship among social network users. In this paper, we propose the Scalable Media Access Control (SMAC) system to enable such a configuration in a secure and in an efficient manner. The proposed system SMAC system is permitted by the Scalable Cipher Text Policy Attribute-Based Encryption (SCP-ABE) algorithm as well as a comprehensive key management schema. Also we provide formal security proof to prove the security of the proposed SMAC system. Additionally, we conduct the intensive experiments on mobile devices to demonstrate its efficiency.


Keywords


Social Media Sharing, Privacy, Access Control, SCP-ABE, Scalable Media Format.

Full Text:

PDF

References


R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic,“Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility,” Future Gener. Comp. Sy., vol. 25, no. 6, pp. 599 – 616, 2009.

H. Qian, J. Li, Y. Zhang and J. Han, “Privacy preserving personal health record using multi-authority attribute-based encryption with revocation,” Int. J. Inf. Secur., vol. 14, no. 6, pp. 487-497, 2015.

J. Li, W. Yao, Y. Zhang, H. Qian and J. Han, “Flexible and fine-grained attribute-based data storage in cloud computing,” IEEE Trans. Service Comput., DOI: 10.1109/TSC.2016.2520932.

J. Li, X. Lin, Y. Zhang and J. Han, “KSF-OABE: outsourced attribute-based encryption with keyword search function for cloud storage,” IEEE Trans. Service Comput., DOI: 10.1109/TSC.2016. 2542813.

J. Li, Y. Shi and Y. Zhang, “Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage,” Int. J.Commun. Syst., DOI: 10.1002/dac.2942.

J.G. Han, W. Susilo, Y. Mu and J. Yan, “Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no.11, pp. 2150-2162, 2012

Z. J. Fu, X. M. Sun, Q. Liu, L. Zhou, and J. G. Shu, “Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing,” IEICE Transactions on Communications, vol. E98-B, no. 1, pp.190-200, 2015.

Z. J. Fu, K. Ren, J. G. Shu, X. M. Sun, and F. X. Huang, “Enabling personalized search over encrypted outsourced data with efficiency improvement,” IEEE Transactions on Parallel and Distributed Systems, DOI: 10.1109/TPDS.2015.2506573, 2015.

Z. H. Xia, X. H. Wang, X. M. Sun, and Q. Wang, “A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data,” IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 2, pp. 340-352, 2015.

Y. J. Ren, J. Shen, J. Wang, J. Han and S. Y. Lee, “Mutual verifiable provable data auditing in public cloud storage,” Journal of Internet Technology, vol. 16, no. 2, pp. 317-323, 2015.

Y. Deswarte, J. J. Quisquater, and A. Saïdane, “Remote integrity checking,” in Proc. 6th Working Conf. Integr. Internal Control Inf. Syst. (IICIS), 2003, pp. 1–11.

Z. Hao, S. Zhong, and N. Yu, “A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability,” IEEE Trans. Knowl. Data Eng., vol. 23, no. 9, pp. 1432–1437, Sep. 2011.

G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, ‘‘Provable Data Possession at Untrusted Stores,’’ in Proc. 14th ACM Conf. on Comput. and Commun. Security (CCS), 2007, pp. 598-609.

G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, ‘‘Scalable and Efficient Provable Data Possession,’’ in Proc. 4th Int’l Conf. Security and Privacy in Commun. Netw. (SecureComm), 2008, pp. 1-10.

F. Sebé, J. Domingo-Ferrer, A. Martinez-balleste, Y. Deswarte, and J. Quisquater, “Efficient Remote Data Possession Checking in Critical Information Infrastructures,” IEEE Trans. Knowledge and Data Eng., vol. 20, no. 8, pp. 1034-1038, Aug. 2008.

C. Erway, A. Küpçü, C. Papamanthou, and R. Tamassia, “Dynamic Provable Data Possession,’’ in Proc. 16th ACM Conf. on Comput. And Commun. Security (CCS), 2009, pp. 213-222.

Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, ‘‘Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,’’ IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 5, pp. 847-859, May, 2011.

K. Yang and X. Jia, ‘‘An efficient and secure dynamic auditing protocol for data storage in cloud computing,’’ IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 9, pp. 1717-1726, 2013.

L. Chen, S. Zhou, X. Huang and L. Xu, ‘‘Data dynamics for remote data possession checking in cloud storage, ’’ Comput. Electr. Eng., vol. 39, no. 7, pp. 2413-2424, 2013.

M. N. Krohn, M. J. Freedman and D. Mazieres, ‘‘On-the-fly verification of rateless erasure codes for efficient content distribution,’’ in Proc. 2004 IEEE Symp. on Security and Privacy (S&P), 2004, pp. 226–240.

Y. Yu, J. Ni, M. H. Au, H. Liu, H. Wang and C. Xu, ‘‘Improved security of a dynamic remote data possession checking protocol for cloud storage,’’ Expert Syst. Appl., vol. 41, no. 7, pp. 7789-7796, 2014.

R. Curtmola, O. Khan, R. Burns, and G. Ateniese, ‘‘MR-PDP: Multiple-replica provable data possession,’’ in Proc. 28th IEEE Conf. on Distrib. Comput. Syst. (ICDCS), 2008, pp. 411-420.

Z. Hao and N. Yu, ‘‘A multiple-replica remote data possession checking protocol with public verifiability,’’ in Proc. 2th Int’l Symp. Data, Privacy, E-Comm. (ISDPE), 2010, pp. 84-89.

