CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

P2P Social Network with Dynamic Identity-based Broadcast Encryption using Rolls

by Ali Melige, Aza Abdo, Ayman Alazab
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 102 - Number 6
Year of Publication: 2014
Authors: Ali Melige, Aza Abdo, Ayman Alazab
10.5120/17818-8753

Ali Melige, Aza Abdo, Ayman Alazab . P2P Social Network with Dynamic Identity-based Broadcast Encryption using Rolls. International Journal of Computer Applications. 102, 6 ( September 2014), 14-17. DOI=10.5120/17818-8753

@article{ 10.5120/17818-8753,
author = { Ali Melige, Aza Abdo, Ayman Alazab },
title = { P2P Social Network with Dynamic Identity-based Broadcast Encryption using Rolls },
journal = { International Journal of Computer Applications },
issue_date = { September 2014 },
volume = { 102 },
number = { 6 },
month = { September },
year = { 2014 },
issn = { 0975-8887 },
pages = { 14-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume102/number6/17818-8753/ },
doi = { 10.5120/17818-8753 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:32:24.680464+05:30
%A Ali Melige
%A Aza Abdo
%A Ayman Alazab
%T P2P Social Network with Dynamic Identity-based Broadcast Encryption using Rolls
%J International Journal of Computer Applications
%@ 0975-8887
%V 102
%N 6
%P 14-17
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, we suggest the rolls scheme using dynamic identity-based broadcast encryption. Using this scheme, it is possible to parted a message to many parts, and allow to some users to read special different parts in a message.

References
  1. Jeong, H. , Won, D. : Access-control-based Efficient Privacy Protection Method for Social Networking Services. Journal of The Korea Institute of Information Security & Cryptology 1(23), 81–88 (2013).
  2. Youngman Jung, Yoonho Nam, Jiye Kim, Woongryul Jeon, Hanwook Lee, and Dongho Won. : Key Management Scheme Using Dynamic Identity-Based Broadcast Encryption for Social Network Services College of Information and Communication Engineering, Sungkyunkwan University, 300 Cheoncheon-dong, Jangan-gu, Suwon-si, Gyeonggi-do, 440-746, Korea. .
  3. Yeung, C. A. , Licaardi, L. , Lu, K. , Seneviratne, O. , Lee, T. B. : Decentralization: The future of online social networking. In: Proc. Int. Joint Conf. W3C Workshop (2009).
  4. Datta, A. , Buchegger, S. , Vu, L. H. , Strufe, T. , Rzadca, K. : Decentralized online social networks. In: Handbook of Social Network Technologies and Applications, pp. 349–378 (2010).
  5. Cutillo, L. A. , Molva, R. , Strufe, T. : Privacy preserving social networking through decentralization. Wireless On-Demand Network Systems and Services, 145–152 (2009).
  6. Zhang. : Identity-Based Broadcast Encryption with Recipient Privacy. In 978-1-4244-5539- 3/10/$26. 00 ©2010 IEEE (2010).
  7. Jiang, H. , Xu, Q. , Shang, J. : An efficient dynamic identity-based broadcast encryption scheme. In: 2010 Second International Symposium on Data, Privacy and E-Commerce (ISDPE), pp. 27–32 (2010).
  8. Boldyreva. : Identity-based Encryption with Efficient Revocation. In Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2008, ACM Press, 2008.
  9. Ajami, R. , Ramadan, N. , Mohamed, N. , Al-Jaroodi, J. : Security Challenges and Approaches in Online Social Networks: A Survey. International Journal of Computer Science and Network Security 11(8) (August 2011).
  10. Zilpelwar, R. A. , Bedi, R. K. , Wadhai, V. M. : An Overview of Privacy and Security in SNS. International Journal of P2P Network Trends and Technology 2(1) (2012).
Index Terms

Computer Science
Information Sciences

Keywords

Social Network Service Decentralized DIEEB Rolls.