Withdraw
Loading…
Social networking: security, privacy, and applications
Jahid, Sonia
Loading…
Permalink
https://hdl.handle.net/2142/46568
Description
- Title
- Social networking: security, privacy, and applications
- Author(s)
- Jahid, Sonia
- Issue Date
- 2014-01-16T17:54:19Z
- Director of Research (if dissertation) or Advisor (if thesis)
- Gunter, Carl A.
- Borisov, Nikita
- Doctoral Committee Chair(s)
- Gunter, Carl A.
- Borisov, Nikita
- Committee Member(s)
- Gupta, Indranil
- Kapadia, Apu
- Department of Study
- Computer Science
- Discipline
- Computer Science
- Degree Granting Institution
- University of Illinois at Urbana-Champaign
- Degree Name
- Ph.D.
- Degree Level
- Dissertation
- Keyword(s)
- Social Networking
- Applied Cryptography
- Attribute-based Encryption
- Revocation
- Anonymity
- Audit
- Privacy
- Security
- Abstract
- Online social networks have become ubiquitous and changed the way that users interact online. There has been an enormous growth in the usage of online social networking in the past few years as users share a variety of information including personal profiles, pictures, and messages to socialize with their friends in the Internet. Besides, several special purpose social networks have emerged to serve their users with useful functionalities. This vast amount of user data is valuable, and therefore, introduce several security and privacy risks and challenges. In this thesis we propose several techniques to enhance the security and privacy features of online social networks. Our goal is to shift the control over user data from a centralized social network provider to the end users. We realize this concept by decentralization of the social networking architecture. First, we construct and implement a cryptographic access control mechanism that ensures data confidentiality and integrity, and efficiently supports the fine-grained access policies expected by social network users. Next, we present a detailed design of a decentralized online social network that focuses on security and privacy. Finally, we propose and implement auditable anonymity, a cryptographic scheme, which allows a social networking user to keep track of who accesses her data even when her data is encrypted and decentralized, without revealing this information to the storage provider.
- Graduation Semester
- 2013-12
- Permalink
- http://hdl.handle.net/2142/46568
- Copyright and License Information
- Copyright 2013 Sonia Jahid
Owning Collections
Graduate Dissertations and Theses at Illinois PRIMARY
Graduate Theses and Dissertations at IllinoisDissertations and Theses - Computer Science
Dissertations and Theses from the Dept. of Computer ScienceManage Files
Loading…
Edit Collection Membership
Loading…
Edit Metadata
Loading…
Edit Properties
Loading…
Embargoes
Loading…