Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 4/2021

20-04-2021

A trust-based privacy-preserving friend matching scheme in social Internet of Vehicles

Authors: Chengzhe Lai, Yangyang Du, Qili Guo, Dong Zheng

Published in: Peer-to-Peer Networking and Applications | Issue 4/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper, to expand the social circle of vehicle users in the non-trusted network environment, a trust-based privacy-preserving friend matching scheme in social Internet of Vehicles is designed, which can prevent the leakage of sensitive information caused by the matching of user attributes, and make the interaction between vehicles faster and more convenient. The proposed scheme can efficiently evaluate the credibility of the vehicles, and eliminate the malicious vehicles to protect the privacy information of the vehicles. Particularly, we use Bloom Filters to convert the attribute matching problem of the vehicles into the number of calculated intersection elements to judge the matching degree of the interests of both parties. The vehicles that fulfill the matching requirements can add each other as friend according to their interests, avoiding the abuse and disclosure of sensitive information by malicious vehicles. The theoretical analysis demonstrates that the proposed scheme is effective and accurate in privacy protection when vehicle attribute information matching. Simulation results illustrate that the proposed scheme can support large-scale data sets, be effectively applied to network environments with complex information types and rich data content, and satisfy the real-time demand in social Internet of Vehicles.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Zeadally S, Hunt R, Chen Y-S, Irwin A, Hassan A (2012) Vehicular ad hoc networks (vanets): status, results, and challenges. Telecommun Syst 50(4):217–241CrossRef Zeadally S, Hunt R, Chen Y-S, Irwin A, Hassan A (2012) Vehicular ad hoc networks (vanets): status, results, and challenges. Telecommun Syst 50(4):217–241CrossRef
2.
go back to reference Lai C, Zhang M, Cao J, Zheng D (2019) Spir: a secure and privacy-preserving incentive scheme for reliable real-time map updates. IEEE Internet Things J 7(1):416–428CrossRef Lai C, Zhang M, Cao J, Zheng D (2019) Spir: a secure and privacy-preserving incentive scheme for reliable real-time map updates. IEEE Internet Things J 7(1):416–428CrossRef
3.
go back to reference Zhang S, Li X, Liu H, Lin Y, Sangaiah A K (2018) A privacy-preserving friend recommendation scheme in online social networks. Sustain Cities Soc 38:275–285CrossRef Zhang S, Li X, Liu H, Lin Y, Sangaiah A K (2018) A privacy-preserving friend recommendation scheme in online social networks. Sustain Cities Soc 38:275–285CrossRef
4.
go back to reference Li M, Cao N, Yu S, Lou W (2011) Findu: privacy-preserving personal profile matching in mobile social networks. In: 2011 Proceedings IEEE infocom. IEEE, pp 2435–2443 Li M, Cao N, Yu S, Lou W (2011) Findu: privacy-preserving personal profile matching in mobile social networks. In: 2011 Proceedings IEEE infocom. IEEE, pp 2435–2443
5.
go back to reference Dong W, Dave V, Qiu L, Zhang Y (2011) Secure friend discovery in mobile social networks. In: 2011 proceedings IEEE infocom. IEEE, pp 1647–1655 Dong W, Dave V, Qiu L, Zhang Y (2011) Secure friend discovery in mobile social networks. In: 2011 proceedings IEEE infocom. IEEE, pp 1647–1655
6.
go back to reference He J, Dong M, Ota K, Fan M, Wang G (2016) Netseccc: a scalable and fault-tolerant architecture for cloud computing security. Peer-to-Peer Netw Appl 9(1):67–81CrossRef He J, Dong M, Ota K, Fan M, Wang G (2016) Netseccc: a scalable and fault-tolerant architecture for cloud computing security. Peer-to-Peer Netw Appl 9(1):67–81CrossRef
7.
