TY - JOUR
T1 - Exploiting trust-based social networks for distributed protection of sensitive data
AU - Xu, Shouhuai
AU - Li, Xiaohu
AU - Parker, Timothy Paul
AU - Wang, Xueping
PY - 2011/3
Y1 - 2011/3
N2 - Howcan we protect sensitive data of average users? In this paper, we propose taking advantage of real-life social trust between average users (called "trust-based social networks") as well as threshold cryptography. This leads to a new type of complex systems, for which we define and characterize the following novel properties: 1) attack-resilience, which captures the consequences of computers getting compromised; 2) security utility of anonymous social networks, which captures the security gained when the underlying social network links are not known to the attacker; 3) security utility of psychological soundness, which captures the security gained when a user keeps a decisive share of its sensitive data; 4) availability, which captures the effect when computers are not always responsive; 5) the trade-off between attack-resilience and availability.
AB - Howcan we protect sensitive data of average users? In this paper, we propose taking advantage of real-life social trust between average users (called "trust-based social networks") as well as threshold cryptography. This leads to a new type of complex systems, for which we define and characterize the following novel properties: 1) attack-resilience, which captures the consequences of computers getting compromised; 2) security utility of anonymous social networks, which captures the security gained when the underlying social network links are not known to the attacker; 3) security utility of psychological soundness, which captures the security gained when a user keeps a decisive share of its sensitive data; 4) availability, which captures the effect when computers are not always responsive; 5) the trade-off between attack-resilience and availability.
KW - Anonymity
KW - availability
KW - complex system
KW - security
KW - social network
KW - social trust
KW - threshold cryptography
UR - http://www.scopus.com/inward/record.url?scp=79951837447&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=79951837447&partnerID=8YFLogxK
U2 - 10.1109/TIFS.2010.2093521
DO - 10.1109/TIFS.2010.2093521
M3 - Article
AN - SCOPUS:79951837447
SN - 1556-6013
VL - 6
SP - 39
EP - 52
JO - IEEE Transactions on Information Forensics and Security
JF - IEEE Transactions on Information Forensics and Security
IS - 1
M1 - 5639080
ER -