Lightweight Selective Encryption for Social Data Protection Based on EBCOT Coding

Online social media today has a large number of users and has become a huge platform to collect and share the social data generated by the end users. In addition, based on the development of social applications, the social sensing system has been greatly developed to generate, transmit, and store, w...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on computational social systems Vol. 7; no. 1; pp. 205 - 214
Main Authors Qiu, Han, Qiu, Meikang, Liu, Meiqin, Ming, Zhong
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 01.02.2020
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN2329-924X
2373-7476
DOI10.1109/TCSS.2019.2952553

Cover

More Information
Summary:Online social media today has a large number of users and has become a huge platform to collect and share the social data generated by the end users. In addition, based on the development of social applications, the social sensing system has been greatly developed to generate, transmit, and store, which is helping the prosperous of the social computing systems. However, the violation of the security of end users' social data stored and shared through the social computing system becomes a serious and urgent issue. The data protection on social media platforms is very different compared with the scenario of the traditional encryption algorithms, and most of the existing schemes are not suitable for data protection in the current social sensing and data-sharing system. In this article, we present a novel design based on the agnostic selective encryption concept to efficiently protect the social data based on the embedded block coding with optimized truncation system. By selectively encrypting only a small portion of the bitstreams in the middle layer of this coding system, a high level of protection and efficiency can both be achieved. We also experiment with our method on four common social data formats, and the security analysis tests are performed to verify the high protection level of our method.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:2329-924X
2373-7476
DOI:10.1109/TCSS.2019.2952553