Abstract
Howcan we protect sensitive data of average users? In this paper, we propose taking advantage of real-life social trust between average users (called "trust-based social networks") as well as threshold cryptography. This leads to a new type of complex systems, for which we define and characterize the following novel properties: 1) attack-resilience, which captures the consequences of computers getting compromised; 2) security utility of anonymous social networks, which captures the security gained when the underlying social network links are not known to the attacker; 3) security utility of psychological soundness, which captures the security gained when a user keeps a decisive share of its sensitive data; 4) availability, which captures the effect when computers are not always responsive; 5) the trade-off between attack-resilience and availability.
| Original language | English |
|---|---|
| Article number | 5639080 |
| Pages (from-to) | 39-52 |
| Number of pages | 14 |
| Journal | IEEE Transactions on Information Forensics and Security |
| Volume | 6 |
| Issue number | 1 |
| DOIs | |
| State | Published - Mar 2011 |
Keywords
- Anonymity
- availability
- complex system
- security
- social network
- social trust
- threshold cryptography
Fingerprint
Dive into the research topics of 'Exploiting trust-based social networks for distributed protection of sensitive data'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver