期刊文献+

移动社交网络中隐私保护的用户相似度计算协议研究 被引量:1

Privacy Protected User Proximity Computing Protocol in Mobile Social Networks
下载PDF
导出
摘要 在移动社交网络中朋友推荐的过程中,为了提供更好的服务,通常需要计算两个用户之间的相似度值。为了避免在相似度计算过程中泄露用户的属性等隐私信息,设计了基于Paillier加密算法的三方点积计算协议。利用两个用户隐私属性向量的点积值来代表用户间的相似度,对两个用户间的隐私向量进行加密后再计算其点积值,然后判断点积值是否满足系统或用户设定的某个阈值的要求。在此过程中,保证用户的隐私信息和点积值不被泄露给任何一方。性能分析和实验测试结果表明协议具有较高的安全性和运行效率。 During the process of friend recommendations,in order to provide better service,it usually needs to compute the similarity value of two users.In order to avoid the leakage of user's privacy information during the process of calculating user's similarity,a three party dot product calculating protocol which is based on Paillier encryption algorithm is set up.The dot product value of the private attribute vectors is used to manifest the similarity of the two users.The privacy vectors of two users will be encrypted before calculating the dot product value,and then,estimating whether the dot product value meets the threshold requirement which is set by the system or the user.In the process,the proposed protocol can ensure the user's privacy information and the dot product values will not be leaked to any party.Performance analysis and experimental results show that the protocol has high security and efficiency.
出处 《计算机与数字工程》 2015年第10期1723-1728,共6页 Computer & Digital Engineering
基金 教育部基本科研业务费(编号:N130316001 N110216001) 国家自然科学基金(编号:N61173027)资助
关键词 移动社交网络 隐私保护 相似度计算 Paillier加密 mobile social networks privacy preserving proximity computing Paillier encryption
  • 相关文献

参考文献12

  • 1Nafaa Jabeur,Sherali Zeadally, Biju Sayed. Mobile so-cial networks applications [J]. Communications of theACM,2013,56(3) :74-79.
  • 2R. Benjamin Shapiro, Pilar N. Ossorio. Regulation ofonline social network studies [J], Science,2013,339:144-145.
  • 3Nan Li, Guanling Chen. Multi-Layered friendshipmodeling for location based mobile social networks[C]//Mobiquitous.2009 : 1-10.
  • 4ARB M. V.,BADER M.,KUHN M.,et al. VENE-TA: Serverless friend-of-friend detection in mobile so-cial networking[C]//Proceedings of the WIMOB,Avi-gnon, France,2008.
  • 5LU R.,LIN X.,LIANG X.,et al. A secure hand-shake scheme with symptoms-matching for mhealthcaresocial network[J]. Mobile Networks and Applications,2010,16(6):683-694.
  • 6DONG W.,DAVE V.,QIU L.,et al. Secure frienddiscovery in mobile social networks [C]//Proceedingsof the INFOCOM, Shanghai, China,2011 : 1647-1656.
  • 7LI M_,CAO N.,YU S_,et al. FindU: Privacy-pre-serving personal profile matching in mobile social net-works[C]//Proceedings of the INFOCOM, Shanghai,China,2011.
  • 8Rui Zhang, Yanchao Zhang, J inyuan Sun, et al. Fine-grained Private Matching for Proximity-based MobileSocial Networking [ C ]//Proceedings of the INFO-COM, Orlando, FL, USA,2012: 1969-1977.
  • 9Goethals B,Laur S,Lipmaa H,et al. On private scalarproduct computation for privacy-preserving data mining[C]//Information Security and Cryptology-ICISC 2004,Springer Berlin Heidelberg,2005 : 104-120.
  • 10Ioannidis I,Grama A,Atallah M. A Secure Protocolfor Computing Dot-Products in Clustered and Distrib-uted Environments[C]//Proceedings of the 2002 In-ternational Conference on Parallel Processing,2002:379-384.

同被引文献3

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部