A Trustless Broker Based Protocol to Discover Friends in Proximity-Based Mobile Social Networks
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Abbas, Fizza | - |
dc.contributor.author | Rajput, Ubaidullah | - |
dc.contributor.author | Hussain, Rasheed | - |
dc.contributor.author | Eun, Hasoo | - |
dc.contributor.author | Oh, Heekuck | - |
dc.date.accessioned | 2021-06-22T20:42:11Z | - |
dc.date.available | 2021-06-22T20:42:11Z | - |
dc.date.issued | 2015-01 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.issn | 1611-3349 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/19222 | - |
dc.description.abstract | Due to the rapid growth of online social networking and mobile devices, proximity based mobile social networks (PMSN) are gaining increasing popularity. PMSN refers to the social interaction among physically proximate mobile users where they directly communicate through Bluetooth/Wi-Fi. In PMSN, while making friends, users match their profiles in accordance with their interests. In this regard, preserving a user’s privacy is crucial during profile matching. Users use their profiles for matching. An attacker in user’s near proximity can learn these profiles’ values. This poses significant threat to a user’s privacy. In this regard, we propose a protocol to preserve user’s sensitive information. During discovery of friends in our protocol we use a broker that is an intermediate entity between interacting mobile users. Our protocol does not require trustworthy broker and hence no valuable information is given to broker that can cause a privacy threat. For secure computations paillier encryption has been used in our protocol. Furthermore, we implement and analyze our protocol to show its acceptable computational and communication cost. | - |
dc.format.extent | 12 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | Springer | - |
dc.title | A Trustless Broker Based Protocol to Discover Friends in Proximity-Based Mobile Social Networks | - |
dc.type | Article | - |
dc.publisher.location | 독일 | - |
dc.identifier.doi | 10.1007/978-3-319-15087-1_17 | - |
dc.identifier.scopusid | 2-s2.0-84922154335 | - |
dc.identifier.wosid | 000357589600017 | - |
dc.identifier.bibliographicCitation | Lecture Notes in Computer Science, v.8909, pp 216 - 227 | - |
dc.citation.title | Lecture Notes in Computer Science | - |
dc.citation.volume | 8909 | - |
dc.citation.startPage | 216 | - |
dc.citation.endPage | 227 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.subject.keywordAuthor | Proximity based mobile social network | - |
dc.subject.keywordAuthor | Broker | - |
dc.subject.keywordAuthor | Interests | - |
dc.subject.keywordAuthor | Paillier encryption | - |
dc.identifier.url | https://link.springer.com/chapter/10.1007/978-3-319-15087-1_17 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
55 Hanyangdeahak-ro, Sangnok-gu, Ansan, Gyeonggi-do, 15588, Korea+82-31-400-4269 sweetbrain@hanyang.ac.kr
COPYRIGHT © 2021 HANYANG UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.