About this Journal Submit a Manuscript Table of Contents
International Journal of Distributed Sensor Networks
Volume 2013 (2013), Article ID 469076, 10 pages
http://dx.doi.org/10.1155/2013/469076
Research Article

A PEFKS- and CP-ABE-Based Distributed Security Scheme in Interest-Centric Opportunistic Networks

1Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190, China
2University of Chinese Academy of Sciences, Beijing 100049, China
3School of Computer Science & Technology, Beijing Institute of Technology, Beijing 100081, China

Received 26 December 2012; Accepted 16 March 2013

Academic Editor: Hongsong Zhu

Copyright © 2013 Fei Wang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. A. Shikfa, M. Önen, and R. Molva, “Privacy and confidentiality in context-based and epidemic forwarding,” Computer Communications, vol. 33, no. 13, pp. 1493–1504, 2010. View at Publisher · View at Google Scholar · View at Scopus
  2. P. Hui, A. Chaintreau, R. Gass, J. Scott, J. Crowcroft, and C. Diot, “Pocket switched networking: challenges, feasibility and implementation issues,” Lecture Notes in Computer Science, vol. 3854, pp. 1–12, 2006. View at Publisher · View at Google Scholar · View at Scopus
  3. L. Lilien, Z. Kamal, V. Bhuse, and A. Gupta, “Opportunistic networks: the concept and research challenges in privacy and security,” in Proceedings of the NSF International Workshop on Research Challenges in Security and Privacy for Mobile and Wireless Networks, 2006.
  4. H. A. Nguyen, S. Giordano, and A. Puiatti, “Probabilistic routing protocol for intermittently connected mobile ad hoc network* (PROPICMAN),” in Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WOWMOM '07), pp. 1–6, Espoo, Finland, June 2007. View at Publisher · View at Google Scholar · View at Scopus
  5. S. Symington, S. Farrell, H. Weiss, and P. Lovel, Bundle Security Protocol Specification Draft-Irtf-Dtnrg-Bundle-Security-19, 2011.
  6. A. Shikfa, M. Önen, and R. Molva, “Privacy in content-based opportunistic networks,” in Proceedings of the International Conference on Advanced Information Networking and Applications Workshops (WAINA '09), pp. 832–837, Bradford, UK, May 2009. View at Publisher · View at Google Scholar · View at Scopus
  7. N. Li and S. K. Das, “A trust-based framework for data forwarding in opportunistic networks,” Ad Hoc Networks, 2011. View at Publisher · View at Google Scholar · View at Scopus
  8. M. Shin, C. Cornelius, D. Peebles, A. Kapadia, D. Kotz, and N. Triandopoulos, “AnonySense: a system for anonymous opportunistic sensing,” Pervasive and Mobile Computing, vol. 7, no. 1, pp. 16–30, 2011. View at Publisher · View at Google Scholar · View at Scopus
  9. D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, “Public key encryption with keyword search,” Lecture Notes in Computer Science, vol. 3027, pp. 506–522, 2004. View at Scopus
  10. S. Ji, G. Li, C. Li, and J. Feng, “Efficient interactive fuzzy keyword search,” in Proceedings of the 18th International Conference on World Wide Web, Madrid, Spain, 2009.
  11. J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, “Fuzzy keyword search over encrypted data in cloud computing,” in Proceedings of the IEEE (INFOCOM '10), pp. 1–5, San Diego, Calif, USA, March 2010. View at Publisher · View at Google Scholar · View at Scopus
  12. E. S. Ristad and P. N. yianilos, “Learning string-edit distance,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 20, no. 5, pp. 522–532, 1998. View at Scopus
  13. L. Chang, Z. Liehuang, L. Longyijia, and T. Yuran, “Fuzzy keyword search on encrypted cloud storage data with small index,” in Proceedings of the IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS '11), pp. 269–273, 2011.
  14. A. Shamir, “Identity-based cryptosystems and signature schemes,” in Advances in Cryptology, G. Blakley and D. Chaum, Eds., vol. 196, pp. 47–53, Springer, Berlin, Germany, 1985.
  15. D. Boneh and M. Franklin, “Identity-based encryption from the weil pairing,” in Proceedings of the Advances in Cryptology (CRYPTO'01), J. Kilian, Ed., vol. 2139, pp. 213–229, Springer, Berlin, Germany, 2001.
  16. A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology (EUROCRYPT '05), pp. 457–473, May 2005. View at Scopus
  17. J. S. Su, D. Cao, X. F. Wang, Y. P. Sun, and Q. L. Hu, “Attribute-based encryption schemes,” Journal of Software, vol. 22, pp. 1299–1315, 2011.
  18. V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06), pp. 89–98, Alexandria, VA, USA, November 2006. View at Publisher · View at Google Scholar · View at Scopus
  19. J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute-based encryption,” in Proceedings of the S and P IEEE Symposium on Security and Privacy (SP '07), pp. 321–334, Berkeley, Calif, USA, May 2007. View at Publisher · View at Google Scholar · View at Scopus
  20. A. Shikfa, M. Onen, and R. Molva, “Privacy-preserving content-based publish/subscribe networks,” Emerging Challenges for Security, Privacy and Trust, vol. 297, pp. 270–282, 2009.
  21. X. Jia, B. Li, and Y. Liu, “Random oracle model,” Journal of Software, vol. 23, pp. 140–151, 2012.
  22. L. Sweeney, “k-anonymity: a model for protecting privacy,” International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems, vol. 10, no. 5, pp. 557–570, 2002. View at Publisher · View at Google Scholar · View at Scopus
  23. jPBC, “Java Pairing Based Cryptography,” http://gas.dia.unisa.it/projects/jpbc.
  24. PBC, “Paring Based Cryptography,” http://crypto.stanford.edu/pbc.