[go: up one dir, main page]

Keister et al., 2011 - Google Patents

SoKey: New security architecture for zero-possibility private information leak in social networking applications

Keister et al., 2011

View PDF
Document ID
6739845140673085614
Author
Keister J
Fujinoki H
Bandy C
Lickenbrock S
Publication year
Publication venue
2011 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR)

External Links

Snippet

We propose new security architecture, Socially Keyed (SoKey) architecture, to achieve zero possibility for personal information leak from social network sites (SNS). SoKey makes sure that the private information provided to a social networking server will never leak even in the …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/104Grouping of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden

Similar Documents

Publication Publication Date Title
Megouache et al. Ensuring user authentication and data integrity in multi-cloud environment
Thilakanathan et al. Secure data sharing in the cloud
CN105122265B (en) Data safety service system
Praveena et al. Ensuring data security in cloud based social networks
US8352999B1 (en) Method for managing data in a shared computing environment
Sauber et al. A new secure model for data protection over cloud computing
US7359518B2 (en) Distribution of secured information
Shynu et al. A comprehensive survey and analysis on access control schemes in cloud environment
Chidambaram et al. Enhancing the security of customer data in cloud environments using a novel digital fingerprinting technique
Lyu et al. NSSIA: A New Self‐Sovereign Identity Scheme with Accountability
Keister et al. SoKey: New security architecture for zero-possibility private information leak in social networking applications
Nematzadeh et al. Threat analysis of online health information system
Srisakthi et al. Pcsp: A protected cloud storage provider employing light weight techniques
Wang et al. Privacy preservation for dating applications
Al Shayeji et al. A secure framework for multimedia protection in social media networks
Stingl et al. Health records and the cloud computing paradigm from a privacy perspective
Raso Mattos et al. Data protection and privacy preservation using searchable encryption on outsourced databases
Mun et al. Person-wise privacy level access control for personal information directory services
Jayalakshmi et al. A survey on privacy in social networking websites
Selvakumar et al. An Analysis for Security Issues and their Solutions in Cloud Computing
Ijaz Lawful access: a survey of proposed protocols
Kumar Soni et al. A Review on Multilevel Approaches for Security in Cloud by Using ABE
Malathi Cloud computing issues-a survey
Baghel et al. Multilevel security model for cloud third-party authentication
Sathana et al. Automated Security Providence for Dynamic Group in Cloud