go back to reference Dong M, Li H, Ota K, Yang LT, Zhu H (2014) Multicloud-based evacuation services for emergency management. IEEE Cloud Comput 1(4):50–59CrossRef Dong M, Li H, Ota K, Yang LT, Zhu H (2014) Multicloud-based evacuation services for emergency management. IEEE Cloud Comput 1(4):50–59CrossRef
8.
go back to reference Lu R, Lin X, Liang X, Shen X (2011) A secure handshake scheme with symptoms-matching for mhealthcare social network. Mob Netw Appl 16(6):683–694CrossRef Lu R, Lin X, Liang X, Shen X (2011) A secure handshake scheme with symptoms-matching for mhealthcare social network. Mob Netw Appl 16(6):683–694CrossRef
9.
go back to reference Von Arb M, Bader M, Kuhn M, Wattenhofer R (2008) Veneta: serverless friend-of-friend detection in mobile social networking. In: 2008 IEEE international conference on wireless and mobile computing, networking and communications. IEEE, pp 184–189 Von Arb M, Bader M, Kuhn M, Wattenhofer R (2008) Veneta: serverless friend-of-friend detection in mobile social networking. In: 2008 IEEE international conference on wireless and mobile computing, networking and communications. IEEE, pp 184–189
10.
go back to reference De Cristofaro E, Tsudik G (2010) Practical private set intersection protocols with linear complexity. In: International conference on financial cryptography and data security. Springer, pp 143–159 De Cristofaro E, Tsudik G (2010) Practical private set intersection protocols with linear complexity. In: International conference on financial cryptography and data security. Springer, pp 143–159
11.
go back to reference Shi R -H, Mu Y, Zhong H, Cui J, Zhang S (2016) An efficient quantum scheme for private set intersection. Quantum Inf Process 15(1):363–371MathSciNetCrossRef Shi R -H, Mu Y, Zhong H, Cui J, Zhang S (2016) An efficient quantum scheme for private set intersection. Quantum Inf Process 15(1):363–371MathSciNetCrossRef
12.
go back to reference Li M, Ruan N, Qian Q, Zhu H, Liang X, Yu L (2016) Spfm: scalable and privacy-preserving friend matching in mobile cloud. IEEE Internet Things J 4(2):583–591CrossRef Li M, Ruan N, Qian Q, Zhu H, Liang X, Yu L (2016) Spfm: scalable and privacy-preserving friend matching in mobile cloud. IEEE Internet Things J 4(2):583–591CrossRef
13.
go back to reference Freedman M J, Nissim K, Pinkas B (2004) Efficient private matching and set intersection. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 1–19 Freedman M J, Nissim K, Pinkas B (2004) Efficient private matching and set intersection. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 1–19
14.
go back to reference Cash D, Jarecki S, Jutla C, Krawczyk H, Roşu M-C, Steiner M (2013) Highly-scalable searchable symmetric encryption with support for boolean queries. In: Annual cryptology conference. Springer, pp 353–373 Cash D, Jarecki S, Jutla C, Krawczyk H, Roşu M-C, Steiner M (2013) Highly-scalable searchable symmetric encryption with support for boolean queries. In: Annual cryptology conference. Springer, pp 353–373
15.
go back to reference Kissner L, Song D (2005) Privacy-preserving set operations. In: Annual international cryptology conference. Springer, pp 241–257 Kissner L, Song D (2005) Privacy-preserving set operations. In: Annual international cryptology conference. Springer, pp 241–257
16.
go back to reference Chen ZH, Li SD, Huang Q, Ding Y, Liu YR (2018) Secure computation of two set-relationships with the unencrypted method. Ruan Jian Xue Bao/J Softw 29(2):473–482MathSciNetMATH Chen ZH, Li SD, Huang Q, Ding Y, Liu YR (2018) Secure computation of two set-relationships with the unencrypted method. Ruan Jian Xue Bao/J Softw 29(2):473–482MathSciNetMATH
17.
go back to reference Dong C, Chen L, Wen Z (2013) When private set intersection meets big data: an efficient and scalable protocol. In: Proceedings of the 2013 ACM SIGSAC conference on computer & communications security, pp 789–800 Dong C, Chen L, Wen Z (2013) When private set intersection meets big data: an efficient and scalable protocol. In: Proceedings of the 2013 ACM SIGSAC conference on computer & communications security, pp 789–800
