Secure and Efficient Large Content Broadcasting in Mobile Social Networks
Most of existing mobile social systems are built on the presence of communication infrastructures and thereby rely on the reliability of the underlying communication infrastructures. As a consequence, if the infrastructures are inaccessible to users, the data generated by users in these systems cann...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2018-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8417406/ |
id |
doaj-7abc49ae3a4b496fb9cee81fafc5ae8c |
---|---|
record_format |
Article |
spelling |
doaj-7abc49ae3a4b496fb9cee81fafc5ae8c2021-03-29T21:06:33ZengIEEEIEEE Access2169-35362018-01-016421084211810.1109/ACCESS.2018.28582378417406Secure and Efficient Large Content Broadcasting in Mobile Social NetworksTingting Fu0Peng Liu1https://orcid.org/0000-0002-3403-2604Yue Ding2Yuan Zhang3Key Laboratory of Complex Systems Modeling and Simulation, National Demonstration Center for Experimental Computer Education, School of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou, ChinaKey Laboratory of Complex Systems Modeling and Simulation, National Demonstration Center for Experimental Computer Education, School of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou, ChinaKey Laboratory of Complex Systems Modeling and Simulation, National Demonstration Center for Experimental Computer Education, School of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou, ChinaCenter for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, ChinaMost of existing mobile social systems are built on the presence of communication infrastructures and thereby rely on the reliability of the underlying communication infrastructures. As a consequence, if the infrastructures are inaccessible to users, the data generated by users in these systems cannot be transmitted. Furthermore, existing mobile social systems bear a strong assumption that a data owner can determine the destinations before she/he transmits the data. This is not practical when the underlying communication infrastructures are compromised. This problem is further exacerbated by the fact that there are adversaries in the systems, where adversaries may attempt to extract the content of transmitted data and stop the data transmission. As such, the functionality and security of these systems cannot be guaranteed. In this paper, we propose a secure and efficient data broadcasting scheme for mobile social networks that enable data owners to broadcast large-size data in a store-and-forward way, which does not require reliable communication infrastructures. Even if the data owner cannot pre-determine the all destinations, the data owner can transmit the data to all destinations as soon as possible with the aid of data receivers. Our scheme ensures that the data transmission cannot be stopped by adversaries, and the honest user would extract the data no later than adversaries. In our scheme, if the adversary attempts to learn the data content, he has to assist the data owner in transmitting the data. We provide the security analysis to demonstrate the security of our scheme. We also implement our scheme and conduct a comprehensive performance analysis, which proves that our scheme is effective and efficient.https://ieeexplore.ieee.org/document/8417406/Mobile computingsocial network serviceslarge contentbroadcastingsecret sharing |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Tingting Fu Peng Liu Yue Ding Yuan Zhang |
spellingShingle |
Tingting Fu Peng Liu Yue Ding Yuan Zhang Secure and Efficient Large Content Broadcasting in Mobile Social Networks IEEE Access Mobile computing social network services large content broadcasting secret sharing |
author_facet |
Tingting Fu Peng Liu Yue Ding Yuan Zhang |
author_sort |
Tingting Fu |
title |
Secure and Efficient Large Content Broadcasting in Mobile Social Networks |
title_short |
Secure and Efficient Large Content Broadcasting in Mobile Social Networks |
title_full |
Secure and Efficient Large Content Broadcasting in Mobile Social Networks |
title_fullStr |
Secure and Efficient Large Content Broadcasting in Mobile Social Networks |
title_full_unstemmed |
Secure and Efficient Large Content Broadcasting in Mobile Social Networks |
title_sort |
secure and efficient large content broadcasting in mobile social networks |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2018-01-01 |
description |
Most of existing mobile social systems are built on the presence of communication infrastructures and thereby rely on the reliability of the underlying communication infrastructures. As a consequence, if the infrastructures are inaccessible to users, the data generated by users in these systems cannot be transmitted. Furthermore, existing mobile social systems bear a strong assumption that a data owner can determine the destinations before she/he transmits the data. This is not practical when the underlying communication infrastructures are compromised. This problem is further exacerbated by the fact that there are adversaries in the systems, where adversaries may attempt to extract the content of transmitted data and stop the data transmission. As such, the functionality and security of these systems cannot be guaranteed. In this paper, we propose a secure and efficient data broadcasting scheme for mobile social networks that enable data owners to broadcast large-size data in a store-and-forward way, which does not require reliable communication infrastructures. Even if the data owner cannot pre-determine the all destinations, the data owner can transmit the data to all destinations as soon as possible with the aid of data receivers. Our scheme ensures that the data transmission cannot be stopped by adversaries, and the honest user would extract the data no later than adversaries. In our scheme, if the adversary attempts to learn the data content, he has to assist the data owner in transmitting the data. We provide the security analysis to demonstrate the security of our scheme. We also implement our scheme and conduct a comprehensive performance analysis, which proves that our scheme is effective and efficient. |
topic |
Mobile computing social network services large content broadcasting secret sharing |
url |
https://ieeexplore.ieee.org/document/8417406/ |
work_keys_str_mv |
AT tingtingfu secureandefficientlargecontentbroadcastinginmobilesocialnetworks AT pengliu secureandefficientlargecontentbroadcastinginmobilesocialnetworks AT yueding secureandefficientlargecontentbroadcastinginmobilesocialnetworks AT yuanzhang secureandefficientlargecontentbroadcastinginmobilesocialnetworks |
_version_ |
1724193546405150720 |