2011 8th International Conference on Information, Communications &Amp; Signal Processing 2011
DOI: 10.1109/icics.2011.6173582
|View full text |Cite
|
Sign up to set email alerts
|

Towards security in sharing data on cloud-based social networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 40 publications
(21 citation statements)
references
References 3 publications
0
21
0
Order By: Relevance
“…Tran et al suggested a framework that allows users of cloud-based social networks to share their private data in a secure manner based on PRE [6]. In this framework, the users use the same public key to encrypt data but different private key to decrypt data.…”
Section: Related Workmentioning
confidence: 99%
“…Tran et al suggested a framework that allows users of cloud-based social networks to share their private data in a secure manner based on PRE [6]. In this framework, the users use the same public key to encrypt data but different private key to decrypt data.…”
Section: Related Workmentioning
confidence: 99%
“…As per [5] D.H.Tran, H.-L.Nguyen,W.Zha , and W.K.Ng, public is giving attention to some of the privacy issues online social networks (OSNs) when the users and the OSN providers are not agree when the data privacy is caused. The providers use the users' data for the commercial purposes to make the growth of their profit while the users feel that their privacy and security has been decreased by this type of the behavior.…”
Section: Literature Surveymentioning
confidence: 99%
“…The work of [18] uses a trusted third party called key manager to divide a secret into two parts and distribute them to the user and to the OSN server, respectively. Using a trusted third party is an easy but impractical way to solve data privacy issue.…”
Section: Security and Performance Analysismentioning
confidence: 99%
“…al. used PRE in the proposed social networks to protect data privacy [18]. However, rather than using a generic model of PRE, the work limits to ElGamal-based proxy re-encryption as the fundamental cryptographic component.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation