메뉴 건너뛰기




Volumn 31, Issue 9, 2013, Pages 641-655

Fully anonymous profile matching in mobile social networks

Author keywords

homomorphic encryption; Mobile social network; oblivious transfer; privacy preservation; profile matching

Indexed keywords

HO-MOMORPHIC ENCRYPTIONS; MOBILE SOCIAL NETWORKS; OBLIVIOUS TRANSFER; PRIVACY PRESERVATION; PROFILE MATCHING;

EID: 84883345595     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2013.SUP.0513056     Document Type: Article
Times cited : (56)

References (50)
  • 1
    • 84883359481 scopus 로고    scopus 로고
    • "Comscore," http://www.comscoredatamine.com/.
    • Comscore
  • 3
    • 70349678474 scopus 로고    scopus 로고
    • Optimal and scalable distribution of content updates over a mobile social network
    • S. Ioannidis, A. Chaintreau, and L. Massoulié, "Optimal and scalable distribution of content updates over a mobile social network," in Proc. IEEE INFOCOM, 2009, pp. 1422-1430.
    • (2009) Proc. IEEE INFOCOM , pp. 1422-1430
    • Ioannidis, S.1    Chaintreau, A.2    Massoulié, L.3
  • 4
    • 77953313061 scopus 로고    scopus 로고
    • Spring: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks
    • R. Lu, X. Lin, and X. Shen, "Spring: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks," in Proc. IEEE INFOCOM, 2010, pp. 632-640.
    • (2010) Proc. IEEE INFOCOM , pp. 632-640
    • Lu, R.1    Lin, X.2    Shen, X.3
  • 5
    • 77953985250 scopus 로고    scopus 로고
    • Message propagation in adhoc-based proximity mobile social networks
    • W. He, Y. Huang, K. Nahrstedt, and B. Wu, "Message propagation in adhoc-based proximity mobile social networks," in PERCOM workshops, 2010, pp. 141-146.
    • (2010) PERCOM Workshops , pp. 141-146
    • He, W.1    Huang, Y.2    Nahrstedt, K.3    Wu, B.4
  • 6
    • 79955976020 scopus 로고    scopus 로고
    • Controlled coalitional games for cooperative mobile social networks
    • D. Niyato, P.Wang, W. Saad, and A. Hjørungnes, "Controlled coalitional games for cooperative mobile social networks," IEEE Trans. Veh. Technol., vol. 60, no. 4, pp. 1812-1824, 2011.
    • (2011) IEEE Trans. Veh. Technol. , vol.60 , Issue.4 , pp. 1812-1824
    • Niyato, D.1    Wang, P.2    Saad, W.3    Hjørungnes, A.4
  • 7
    • 32144441510 scopus 로고    scopus 로고
    • Peoplenet: Engineering a wireless virtual social network
    • M. Motani, V. Srinivasan, and P. Nuggehalli, "Peoplenet: engineering a wireless virtual social network," in MobiCom, 2005, pp. 243-257.
    • (2005) MobiCom , pp. 243-257
    • Motani, M.1    Srinivasan, V.2    Nuggehalli, P.3
  • 8
    • 77953012284 scopus 로고    scopus 로고
    • Designing participation in agile ridesharing with mobile social software
    • M. Brereton, P. Roe, M. Foth, J. M. Bunker, and L. Buys, "Designing participation in agile ridesharing with mobile social software," in OZCHI, 2009, pp. 257-260.
    • (2009) OZCHI , pp. 257-260
    • Brereton, M.1    Roe, P.2    Foth, M.3    Bunker, J.M.4    Buys, L.5
  • 9
    • 84869471781 scopus 로고    scopus 로고
    • Exploiting friendship relations for efficient routing in delay tolerant mobile social networks
    • E.Bulut and B.Szymanski, "Exploiting friendship relations for efficient routing in delay tolerant mobile social networks," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 12, pp. 2254-2265, 2012.
    • (2012) IEEE Trans. Parallel Distrib. Syst. , vol.23 , Issue.12 , pp. 2254-2265