R. Mukundan, S. Madria and M. Linderman, ‘‘Efficient integrity verification of replicated data in cloud using homomorphic encryption,’’ Distrib. Parallel Dat., vol. 32, no. 4, pp. 507-534, 2014.

A. F. Barsoum and M. A. Hasan, ‘‘Provable multicopy dynamic data possession in cloud computing systems,’’ IEEE Trans. Inf. Foren. Sec., vol. 10, no. 3, pp. 485-497, 2015.

Y. Zhu, H. Hu, G. J. Ahn and M. Yu, ‘‘Cooperative provable data possession for integrity verification in multicloud storage,’’ IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 12, pp. 2231-2244, 2012.

H. Wang and Y. Zhang, ‘‘On the knowledge soundness of a cooperative provable data possession scheme in multicloud storage,’’ IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 1, pp. 264-267, 2014.

H. Wang, ‘‘Identity-Based distributed provable data possession in Multicloud storage,’’ IEEE Trans. Service Comput., vol. 8, no. 2, pp. 328-340, 2015.

L. Chen, ‘‘Using algebraic signatures to check data possession in cloud storage,’’ Future Gener. Comp. Sy., vol. 29, no. 7, pp. 1709-1715, 2013.

W. Litwin and T. Schwarz, ‘‘Algebraic signatures for scalable distributed data structures,’’ in Proc. 20th Int'l Conf. on Data Eng. (ICDE), 2004, pp. 412-423.

Y. Yu, J. Ni, J. Ren, W. Wu, L. Chen and Q. Xia, ‘‘Improvement of a remote data possession checking protocol from algebraic signatures,’’ in Proc. 9th Int'l Conf. on Information Security Practice and Experience (ISPEC), 2014, pp. 359-372.

E. Zhou and Z. Li, ‘‘An improved remote data possession checking protocol in cloud storage,’’ in Proc. 14th Int'l Conf. on Algs. and Archs. for Parall Proc. (ICA3PP), 2014, pp. 611-617.

H. Wang and J. Li, ‘‘Private certificate-based remote data integrity checking in public clouds,’’ in Proc. 21th Int'l Computing and Combinatorics. (COCOON), 2015, pp. 575–586.

A. Juels and B.S. Kaliski Jr., ‘‘PORs: Proofs of Retrievability for Large Files,’’ in Proc. 14th ACM Conf. on Comput. and Commun. Security (CCS), 2007, pp. 584-597.

H. Shacham and B. Waters, ‘‘Compact Proofs of Retrievability,’’ in Proc. 14th Int’l Conf. on Theory and Appl. of Cryptol. and Inf. Security (ASIACRYPT), 2008, pp. 90-107.

D. Boneh, H. Shacham, and B. Lynn, ‘‘Short Signatures From the Weil Pairing,’’ J. Cryptol., vol. 17, no. 4, pp. 297-319, Sept. 2004.

K. D. Bowers, A. Juels, and A. Oprea, “Hail: A high-availability and integrity layer for cloud storage,” in Proc. 16th ACM Conf. on Comput. and Commun. Security (CCS), 2009, pp. 187–198.

K. D. Bowers, A. Juels, and A. Oprea, “Proofs of retrievability: Theory and implementation,” in Proc. 1th ACM Cloud Comput. Secur. Workshop (CCSW), 2009, pp. 43–54.

Y. Dodis, S. Vadhan, and D.Wichs, “Proofs of retrievability via hardness amplification,” in Proc. 6th Theory Cryptograph. Conf. (TCC), 2009, pp. 109–127.

Multiprecision Integer and Rational Arithmetic C/C++ library (MIRACL). [Online]. Available: http://info.certivox.com/miracl.

The Pairing-based Cryptography Library (PBC). [Online]. Available: https://crpto.stanford.edu/pbc/download.html.

The GNU Multiple Precision Arithmetic Library (GMP). [Online]. Available: http://gmplib.org/

M. Sookhak, A. Gani, M. K. Khan and R. Buyya. “Dynamic remote data auditing for securing big data storage in cloud computing,” Inform. Sciences, DOI: 10.1016/j.ins.2015.09.004.

C. Zhang, J. Sun, X. Zhu and Y. Fang, “Privacy and security for online social networks: challenges and opportunities," IEEE Network, vol. 24, no. 4, pp. 13-18, 2010.

M. Fire, R. Goldschmidt and Y. Elovici, “Online Social Networks: Threats and Solutions," IEEE Communications Surveys & Tutorials, vol. 16, no. 4, pp. 2019-2036, 2014.

L. Wei, H. Zhu, Z. Cao, X. Dong, W. Jia, Y. Chen, A. V. Vasilakos, “Security and privacy for storage and computation in cloud computing," Information Sciences: an International Journal, 258, p.371-386, 2014.

R. Shokri, V. Shmatikov, “Privacy-Preserving Deep Learning," Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1310-1321, 2015.

M. Abadi, A. Chu, I. Goodfellow, H. B. McMahan, I. Mironov, K. Talwar, and L. Zhang, “Deep Learning with Differential Privacy," CCS, pp. 308-318, 2016.

L. Yuan, P. Korshunov, T. Ebrahimi, “Privacy-preserving photo sharing Based on a secure JPEG," IEEE Conf. Computer Communications Workshops (INFOCOM WKSHPS), pp. 185-190, 2015.

F. Dufaux and T. Ebrahimi, “Scrambling for Privacy Protection in Video Surveillance Systems," IEEE Transactions on Circuits and Systems for Video Technology, vol. 18, no. 8, pp. 1168-1174, 2008.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.