Anonymising group data sharing in opportunistic mobile social networks

D Adu-Gyamfi, F Zhang, A Takyi - Wireless Networks, 2021 - Springer
D Adu-Gyamfi, F Zhang, A Takyi
Wireless Networks, 2021Springer
The security and privacy risks of group users are major concerns in opportunistic mobile
social network (OMSN) platforms, especially when the users share data publicly in a
proximity area. However, existing schemes on group data sharing usually do not enforce the
anonymity and/or privacy preservation properties and making them relatively unsuitable for
large scale implementation. In this paper, we construct a compelling lightweight
cryptographic encryption protocol scheme to anonymise and preserve the identity and data …
Abstract
The security and privacy risks of group users are major concerns in opportunistic mobile social network (OMSN) platforms, especially when the users share data publicly in a proximity area. However, existing schemes on group data sharing usually do not enforce the anonymity and/or privacy preservation properties and making them relatively unsuitable for large scale implementation. In this paper, we construct a compelling lightweight cryptographic encryption protocol scheme to anonymise and preserve the identity and data privacy of the users for a large scale OMSN. The users are authenticated to forward data-packet notification via Bluetooth-enabled smartphones, respond via 4G mobile network and can deny the notification with zero detection. The scheme’s notification delay considerably reduces with the introduction of some passers-by and hence achieves high reliability of packet notification forwarding in a 1000 m-squared proximity area. Simulation and testing for the performance requirement using Proverif software prove the scheme as easy to implement for large scale OMSN. Furthermore, the security analysis with proof based on the hardness of decisional bilinear Diffie–Hellman condition demonstrates the scheme as semantically secure under chosen-plaintext and chosen-ciphertext attacks. Nonetheless, resource constraints management has not been tackled in the present study.
Springer
以上显示的是最相近的搜索结果。 查看全部搜索结果