PPAM: Privacy-preserving Attributes Matchmaking Protocol for Mobile Social Networks Secure against Malicious Users
نویسندگان
چکیده
People often associate with others who share their hopes, aspirations, beliefs and experiences. This sense of belonging influences people when making friends be it physically or on social networks. Most of the existing matchmaking protocols just match-pair people without regards to the number of attributes they have in common. In lieu of these, we are proposing a hybrid matchmaking protocol that seeks to help match-pair seekers find the most appropriate pair. In our protocol, all private attributes are certified by a mutually trusted third party. Also, a candidate becomes a matching-pair of an initiator when s/he meets a criteria set by the initiator. In our protocol, the number of attributes in the intersection set is known mutually by both the initiator and the candidate but only the matched-pair gets to know the actual attributes they have in common. Furthermore, the protocol guards against malicious and semi-malicious attacks.
منابع مشابه
Privacy-preserving Attribute Matchmaking in Proximity-based Mobile Social Networks
The major impediments that mostly arise in matchmaking in mobile social networks are ensuring the privacy of users’ attributes, finding the intersection of attributes of the matched-pair without revealing any other information, and ensuring that the matchedpair get to know the intersection mutually. Also, in virtually all the existing protocols, the initiator of the matchmaking does not set a t...
متن کاملA Secure and Efficient Privacy-Preserving Attribute Matchmaking Protocol for Mobile Social Networks
The advances in mobile and communication technologies lead to advancement of Mobile Social Networks (MSNs). MSN changed the way people communicate and exchange the private and sensitive information among the friend groups via mobile phones. Due to the involvement of private and sensitive information, MSN demands for efficient and privacy-preserving matchmaking protocols to prevent the unintende...
متن کاملA centralized privacy-preserving framework for online social networks
There are some critical privacy concerns in the current online social networks (OSNs). Users' information is disclosed to different entities that they were not supposed to access. Furthermore, the notion of friendship is inadequate in OSNs since the degree of social relationships between users dynamically changes over the time. Additionally, users may define similar privacy settings for their f...
متن کاملPrivacy-Preserving Abuse Detection in Future Decentralised Online Social Networks
Future online social networks need to not only protect sensitive data of their users, but also protect them from abusive behavior coming from malicious participants in the network. We investigate the use of supervised learning techniques to detect abusive behavior and describe privacy-preserving protocols to compute the feature set required by abuse classification algorithms in a secure and pri...
متن کاملپروتکل کارا برای جمع چندسویه امن با قابلیت تکرار
In secure multiparty computation (SMC), a group of users jointly and securely computes a mathematical function on their private inputs, such that the privacy of their private inputs will be preserved. One of the widely used applications of SMC is the secure multiparty summation which securely computes the summation value of the users’ private inputs. In this paper, we consider a secure multipar...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- I. J. Network Security
دوره 18 شماره
صفحات -
تاریخ انتشار 2016