    • Bulut, E.1    Szymanski, B.2
  • 10
    • 77955912474 scopus 로고    scopus 로고
    • E-smalltalker: A distributed mobile system for social networking in physical proximity
    • Z. Yang, B. Zhang, J. Dai, A. C. Champion, D. Xuan, and D. Li, "E-smalltalker: A distributed mobile system for social networking in physical proximity," in ICDCS, 2010, pp. 468-477.
    • (2010) ICDCS , pp. 468-477
    • Yang, Z.1    Zhang, B.2    Dai, J.3    Champion, A.C.4    Xuan, D.5    Li, D.6
  • 11
    • 77953319755 scopus 로고    scopus 로고
    • Routing in socially selfish delay tolerant networks
    • Q. Li, S. Zhu, and G. Cao, "Routing in socially selfish delay tolerant networks," in Proc. IEEE INFOCOM, 2010, pp. 857-865.
    • (2010) Proc. IEEE INFOCOM , pp. 857-865
    • Li, Q.1    Zhu, S.2    Cao, G.3
  • 12
    • 84866513570 scopus 로고    scopus 로고
    • Moralitydriven data forwarding with privacy preservation in mobile social networks
    • X. Liang, X. Li, T. H. Luan, R. Lu, X. Lin, and X. Shen, "Moralitydriven data forwarding with privacy preservation in mobile social networks," IEEE Trans. Veh. Technol., vol. 7, no. 61, pp. 3209-3222, 2012.
    • (2012) IEEE Trans. Veh. Technol. , vol.7 , Issue.61 , pp. 3209-3222
    • Liang, X.1    Li, X.2    Luan, T.H.3    Lu, R.4    Lin, X.5    Shen, X.6
  • 13
    • 33749016498 scopus 로고    scopus 로고
    • Information revelation and privacy in online social networks
    • R. Gross, A. Acquisti, and H. J. H. III, "Information revelation and privacy in online social networks," in WPES, 2005, pp. 71-80.
    • (2005) WPES , pp. 71-80
    • Gross, R.1    Acquisti, A.2    Ho III, J.H.3
  • 14
    • 37249010231 scopus 로고    scopus 로고
    • An evaluation of identity-sharing behavior in social network communities
    • F. Stutzman, "An evaluation of identity-sharing behavior in social network communities." iDMAa Journal, vol. 3, no. 1, pp. 10-18, 2006.
    • (2006) IDMAa Journal , vol.3 , Issue.1 , pp. 10-18
    • Stutzman, F.1
  • 15
    • 76749094667 scopus 로고    scopus 로고
    • Starclique: Guaranteeing user privacy in social networks against intersection attacks
    • K. P. N. Puttaswamy, A. Sala, and B. Y. Zhao, "Starclique: guaranteeing user privacy in social networks against intersection attacks," in CoNEXT, 2009, pp. 157-168.
    • (2009) CoNEXT , pp. 157-168
    • Puttaswamy, K.P.N.1    Sala, A.2    Zhao, B.Y.3
  • 16
    • 77954584058 scopus 로고    scopus 로고
    • To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles
    • E. Zheleva and L. Getoor, "To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles," in WWW, 2009, pp. 531-540.
    • (2009) WWW , pp. 531-540
    • Zheleva, E.1    Getoor, L.2
  • 19
    • 35048820609 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • M. J. Freedman, K. Nissim, and B. Pinkas, "Efficient private matching and set intersection," in EUROCRYPT, 2004, pp. 1-19.
    • (2004) EUROCRYPT , pp. 1-19
    • Freedman, M.J.1    Nissim, K.2    Pinkas, B.3
  • 20
    • 84855674646 scopus 로고    scopus 로고
    • A secure handshake scheme with symptoms-matching for mhealthcare social network
    • R. Lu, X. Lin, X. Liang, and X. Shen, "A secure handshake scheme with symptoms-matching for mhealthcare social network," ACM Mobile Networks and Applications (MONET), vol. 16, no. 6, pp. 683-694, 2011.
    • (2011) ACM Mobile Networks and Applications (MONET) , vol.16 , Issue.6 , pp. 683-694
