A Novel Authorization Scheme for Multimedia Social Networks Under Cloud Storage Method by Using MA-CP-ABE

A Novel Authorization Scheme for Multimedia Social Networks Under Cloud Storage Method by Using MA-CP-ABE

Cheng Li (School of Information Engineering, Henan University of Science and Technology, Luoyang, China), Zhiyong Zhang (School of Information Engineering, Henan University of Science and Technology, Luoyang, China) and Lanfang Zhang (School of Information Engineering, Henan University of Science and Technology, Luoyang, China)
Copyright: © 2018 |Pages: 16
DOI: 10.4018/IJCAC.2018070103

Abstract

This article finds that with the development of network technology and the change of a users' social habits, the existing multimedia social network, whether it is one-to-one authorization or one-to-many authorization, are having difficulty meeting the needs of users and cloud storage service. In order to solve this problem, this article proposes a new authorization scheme of multimedia community, based on attribute encryption. Use MA-CP-ABE solution to enhance system service efficiency. This program contributes to two aspects: (1) combining user trust with attribute-based authorizations, and (2) enhancing the flexibility and security of the solution. The scheme has been applied in the prototype system and achieved good results. Results prove that the program has good application value for cloud storage technology, IoT and many other fields.
Article Preview
Top

Introduction

Along with the development of network technology and Cloud storage, Multimedia Social Networks (MSNs) is linking social networks users with cloud storage (Stergiou et al., 2016). The user transmits his own private data to the Multimedia Social Networks Service Provider (MSNSP) through multimedia social networks, then the MSNSP stores its data in the network; at the same time, users can share their private data with other users through a multimedia social network, such as, YouTube, Baidu Netdisk, Amazon Drive and so on. However, multimedia social networks have received widespread attention, but users have to take privacy leaks, information fraud and other security issues. Therefore, how to make multimedia social networks more effectively protect user privacy and data security has become the focus of many scholars.

In the traditional multimedia social network, users upload personal data to the MSNSP provided by cyberspace, while users also need to develop a series of access control policy submitted to MSNSP. When other users visit to upload private data, MSNSP will determine whether it allows access according to the previous data owner specified access control policy (Hu et al., 2015; Morovat & Panda, 2016; Tootoonchian et al., 2009; Li et al., 2015). However, MSNSP is usually considered not entirely credible, although it will not actively disclose user privacy data, it can receive attacks on illegal users, for example, causing users’ data leakage (Chaudhary et al., 2016; Chaudhary & Gupta, 2017); at the same time, use of access control lists to store access control policies in the face of large-scale access to system applications is slightly stretched. (Alsmirat et al., 2017). In order to solve the above problem, when uploading user data, it is encrypted and uploaded, although this can ensure that the user's data is not stolen by the bad service provider, and address the data leakage caused by storage security issues; however, the distribution and management of keys has become a new problem. According to (Zhang et al., 2015), the document adopts the method of writing a user's Content Encryption Key (CEK) into a XML authorization certificate, which effectively solves the problem of distribution and storage of encryption key; but its ability to update the policy is weak. (Feng et al., 2016), Proxy Re-Encryption is adopted to solve the problem of user encrypted data authorization. This method effectively solves the problem of user authorization delivery. However, the above-mentioned scale of authorization is for one-to-one, the efficiency of authorization is not high. (Sun et al., 2010), a one-to-many authorization model is adopted, which effectively solves the problem of authorization scale; but because of the use of broadcast encryption, it is difficult to achieve in the multimedia social networks before the authorization need to know in advance the size of its authorization.

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 10: 4 Issues (2020): 1 Released, 3 Forthcoming
Volume 9: 4 Issues (2019)
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing