Communications of the ACM
Cryptography: Theory and Practice
Cryptography: Theory and Practice
IEEE Internet Computing
Characterizing privacy in online social networks
Proceedings of the first workshop on Online social networks
FlyByNight: mitigating the privacy risks of social networking
Proceedings of the 7th ACM workshop on Privacy in the electronic society
Link privacy in social networks
Proceedings of the 17th ACM conference on Information and knowledge management
Collective privacy management in social networks
Proceedings of the 18th international conference on World wide web
Proceedings of the fourth international conference on Communities and technologies
Privacy-enabling social networking over untrusted networks
Proceedings of the 2nd ACM workshop on Online social networks
Preserving Privacy in Social Networks: A Structure-Aware Approach
WI-IAT '09 Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 01
Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy
Proceedings of the 2nd ACM workshop on Security and artificial intelligence
Proceedings of the 3rd Workshop on Social Network Mining and Analysis
Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project
Journal of Computer Security - EU-Funded ICT Research on Trust and Security
Generating default privacy policies for online social networks
CHI '10 Extended Abstracts on Human Factors in Computing Systems
Privacy wizards for social networking sites
Proceedings of the 19th international conference on World wide web
Privacy in dynamic social networks
Proceedings of the 19th international conference on World wide web
Feasibility of structural network clustering for group-based privacy control in social networks
Proceedings of the Sixth Symposium on Usable Privacy and Security
Analysis of privacy in online social networks of runet
Proceedings of the 3rd international conference on Security of information and networks
Third ACM international workshop on multimedia in forensics and intelligence (MiFor 2011)
MM '11 Proceedings of the 19th ACM international conference on Multimedia
Hi-index | 0.00 |
Social networking sites (SNSs) have attracted millions of users. Through these sites, the users share their information (text messages, photos, and videos, etc) with their friends. By doing this, the privacy of users is often at stake. Although they provide some privacy settings to help in restricting access to a limited number of friends, they do not protect against the untrustworthiness of the social networking operator (SNO). Recently there has been some attempts to address this issue [1], [11]; these advocate for encrypting the users' data to ensure their privacy. However, these methods have their limitations. In [1], the security of the users' data is dependent on the non-disclosure of the encryption key; the scheme proposed in [11] is computationally expensive. In this paper, we propose a secret-sharing based key-management scheme for encrypting the users' data in order to preserve user's privacy. The proposed method offers unconditional security against the disclosure of the encryption key (to preserve privacy), and it is also computationally faster. The security of the method is analyzed against possible attacks, and the computational efficiency of the method is demonstrated using quantitative results.