    • Lu, R.1    Lin, X.2    Liang, X.3    Shen, X.4
  • 21
    • 79960878565 scopus 로고    scopus 로고
    • Findu: Privacy-preserving personal profile matching in mobile social networks
    • M. Li, N. Cao, S. Yu, and W. Lou, "Findu: Privacy-preserving personal profile matching in mobile social networks," in Proc. IEEE INFOCOM, 2011, pp. 2435-2443.
    • (2011) Proc. IEEE INFOCOM , pp. 2435-2443
    • Li, M.1    Cao, N.2    Yu, S.3    Lou, W.4
  • 22
    • 84861649075 scopus 로고    scopus 로고
    • Fine-grained private matching for proximity-based mobile social networking
    • R. Zhang, Y. Zhang, J. Sun, and G. Yan, "Fine-grained private matching for proximity-based mobile social networking," in Proc. IEEE INFOCOM, 2012, pp. 1969-1977.
    • (2012) Proc. IEEE INFOCOM , pp. 1969-1977
    • Zhang, R.1    Zhang, Y.2    Sun, J.3    Yan, G.4
  • 23
    • 79960871684 scopus 로고    scopus 로고
    • Secure friend discovery in mobile social networks
    • W. Dong, V. Dave, L. Qiu, and Y. Zhang, "Secure friend discovery in mobile social networks," in Proc. IEEE INFOCOM, 2011, pp. 1647-1655.
    • (2011) Proc. IEEE INFOCOM , pp. 1647-1655
    • Dong, W.1    Dave, V.2    Qiu, L.3    Zhang, Y.4
  • 24
    • 74049097109 scopus 로고    scopus 로고
    • On noncooperative location privacy: A game-theoretic analysis
    • J. Freudiger, M. H. Manshaei, J.-P. Hubaux, and D. C. Parkes, "On noncooperative location privacy: a game-theoretic analysis," in ACM CCS, 2009, pp. 324-337.
    • (2009) ACM CCS , pp. 324-337
    • Freudiger, J.1    Manshaei, M.H.2    Hubaux, J.-P.3    Parkes, D.C.4
  • 25
    • 84856182115 scopus 로고    scopus 로고
    • Pseudonym changing at social spots: An effective strategy for location privacy in vanets
    • R. Lu, X. Lin, H. Luan, X. Liang, and X. Shen, "Pseudonym changing at social spots: An effective strategy for location privacy in vanets," IEEE Trans. Veh. Technol., vol. 61, no. 1, pp. 86 -96, 2011.
    • (2011) IEEE Trans. Veh. Technol. , vol.61 , Issue.1 , pp. 86-96
    • Lu, R.1    Lin, X.2    Luan, H.3    Liang, X.4    Shen, X.5
  • 26
    • 44449129423 scopus 로고    scopus 로고
    • Predicate encryption supporting disjunctions, polynomial equations, and inner products
    • J. Katz, A. Sahai, and B. Waters, "Predicate encryption supporting disjunctions, polynomial equations, and inner products," in EUROCRYPT, 2008, pp. 146-162.
    • (2008) EUROCRYPT , pp. 146-162
    • Katz, J.1    Sahai, A.2    Waters, B.3
  • 27
    • 19944388571 scopus 로고    scopus 로고
    • Social serendipity: Mobilizing social software
    • N. Eagle and A. Pentland, "Social serendipity: mobilizing social software," IEEE Pervasive Computing, vol. 4, no. 2, pp. 28-34, 2005.
    • (2005) IEEE Pervasive Computing , vol.4 , Issue.2 , pp. 28-34
    • Eagle, N.1    Pentland, A.2
  • 28
    • 80051898247 scopus 로고    scopus 로고
    • E-shadow: Lubricating social interaction using mobile phones
    • J. Teng, B. Zhang, X. Li, X. Bai, and D. Xuan, "E-shadow: Lubricating social interaction using mobile phones," in ICDCS, 2011, pp. 909-918.
    • ICDCS , vol.2011 , pp. 909-918
    • Teng, J.1    Zhang, B.2    Li, X.3    Bai, X.4    Xuan, D.5
  • 29
    • 84863557627 scopus 로고    scopus 로고
    • Your friends have more friends than you do: Identifying influential mobile users through random walks