18.
go back to reference Hahn C, Hur J (2016) Scalable and secure private set intersection for big data. In: 2016 International conference on big data and smart computing (BigComp). IEEE, pp 285–288 Hahn C, Hur J (2016) Scalable and secure private set intersection for big data. In: 2016 International conference on big data and smart computing (BigComp). IEEE, pp 285–288
19.
go back to reference Chen W, Fong S (2010) Social network collaborative filtering framework and online trust factors: a case study on facebook. In: 2010 Fifth international conference on digital information management (ICDIM). IEEE, pp 266–273 Chen W, Fong S (2010) Social network collaborative filtering framework and online trust factors: a case study on facebook. In: 2010 Fifth international conference on digital information management (ICDIM). IEEE, pp 266–273
20.
go back to reference Wei C, Khoury R, Fong S (2013) Web 2.0 recommendation service by multi-collaborative filtering trust network algorithm. Inf Syst Front 15(4):533–551CrossRef Wei C, Khoury R, Fong S (2013) Web 2.0 recommendation service by multi-collaborative filtering trust network algorithm. Inf Syst Front 15(4):533–551CrossRef
21.
go back to reference Guo F, Mu Y, Susilo W (2014) Subset membership encryption and its applications to oblivious transfer. IEEE Trans Inf Forensics Secur 9(7):1098–1107CrossRef Guo F, Mu Y, Susilo W (2014) Subset membership encryption and its applications to oblivious transfer. IEEE Trans Inf Forensics Secur 9(7):1098–1107CrossRef
22.
go back to reference Guo L, Zhang C, Fang Y (2014) A trust-based privacy-preserving friend recommendation scheme for online social networks. IEEE Trans Depend Secure Comput 12(4):413–427CrossRef Guo L, Zhang C, Fang Y (2014) A trust-based privacy-preserving friend recommendation scheme for online social networks. IEEE Trans Depend Secure Comput 12(4):413–427CrossRef
23.
go back to reference Thirukkumaran R et al (2018) Survey: security and trust management in internet of things. In: 2018 IEEE global conference on wireless computing and networking (GCWCN). IEEE, pp 131–134 Thirukkumaran R et al (2018) Survey: security and trust management in internet of things. In: 2018 IEEE global conference on wireless computing and networking (GCWCN). IEEE, pp 131–134
24.
go back to reference Abdelghani W, Zayani CA, Amous I, Sèdes F (2016) Trust management in social internet of things: a survey. In: Conference on e-Business, e-Services and e-Society. Springer, pp 430–441 Abdelghani W, Zayani CA, Amous I, Sèdes F (2016) Trust management in social internet of things: a survey. In: Conference on e-Business, e-Services and e-Society. Springer, pp 430–441
25.
go back to reference Lai C, Lu R, Zheng D, Shen X S (2020) Security and privacy challenges in 5g-enabled vehicular networks. IEEE Netw 34(2):37–45CrossRef Lai C, Lu R, Zheng D, Shen X S (2020) Security and privacy challenges in 5g-enabled vehicular networks. IEEE Netw 34(2):37–45CrossRef
26.
go back to reference Lai C, Li Q, Zhou H, Zheng D (2020) Srsp: a secure and reliable smart parking scheme with dual privacy preservation. IEEE Internet Things J Lai C, Li Q, Zhou H, Zheng D (2020) Srsp: a secure and reliable smart parking scheme with dual privacy preservation. IEEE Internet Things J
27.
go back to reference Cheng X, Luo Y, Gui Q (2018) Research on trust management model of wireless sensor networks. In: 2018 IEEE 3rd advanced information technology, electronic and automation control conference (IAEAC). IEEE, pp 1397–1400 Cheng X, Luo Y, Gui Q (2018) Research on trust management model of wireless sensor networks. In: 2018 IEEE 3rd advanced information technology, electronic and automation control conference (IAEAC). IEEE, pp 1397–1400
28.
