Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks

Future Generation Computer Systems - Tập 68 - Trang 222-233 - 2017
Entao Luo1,2, Qin Liu3, Jemal H. Abawajy4, Guojun Wang5,1
1School of Information Science and Engineering, Central South University, Changsha 410083, China
2School of Electronics and Information Engineering, Hunan University of Science and Engineering, Yongzhou, 425199, China
3School of Computer Science and Electronic Engineering, Hunan University, Changsha 410082, China
4Faculty of Science, Engineering and Built Environment, Deakin University, VIC 3220, Australia
5School of Computer Science and Educational Software, Guangzhou University, Guangzhou 510006, China

Tài liệu tham khảo

Wang, 2014, Survey on mobile social networking in proximity (MSNP): approaches, challenges and architecture, Wirel. Netw., 20, 1295, 10.1007/s11276-013-0677-7 Zhu, 2014, Efficient weight-based private matching for proximity-based mobile social networks, 4114 Wang, 2014, Overview on privacy-preserving profile-matching mechanisms in mobile social networks in proximity (MSNP), 133 Sun, 2016, ASA: Against statistical attacks for privacy-aware users in Location Based Service, Future Gener. Comput. Syst., 10.1016/j.future.2016.06.017 Han, 2016, Privacy preservation for V2G networks in smart grid: A survey, Comput. Commun., 91, 17, 10.1016/j.comcom.2016.06.006 Abawajy, 2016, Privacy preserving social network data publication, IEEE Commun. Surv. Tutor., 10.1109/COMST.2016.2533668 Zhang, 2015, Message in a sealed bottle: privacy preserving friending in mobile social networks, IEEE Trans. Mob. Comput., 14, 1888, 10.1109/TMC.2014.2366773 Lu, 2011, A secure handshake scheme with symptoms-matching for mhealthcare social network, Mob. Netw. Appl., 16, 683, 10.1007/s11036-010-0274-2 Guo, 2014, A privacy-preserving attribute-based authentication system for mobile health networks, IEEE Trans. Mob. Comput., 3, 1927, 10.1109/TMC.2013.84 Guo, 2013, Privacy-preserving attribute-based friend search in geosocial networks with untrusted servers, 629 Dong, 2011, Secure friend discovery in mobile social networks, 1647 Li, 2011, FindU: privacy-preserving personal profile matching in mobile social networks, 2435 Zhu, 2013, Fairness-Aware and privacy-preserving friend matching protocol in mobile social networks, IEEE Trans. Emerg. Top. Comput., 1, 192, 10.1109/TETC.2013.2279541 Ioannidis, 2002, A secure protocol for computing dot-products in clustered and distributed environments, 379 Zhang, 2013, Privacy-preserving profile matching for proximity-based mobile social networking, IEEE J. Sel. Areas Commun., 31, 656, 10.1109/JSAC.2013.SUP.0513057 Luo, 2015, NMHP: A privacy preserving profile matching protocol in multi-hop proximity mobile social networks, 463 Yan, 2016, Two schemes of privacy-preserving trust evaluation, Future Gener. Comput. Syst., 62, 175, 10.1016/j.future.2015.11.006 Zhang, 2012, Fine-grained private matching for proximity-based mobile social networking, 1969 Ozdemir, 2011, Integrity protecting hierarchical concealed data aggregation for wireless sensor networks, Comput. Netw., 55, 1735, 10.1016/j.comnet.2011.01.006 Boneh, 2005, Evaluating 2-DNF formulas on ciphertexts, 325 Kiraz, 2015, Security and efficiency analysis of the Hamming distance computation protocol based on oblivious transfer, Secur. Commun. Netw., 8, 4123, 10.1002/sec.1329 Ozdemir, 2015, PRDA: polynomial regression-based privacy-preserving data aggregation for wireless sensor networks, Wirel. Commun. Mob. Comput., 15, 615, 10.1002/wcm.2369 Q. Xie, U. Hengartner, Privacy-preserving matchmaking For mobile social networking secure against malicious users, Privacy, 2011 Ninth Annual International Conference on Security and Trust (PST), 2011, pp. 252–259. Lu, 2013, SPOC: a secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency, IEEE Trans. Parallel Distrib. Syst., 24, 614, 10.1109/TPDS.2012.146 Sun, 2013, Privacy-preserving spatiotemporal matching, 800 Niu, 2013, Weight-aware private matching scheme for proximity-based mobile social networks, 3170 Ostrovsky, 2007, Attribute-Based encryption with non-monotonic access structures, 195 Zavattoni, 2015, Software implementation of an attribute-based encryption scheme, IEEE Trans. Comput., 64, 1429, 10.1109/TC.2014.2329681 Han, 2012, Privacy-preserving decentralized key-policy attribute-based encryption, IEEE Trans. Parallel Distrib. Syst., 23, 2150, 10.1109/TPDS.2012.50 Han, 2014, A general transformation from KP-ABE to searchable encryption, Future Gener. Comput. Syst., 30, 107, 10.1016/j.future.2013.09.013 Hur, 2011, Attribute-based access control with efficient revocation in data outsourcing systems, IEEE Trans. Parallel Distrib. Syst., 22, 1214, 10.1109/TPDS.2010.203 Ohtake, 2015, Privacy preserving system for integrated broadcast-broadband services using attribute-based encryption, IEEE Trans. Consum. Electron., 61, 328, 10.1109/TCE.2015.7298092