Keister et al., 2011 - Google Patents
SoKey: New security architecture for zero-possibility private information leak in social networking applicationsKeister et al., 2011
View PDF- Document ID
- 6739845140673085614
- Author
- Keister J
- Fujinoki H
- Bandy C
- Lickenbrock S
- Publication year
- Publication venue
- 2011 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR)
External Links
Snippet
We propose new security architecture, Socially Keyed (SoKey) architecture, to achieve zero possibility for personal information leak from social network sites (SNS). SoKey makes sure that the private information provided to a social networking server will never leak even in the …
- 230000000116 mitigating 0 abstract description 4
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Megouache et al. | Ensuring user authentication and data integrity in multi-cloud environment | |
Thilakanathan et al. | Secure data sharing in the cloud | |
CN105122265B (en) | Data safety service system | |
Praveena et al. | Ensuring data security in cloud based social networks | |
US8352999B1 (en) | Method for managing data in a shared computing environment | |
Sauber et al. | A new secure model for data protection over cloud computing | |
US7359518B2 (en) | Distribution of secured information | |
Shynu et al. | A comprehensive survey and analysis on access control schemes in cloud environment | |
Chidambaram et al. | Enhancing the security of customer data in cloud environments using a novel digital fingerprinting technique | |
Lyu et al. | NSSIA: A New Self‐Sovereign Identity Scheme with Accountability | |
Keister et al. | SoKey: New security architecture for zero-possibility private information leak in social networking applications | |
Nematzadeh et al. | Threat analysis of online health information system | |
Srisakthi et al. | Pcsp: A protected cloud storage provider employing light weight techniques | |
Wang et al. | Privacy preservation for dating applications | |
Al Shayeji et al. | A secure framework for multimedia protection in social media networks | |
Stingl et al. | Health records and the cloud computing paradigm from a privacy perspective | |
Raso Mattos et al. | Data protection and privacy preservation using searchable encryption on outsourced databases | |
Mun et al. | Person-wise privacy level access control for personal information directory services | |
Jayalakshmi et al. | A survey on privacy in social networking websites | |
Selvakumar et al. | An Analysis for Security Issues and their Solutions in Cloud Computing | |
Ijaz | Lawful access: a survey of proposed protocols | |
Kumar Soni et al. | A Review on Multilevel Approaches for Security in Cloud by Using ABE | |
Malathi | Cloud computing issues-a survey | |
Baghel et al. | Multilevel security model for cloud third-party authentication | |
Sathana et al. | Automated Security Providence for Dynamic Group in Cloud |