CFP last date
02 December 2024
Call for Paper
January Edition
CAE solicits high quality original research papers for the upcoming January edition of the journal. The last date of research paper submission is 02 December 2024

Submit your paper
Know more
Reseach Article

Social Network with Dynamic Identity-based Broadcast Encryption using Security Tree

by Ali Meligy, Ayman Alazab
Communications on Applied Electronics
Foundation of Computer Science (FCS), NY, USA
Volume 4 - Number 9
Year of Publication: 2016
Authors: Ali Meligy, Ayman Alazab
10.5120/cae2016652168

Ali Meligy, Ayman Alazab . Social Network with Dynamic Identity-based Broadcast Encryption using Security Tree. Communications on Applied Electronics. 4, 9 ( April 2016), 31-35. DOI=10.5120/cae2016652168

@article{ 10.5120/cae2016652168,
author = { Ali Meligy, Ayman Alazab },
title = { Social Network with Dynamic Identity-based Broadcast Encryption using Security Tree },
journal = { Communications on Applied Electronics },
issue_date = { April 2016 },
volume = { 4 },
number = { 9 },
month = { April },
year = { 2016 },
issn = { 2394-4714 },
pages = { 31-35 },
numpages = {9},
url = { https://www.caeaccess.org/archives/volume4/number9/580-2016652168/ },
doi = { 10.5120/cae2016652168 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-09-04T19:53:53.923129+05:30
%A Ali Meligy
%A Ayman Alazab
%T Social Network with Dynamic Identity-based Broadcast Encryption using Security Tree
%J Communications on Applied Electronics
%@ 2394-4714
%V 4
%N 9
%P 31-35
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, we suggest the security tree scheme using dynamic identity-based broadcast encryption, using this scheme, it is possible to parted a message to many linked nodes and represent these nodes as security tree and give every receiver permission to read special linked nodes from security tree.

References
  1. Jeong, H., Won, D.: Access-control-based Efficient Privacy Protection Method for Social Networking Services. Journal of The Korea Institute of Information Security & Cryptology 1(23), 81–88 (2013).
  2. Youngman Jung, Yoonho Nam, Jiye Kim, Woongryul Jeon, Hanwook Lee, and Dongho Won.: Key Management Scheme Using Dynamic Identity-Based Broadcast Encryption for Social Network Services College of Information and Communication Engineering, Sungkyunkwan University, 300 Cheoncheon-dong, Jangan-gu, Suwon-si, Gyeonggi-do, 440-746, Korea
  3. Yeung, C.A., Licaardi, L., Lu, K., Seneviratne, O., Lee, T.B.: Decentralization: The future of online social networking. In: Proc. Int. Joint Conf. W3C Workshop (2009).
  4. Datta, A., Buchegger, S., Vu, L.H., Strufe, T., Rzadca, K.: Decentralized online social networks. In: Handbook of Social Network Technologies and Applications, pp. 349–378 (2010).
  5. Cutillo, L.A., Molva, R., Strufe, T.: Privacy preserving social networking through decentralization. Wireless On-Demand Network Systems and Services, 145–152 (2009).
  6. Zhang. : Identity-Based Broadcast Encryption with Recipient Privacy. In 978-1-4244-5539- 3/10/$26.00 ©2010 IEEE (2010).
  7. Jiang, H., Xu, Q., Shang, J.: An efficient dynamic identity-based broadcast encryption scheme. In: 2010 Second International Symposium on Data, Privacy and E-Commerce (ISDPE), pp. 27–32 (2010).
  8. Boldyreva. : Identity-based Encryption with Efficient Revocation. In Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2008, ACM Press, 2008.
  9. Ajami, R., Ramadan, N., Mohamed, N., Al-Jaroodi, J.: Security Challenges and Approaches in Online Social Networks: A Survey. International Journal of Computer Science and Network Security 11(8) (August 2011).
  10. Zilpelwar, R.A., Bedi, R.K., Wadhai, V.M.: An Overview of Privacy and Security in SNS. International Journal of P2P Network Trends and Technology 2(1) (2012)\
Index Terms

Computer Science
Information Sciences

Keywords

Social Network Service Decentralized DIBBE Security Tree.