期刊文献+

移动社会网络中用户相似性计算的隐私保护研究 被引量:1

Protected Private Information for Proximity Computingin Mobile Social Network
下载PDF
导出
摘要 移动社会网络(MSN)增强了虚拟世界与现实世界的联系,它允许移动用户发现其现实世界中附近的用户并与之交流。在MSN应用中,为提供更好的服务,通常会比较两个用户的相似性,但在计算用户相似性的过程中很有可能泄露用户的隐私信息。针对这一问题,设计了两种新的相似性计算协议,这些协议保证了在进行相似性计算时不会泄露用户的任何隐私信息。 Mobile social network (MSN) extend social network in the cyberspace into the real world.It allows mobile users to discover and interact with a stranger in their physical vicinity.Proximity computing means that two users can compare their personal profiles in MSN application.It is,however,possible disclosing user's privacy information.To address this concerns,two novel proximity computing protocols were designed.The protocols enable two users to perform proximity computing without disclosing any information about their profiles.
出处 《电信科学》 北大核心 2013年第10期119-122,共4页 Telecommunications Science
基金 教育部英特尔信息技术专项科研基金资助项目(No.MOE-INTEL-2012-06) 东北大学基本科研业务费资助项目(No.N110216001)
关键词 移动社会网络 相似性计算 同态加密 隐私 mobile social network proximity computing homomorphic encryption private
  • 相关文献

参考文献12

  • 1陌陌.http://www.immomo.com/.
  • 2微信.http://weixin.qq.com/.
  • 3Li M, Yu S, Cao N, et al. Privacy-preserving distributed profile matching in proximity-based mobile social networks. IEEE Transactions on Wireless Communications, 2015, 12 (5): 2024- 2033.
  • 4Arb M V, Bader M, Kuhn M, et al. VENETA: serverless friend-of-friend detection in mobile social networking. Proceedings of the WIMOB, Avignon, France, 2008.
  • 5Lu R, Lin X, Liang X, et a/. A secure handshake scheme with symptoms-matching for mheahhcare social network. Mobile Networks and Applications, 2010, 16 (6) : 683-694.
  • 6Dong W, Dave V, Qiu L, et al. Secure friend discovery in mobile social networks. Proceedings of the INFOCOM, Shanghai, China, 2011.
  • 7Li M, Cao N, Yu S, et ol. FindU: privacy-preserving personal profile matching in mobile social networks. Proceedings of the INFOCOM, Shanghai, China, 2011.
  • 8Jahanbakhsh K, King V, Shoja G C. Predicting missing contacts in mobile social networks. Pervasive and Mobile Computing, Mobile and Multimedia Networks, 2012, 8 (5): 698-716.
  • 9Freedman M J, Nissim K, Pinkas B. Efficient private matching and set intersection. Proceedings of the EUROCRYPT, Interlaken, Switzerland, 2004.
  • 10Kissner L, Song D. Privacy-preserving set operations. Proceedings of the CRYPTO, Santa Barbara, CA, 2005.

同被引文献20

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部