IoT Enabled Smart Bin for Waste Management with Incentivized Rewards
Volume-6 | Issue-1

Automated Attendance System using RFID and IoT
Volume-7 | Issue-3

Smart and Explainable Credit Card Fraud Detection Using XGBoost and SHAP
Volume-7 | Issue-2

An IoT-based Smart Security Locker System with OTP Verification
Volume-5 | Issue-3

Big Data Analytics for Improved Risk Management and Customer Segregation in Banking Applications
Volume-3 | Issue-3

DDoS Detection using Machine Learning Techniques
Volume-4 | Issue-1

Design of Deep Learning Algorithm for IoT Application by Image based Recognition
Volume-3 | Issue-3

Analysis of Serverless Computing Techniques in Cloud Software Framework
Volume-3 | Issue-3

Advanced Traffic Light Controller using FPGA and ARDUINO
Volume-6 | Issue-2

Health Record Management System – A Web-based Application
Volume-3 | Issue-4

Suspicious Human Activity Detection System
Volume-2 | Issue-4

ROBOT ASSISTED SENSING, CONTROL AND MANUFACTURE IN AUTOMOBILE INDUSTRY
Volume-1 | Issue-3

EFFICIENT RESOURCE ALLOCATION AND QOS ENHANCEMENTS OF IOT WITH FOG NETWORK
Volume-1 | Issue-2

Live Streaming Architectures for Video Data - A Review
Volume-2 | Issue-4

IoT Based Monitoring and Control System using Sensors
Volume-3 | Issue-2

Big Data Analytics for Improved Risk Management and Customer Segregation in Banking Applications
Volume-3 | Issue-3

A Novel Signal Processing Based Driver Drowsiness Detection System
Volume-3 | Issue-3

IoT BASED AIR AND SOUND POLLUTION MONITIORING SYSTEM USING MACHINE LEARNING ALGORITHMS
Volume-2 | Issue-1

Analysis of Serverless Computing Techniques in Cloud Software Framework
Volume-3 | Issue-3

Hybrid Intrusion Detection System for Internet of Things (IoT)
Volume-2 | Issue-4

Home / Archives / Volume-3 / Issue-3 / Article-6

Volume - 3 | Issue - 3 | september 2021

Secure Data Sharing Platform for Portable Social Networks with Power Saving Operation
Pages: 250-262
DOI
10.36548/jismac.2021.3.006
Published
27 August, 2021
Abstract

Several subscribing and content sharing services are largely personalized with the growing use of mobile social media technology. The end user privacy in terms of social relationships, interests and identities as well as shared content confidentiality are some of the privacy concerns in such services. The content is provided with fine-grained access control with the help of attribute-based encryption (ABE) in existing work. Decryption of privacy preserving content suffers high consumption of energy and data leakage to unauthorized people is faced when mobile social networks share privacy preserving data. In the mobile social networks, a secure proxy decryption model with enhanced publishing and subscribing scheme is presented in this paper as a solution to the aforementioned issues. The user credentials and data confidentiality are protected by access control techniques that work on privacy preserving in a self-contained manner. Keyword search based public-key encryption with ciphertext policy attribute-based encryption is used in this model. At the end users, ciphertext decryption is performed to reduce the energy consumption by the secure proxy decryption scheme. The effectiveness and efficiency of the privacy preservation model is observed from the experimental results.

Keywords

Proxy Decryption Ciphertext Decryption Attribute-based Encryption Privacy Preserving Data Confidentiality

×

Currently, subscription is the only source of revenue. The subscription resource covers the operating expenses such as web presence, online version, pre-press preparations, and staff wages.

To access the full PDF, please complete the payment process.

Subscription Details

Category Fee
Article Access Charge
15 USD
Open Access Fee Nil
Annual Subscription Fee
200 USD
After payment,
please send an email to irojournals.contact@gmail.com / journals@iroglobal.com requesting article access.
Subscription form: click here