Author : Veda D 1
Date of Publication :29th May 2018
Abstract: Among the users of the web and cloud computing, the online social network is an extremely mainstream service. Since a great deal of data is put away in Online Societal Community stage security endurance on such application is a critical issue. If client scrambles their messages, the online informal organization cannot generate exact advertisements to the user. Thus, to accomplish both protection and precise notice is a basic issue unfortunately online informal organization cannot accomplish both protection safeguarding and exact advertisement simultaneously to the users. In this prospect, the predicate encryption for online informal organization platform is proposed primary multi-receiver. The predicate encryption is utilized which provides shorter cipher text that indeed provides us more privacy/security and reduces the cost of encryption and decryption.
Reference :
-
- J. Anderson, J. Diaz, C. Bonneau, and F. Stajano, ―Privacy-enabling social networking over untrusted networks,‖ in Proc. Workshop Online SocialNetw., 2009, pp. 1–6.
- R. Baden,A. Bender, N. Spring, B. Bhattacharjee, andD. Starin, ―Persona: An online social network with user-defined privacy,‖ SIGCOMM Comput.Commun. Rev., vol. 39, pp. 135–146, Aug. 2009.
- C. Blundo, V. Iovino, and G. Persiano, ―Private-key hidden vector encryption with key confidentiality,‖ in Proceedings of the 8th International Conference on Cryptology and Network Security (LNCS), vol. 5888, Berlin,Germany: Springer, 2009, pp. 259–277.
- S. Braghin, V. Iovino, G. Persiano, and A. Trombetta, ―Secure and policy private resource sharing in an online social network,‖ in Proc. Privacy,Secur., Risk Trust, 2011, pp. 872–875.
- D. Boneh and B. Waters, ―Conjunctive, subset, and range queries on encrypted data,‖ in Proc. 4th Theory of Cryptography Conference (LNCS),vol. 4392, Berlin, Germany: Springer, 2007, pp. 535–554.
- M. Durr, M. Maier, and F. Dorfmeister, ―Vegas—A secure and privacy preserving peer-to-peer online social network,‖ in Proc. Social Comput./Privacy, Secur., Risk Trust, 2012, pp. 868–874
- C. I. Fan and S. Y. Huang, ―Controllable privacy preserving search based on symmetric predicate encryption in cloud storage,‖ Future Gener. Comput. Syst., vol. 29, no. 7, pp. 1716–1724, 2013.