Weitere Artikel dieser Ausgabe durch Wischen aufrufen
Mobile social network (MSN) is getting immense popularity these days. MSN enables people to make social relationship online as well as offline. Proximity based mobile social network (PMSN) is a subset of MSN where people in near proximity interact with each other. One of the famous applications of MSN (or PMSN) is profile matchmaking. In this application, users in near proximity run a matchmaking protocol in order to compute the similarity between their profiles. However, revealing such information may cause significant privacy threat due to the presence of an attacker in near proximity. The attacker can be an outsider as well as a malicious insider. This paper presents a privacy-aware interests similarity protocol (PAISP) in order to facilitate the users computing the similarity between profiles. PAISP proposes different levels of privacy that allow users to have control over information revelation during matchmaking. Towards the end of the paper, we present the security analysis to show the resilience of our proposed protocol against various threats. Furthermore, we implement our proposed protocol for performance evaluation. The results show that our protocol is feasible, effective and performs better in comparison to existing approaches.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:
Abbas, F., Hussain, R., Son, J., & Oh, H. (2013). Privacy preserving cloud-based computing platform (PPCCP) for using location based services. In IEEE/ACM 6th international conference on utility and cloud computing (UCC) (pp. 60–66).
Kayastha, N., Niyato, D., Wang, P., & Hossain, E. (2011). Applications, architectures, and protocol design issues for mobile social networks: A survey. In Proceedings of the IEEE (Vol. 99, pp. 2130–2158).
Najaflou, Y., Jedari, B., Xia, F., Yang, L. T., & Obaidat, M. S. (2013). Safety challenges and solutions in mobile social networks. IEEE System Journal, 9, 1–21.
Eagle, N., & Pentland, A. (2005). Social serendipity: Mobilizing social software. IEEE Pervasive Computing, 4(2), 28–34. CrossRef
Cox, L. P., Dalton, A., & Marupadi, V. (2007). SmokeScreen: Flexible privacy controls for presence-sharing. In 6th ACM international conference on mobile systems, applications and services (MobiSys) (pp. 233–245).
Li, M., Cao, N., Yu, S., & Lou, W. (2011). Findu: Privacy-preserving personal profile matching in mobile social networks. In IEEE INFOCOM (pp. 2435–2443).
Abbas, F., Rajput, U., Wang, J., Eun, H., & Oh, H. (2016). Say hello again: Privacy preserving matchmaking using cloud in encounter based mobile social networks. In 16th IEEE/ACM international symposium on cluster, cloud and grid computing (CCGrid) (pp. 453–457).
Chen, X., & Michael, K. (2012). Privacy issues and solutions in social network sites. IEEE Technology and Society Magazine, 3(5), 43–53. CrossRef
Freedman, M. J., Nissim, K., & Pinkas, B. (2004). Efficient private matching and set intersection. In Advances in cryptology-EUROCRYPT (pp. 1–19). Berlin: Springer.
Lea, K., & Song, D. (2005). Privacy-preserving set operations. In Advances in cryptology-CRYPTO (pp. 241–257). Berlin: Springer.
Agrawal, R., Evfimievski, A., & Srikant, R. (2003). Information sharing across private databases. In International conference on management of data (ACM SIGMOD) (pp. 86–97).
Xie, Q., & Hengartner, U. (2011). Privacy-preserving matchmaking for mobile social networking secure against malicious users. In 9th IEEE international conference on trust, security and privacy in computing and communications (pp. 252–259).
Wang, Y., Zhang, T., Li, H., He, L., & Peng, J. (2012). Efficient privacy preserving matchmaking for mobile social networking against malicious users. In 11th IEEE international conference on trust, security and privacy in computing and communications (pp. 610–615).
Abbas, F., Rajput, U., & Oh, H. (2016). PRISM: Privacy-aware interest sharing and matching in mobile social networks. IEEE Access, 4, 2594–2603. CrossRef
Liang, X., Li, X., Zhang, K., Lu, R., Lin, X., & Shen, X. (2013). Fully anonymous profile matching in mobile social networks. Journal of Selected Areas in communication, 31(9), 1–15. CrossRef
Paillier, P., & Pointcheval, D. (1999). Efficient public-key cryptosystems provably secure against active adversaries. In Advances in cryptology-ASIACRYPT (pp. 165–179). Berlin: Springer.
Dong, W., Dave, V., Qiu, L., & Zhang, Y. (2011). Secure friend discovery in mobile social networks. In IEEE INFOCOM (pp. 1647–1655).
Zhang, R., Zhang, Y., Sun, J., & Yan, G. (2013). Privacy preservation for proximity based mobile social networking. IEEE Journal of Selected Areas in Communications, 31, 656–668. CrossRef
Zhang, R., Zhang, Y., Sun, J., & Yan, G. (2012). Fine-grained private matching for proximity-based mobile social networking. In IEEE INFOCOM (pp. 1969–1977).
Niu, B., Zhu, X., Zhang, T., & Chi, H. (2013). P-match: Priority-aware friend discovery for proximity-based mobile social networks. In IEEE 10th international conference mobile ad-hoc and sensor systems (MASS) (pp. 351–355).
Basu, A., Vaidya, J., Kikuchi, H., Dimitrakos, T., & Nair, S. K. (2012). Privacy preserving collaborative filtering for SaaS enabling PaaS clouds. Journal of Cloud Computing, 1(1), 1–14. CrossRef
- Priority-Aware Interests Similarity Protocol (PAISP) for Proximity Based Mobile Social Network
- Springer US
Neuer Inhalt/© Filograph | Getty Images | iStock