Socialized policy administration

作者: Zeqing Guo , Weili Han , Liangxing Liu , Wenyuan Xu , Minyue Ni

DOI: 10.1016/J.COSE.2017.03.005

关键词:

摘要: Abstract With the rapid development of mobile applications and online social networks, users often encounter a frustrating challenge to set privacy security policies (i.e., permission requests) various correctly. For instance, in an Android system, it is hard for users, even programmers, identify malicious requests (policies) when they install third-party application. To simplify task policy management, this paper, we propose novel administration method where settings from users' friends will be used as key recommendation guide administration, friends' protected. We let user invite his or her help with setting applications, call such socialized (SPA short). designed two types SPA: basic SPA composite SPA. Both are equipped preserving mechanism that enables without leaking preferences. In our prototype based on Telegram, i.e., one most popular instant messaging utilize partially homomorphic encryption cryptosystems implement framework. Based performance evaluation, able configure almost all current modest overhead.

参考文章(31)
Dan Boneh, Craig Gentry, A fully homomorphic encryption scheme Stanford University. ,(2009)
Bob Moore, Ed Ellesson, J. Strassner, A. Westerinen, Policy Core Information Model -- Version 1 Specification RFC. ,vol. 3060, pp. 1- 100 ,(2001)
Damien Stehlé, Ron Steinfeld, Faster Fully Homomorphic Encryption international conference on the theory and application of cryptology and information security. ,vol. 2010, pp. 377- 394 ,(2010) , 10.1007/978-3-642-17373-8_22
Alexandra Boldyreva, Nathan Chenette, Younho Lee, Adam O’Neill, Order-Preserving Symmetric Encryption international cryptology conference. pp. 224- 241 ,(2009) , 10.1007/978-3-642-01001-9_13
Weili Han, Zheran Fang, Laurence Tianruo Yang, Gang Pan, Zhaohui Wu, Collaborative Policy Administration IEEE Transactions on Parallel and Distributed Systems. ,vol. 25, pp. 498- 507 ,(2014) , 10.1109/TPDS.2013.147
David Barrera, H. G üne ş Kayacik, Paul C. van Oorschot, Anil Somayaji, A methodology for empirical analysis of permission-based security models and its application to android Proceedings of the 17th ACM conference on Computer and communications security - CCS '10. pp. 73- 84 ,(2010) , 10.1145/1866307.1866317
Zvika Brakerski, Vinod Vaikuntanathan, Efficient Fully Homomorphic Encryption from (Standard) LWE 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science. pp. 97- 106 ,(2011) , 10.1109/FOCS.2011.12
R. L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems Communications of the ACM. ,vol. 26, pp. 96- 99 ,(1983) , 10.1145/357980.358017