go back to reference Raya M, Papadimitratos P, Gligor VD, Hubaux J-P (2008) On data-centric trust establishment in ephemeral ad hoc networks. In: IEEE INFOCOM 2008-the 27th conference on computer communications. IEEE, pp 1238–1246 Raya M, Papadimitratos P, Gligor VD, Hubaux J-P (2008) On data-centric trust establishment in ephemeral ad hoc networks. In: IEEE INFOCOM 2008-the 27th conference on computer communications. IEEE, pp 1238–1246
29.
go back to reference Gurung S, Lin D, Squicciarini A, Bertino E (2013) Information-oriented trustworthiness evaluation in vehicular ad-hoc networks. In: International conference on network and system security. Springer, pp 94–108 Gurung S, Lin D, Squicciarini A, Bertino E (2013) Information-oriented trustworthiness evaluation in vehicular ad-hoc networks. In: International conference on network and system security. Springer, pp 94–108
30.
go back to reference Li Z, Chigan CT (2014) On joint privacy and reputation assurance for vehicular ad hoc networks. IEEE Trans Mob Comput 13(10):2334–2344CrossRef Li Z, Chigan CT (2014) On joint privacy and reputation assurance for vehicular ad hoc networks. IEEE Trans Mob Comput 13(10):2334–2344CrossRef
31.
go back to reference Oluoch J (2016) A distributed reputation scheme for situation awareness in vehicular ad hoc networks (vanets). In: 2016 IEEE international multi-disciplinary conference on cognitive methods in situation awareness and decision support (CogSIMA). IEEE, pp 63–67 Oluoch J (2016) A distributed reputation scheme for situation awareness in vehicular ad hoc networks (vanets). In: 2016 IEEE international multi-disciplinary conference on cognitive methods in situation awareness and decision support (CogSIMA). IEEE, pp 63–67
32.
go back to reference Huang X, Yu R, Kang J, Zhang Y (2017) Distributed reputation management for secure and efficient vehicular edge computing and networks. IEEE Access 5:25408–25420CrossRef Huang X, Yu R, Kang J, Zhang Y (2017) Distributed reputation management for secure and efficient vehicular edge computing and networks. IEEE Access 5:25408–25420CrossRef
33.
go back to reference Yang Z, Yang K, Lei L, Zheng K, Leung V C (2018) Blockchain-based decentralized trust management in vehicular networks. IEEE Internet Things J 6(2):1495–1505CrossRef Yang Z, Yang K, Lei L, Zheng K, Leung V C (2018) Blockchain-based decentralized trust management in vehicular networks. IEEE Internet Things J 6(2):1495–1505CrossRef
34.
go back to reference Lu Z, Liu W, Wang Q, Qu G, Liu Z (2018) A privacy-preserving trust model based on blockchain for vanets. IEEE Access 6:45655–45664CrossRef Lu Z, Liu W, Wang Q, Qu G, Liu Z (2018) A privacy-preserving trust model based on blockchain for vanets. IEEE Access 6:45655–45664CrossRef
35.
go back to reference Lai C, Du Y, Men J, Zheng D (2019) “A trust-based real-time map updating scheme. In: 2019 IEEE/CIC international conference on communications in China (ICCC). IEEE, pp 334–339 Lai C, Du Y, Men J, Zheng D (2019) “A trust-based real-time map updating scheme. In: 2019 IEEE/CIC international conference on communications in China (ICCC). IEEE, pp 334–339
36.
go back to reference Rajan A, Jithish J, Sankaran S (2017) Sybil attack in iot: modelling and defenses. In: 2017 International conference on advances in computing, communications and informatics (ICACCI). IEEE, pp 2323–2327 Rajan A, Jithish J, Sankaran S (2017) Sybil attack in iot: modelling and defenses. In: 2017 International conference on advances in computing, communications and informatics (ICACCI). IEEE, pp 2323–2327
Metadata
Title
A trust-based privacy-preserving friend matching scheme in social Internet of Vehicles
Authors
Chengzhe Lai
Yangyang Du
Qili Guo
Dong Zheng
Publication date
20-04-2021
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 4/2021
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-021-01140-3

Other articles of this Issue 4/2021

Peer-to-Peer Networking and Applications 4/2021 Go to the issue

Premium Partner