Presentation is loading. Please wait.

Presentation is loading. Please wait.

Secret Interest Groups in Social Networks with an implementation on FB Alessandro Sorniotti Refik Molva SAC’10 March 22-26 2010,Sierre, Switzerland. Copyright.

Similar presentations


Presentation on theme: "Secret Interest Groups in Social Networks with an implementation on FB Alessandro Sorniotti Refik Molva SAC’10 March 22-26 2010,Sierre, Switzerland. Copyright."— Presentation transcript:

1 Secret Interest Groups in Social Networks with an implementation on FB Alessandro Sorniotti Refik Molva SAC’10 March ,Sierre, Switzerland. Copyright 2010 ACM /10/03

2  1. Introduction  2.Design of the SIG(secret interest group) framework  3.The SIG framework  4.Implementation in FB  5.Security analysis  6.Conclusion and future work outline

3  1. Introduction  2.Design of the SIG(secret interest group) framework  3.The SIG framework  6.Conclusion and future work outline

4  “Hi I’m John Smith, add me as a friend,we were classmates at university.” Yes? No?  SIG(secret interest group), political,religious,…etc Yes? No? Introduction

5  1. Introduction  2.Design of the SIG(secret interest group) framework  3.The SIG framework  6.Conclusion and future work outline

6  Two parts:  OSN(online social network)  OSN external: To deal with the creation and maintainance of the SIG outside of the social network.  OSN internal:To deal with authentication,handshaking,and encryption of content among user of the social network. Design of the SIG(secret interest group) framework

7  RExt1:The set of SIG managers must be non-empty.  RExt2:Only a subset of SIG managers can appoint new SIG managers.  RExt3:Appointing new SIG managers and handling new members are distributed tasks, a minimum number of t SIG managers is required.  RExt4:SIG managers will admit new SIG members or SIG mamagers only after checking their compliance to the SIG join policy. Design of the SIG(secret interest group) framework

8  RExt5:No coalition of less then t SIG members or SIG managers is able to forge a new credential(both membership and managership).  Credential revokation: 1.proactive 2.reactive  RExt6:Stolen SIG membership credentials or credentials belonging to a user that has become malicious are eventually detected as such. Design of the SIG(secret interest group) framework

9  RInt1:Only a legitimate SIG member can successfully authenticate to another SIG member or receive content from the letter.  RInt2:When two OSN users are trying to authenticate as SIG members,either both learn that they both belong to the SIG or they don’t learn anything at all. Design of the SIG(secret interest group) framework

10  1. Introduction  2.Design of the SIG(secret interest group) framework  3.The SIG framework  6.Conclusion and future work outline

11 The SIG framework

12  p:a prime number  q: a prime number  q divides p-1  g: generator of the subgroup of order q of Z p  h: one way hash function in the range {1,…,q-1}  (w,v): signature  OSBE:Oblivious Signature-Based Envelopes The SIG framework

13

14

15

16

17  1. Introduction  2.Design of the SIG(secret interest group) framework  3.The SIG framework  4.Implementation in FB  5.Security analysis  6.Conclusion and future work outline

18  Implementation on FB:only internal framework  Security analysis : future work 4&5

19  1. Introduction  2.Design of the SIG(secret interest group) framework  3.The SIG framework  6.Conclusion and future work outline

20  1. A more thorough security analysis.  2. The java prototype should be extended to become an actual FB application, to support all the functionalities of the framework, and to be usable in other OSN(online social network) platforms. Future work


Download ppt "Secret Interest Groups in Social Networks with an implementation on FB Alessandro Sorniotti Refik Molva SAC’10 March 22-26 2010,Sierre, Switzerland. Copyright."

Similar presentations


Ads by Google