Volume 29, Issue 7 e3870
Special Issue Paper

Privacy-preserving data search and sharing protocol for social networks through wireless applications

Xiaofen Wang

Corresponding Author

Xiaofen Wang

Big Data Research Center and Cyber Security Research Center, University of Electronic Science and Technology of China, Chengdu, Sichuan, 611731 China

Centre for Computer and Information Security Research, School of Computing and Information Technology, University of Wollongong, NSW 2522, Australia

Correspondence to: Xiaofen Wang, Big Data Research Center and Cyber Security Research Center, University of Electronic Science and Technology of China, Chengdu, Sichuan, 611731, China.

E-mail: [email protected]

Search for more papers by this author
Yi Mu

Yi Mu

Centre for Computer and Information Security Research, School of Computing and Information Technology, University of Wollongong, NSW 2522, Australia

Search for more papers by this author
Rongmao Chen

Rongmao Chen

Centre for Computer and Information Security Research, School of Computing and Information Technology, University of Wollongong, NSW 2522, Australia

Search for more papers by this author
First published: 27 May 2016
Citations: 6

Summary

Data search and sharing are two important functionalities in social networks. The social network users can form a peer-to-peer group and securely and flexibly search and share cloud data through wireless applications. When the number of users increases, the communication, storage, and computational overheads will be increased, and the quality of services such as searching and data sharing for clients could be affected. In order to solve these problems, we formalize an ID-based multi-user searchable encryption (IDB-MUSE) and formally define its security model, where the security notions accommodate indistinguishability against insider's keyword guessing attack, indistinguishability against chosen keyword attack, and indistinguishability against insider's identity guessing attack. We present an IDB-MUSE scheme, where the index and search trapdoor are of constant size. We formally prove its security properties. To improve the search efficiency, we divide the computation of the trapdoor into two phases, that is, the offline phase and the online phase. The computation cost for the online phase trapdoor remains constant with respect to the number of users. Based on the IDB-MUSE scheme, a privacy-preserving data search and sharing protocol is proposed, where only the authorized user can access the shared group data. It captures the properties of source authenticity, data and search pattern privacy-preserving, anonymity, and request unlinkability. The experimental results show that the protocol is practical for wireless applications. Copyright © 2016 John Wiley & Sons, Ltd.

The full text of this article hosted at iucr.org is unavailable due to technical difficulties.