    • B. Han and A. Srinivasan, "Your friends have more friends than you do: identifying influential mobile users through random walks," in MobiHoc, 2012, pp. 5-14.
    • MobiHoc , vol.2012 , pp. 5-14
    • Han, B.1    Srinivasan, A.2
  • 30
    • 77955912474 scopus 로고    scopus 로고
    • E-smalltalker: A distributed mobile system for social networking in physical proximity
    • Z. Yang, B. Zhang, J. Dai, A. C. Champion, D. Xuan, and D. Li, "E-smalltalker: A distributed mobile system for social networking in physical proximity," in ICDCS, 2010, pp. 468-477.
    • (2010) ICDCS , pp. 468-477
    • Yang, Z.1    Zhang, B.2    Dai, J.3    Champion, A.C.4    Xuan, D.5    Li, D.6
  • 31
    • 33745160750 scopus 로고    scopus 로고
    • Privacy-preserving set operations
    • L. Kissner and D. X. Song, "Privacy-preserving set operations," in CRYPTO, 2005, pp. 241-257.
    • (2005) CRYPTO , pp. 241-257
    • Kissner, L.1    Song, D.X.2
  • 32
    • 41549155611 scopus 로고    scopus 로고
    • Distributed private matching and set operations
    • Q. Ye, H. Wang, and J. Pieprzyk, "Distributed private matching and set operations," in ISPEC, 2008, pp. 347-360.
    • (2008) ISPEC , pp. 347-360
    • Ye, Q.1    Wang, H.2    Pieprzyk, J.3
  • 33
    • 68949136946 scopus 로고    scopus 로고
    • Efficient robust private set intersection
    • D. Dachman-Soled, T. Malkin, M. Raykova, and M. Yung, "Efficient robust private set intersection," in ACNS, 2009, pp. 125-142.
    • (2009) ACNS , pp. 125-142
    • Dachman-Soled, D.1    Malkin, T.2    Raykova, M.3    Yung, M.4
  • 34
    • 70350656283 scopus 로고    scopus 로고
    • Efficient oblivious pseudorandom function with applications to adaptive ot and secure computation of set intersection
    • S. Jarecki and X. Liu, "Efficient oblivious pseudorandom function with applications to adaptive ot and secure computation of set intersection," in TCC, 2009, pp. 577-594.
    • (2009) TCC , pp. 577-594
    • Jarecki, S.1    Liu, X.2
  • 35
    • 77954759544 scopus 로고    scopus 로고
    • Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
    • C. Hazay and Y. Lindell, "Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries," J. Cryptology, vol. 23, no. 3, pp. 422-456, 2010.
    • (2010) J. Cryptology , vol.23 , Issue.3 , pp. 422-456
    • Hazay, C.1    Lindell, Y.2
  • 36
    • 24944523186 scopus 로고    scopus 로고
    • On private scalar product computation for privacy-preserving data mining
    • B. Goethals, S. Laur, H. Lipmaa, and T. Mielikainen, "On private scalar product computation for privacy-preserving data mining," in ICISC, 2004, pp. 104-120.
    • (2004) ICISC , pp. 104-120
    • Goethals, B.1    Laur, S.2    Lipmaa, H.3    Mielikainen, T.4
  • 37
    • 0020312165 scopus 로고
    • Protocols for secure computations (extended abstract)
    • A. C.-C. Yao, "Protocols for secure computations (extended abstract)," in FOCS, 1982, pp. 160-164.
    • (1982) FOCS , pp. 160-164
    • Yao, A.C.-C.1
  • 38
    • 0023545076 scopus 로고
    • How to play any mental game or a completeness theorem for protocols with honest majority
    • O. Goldreich, S. Micali, and A. Wigderson, "How to play any mental game or a completeness theorem for protocols with honest majority," in STOC, 1987, pp. 218-229.
    • (1987) STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 39
    • 84948451182 scopus 로고    scopus 로고
    • A secure protocol for computing dot-products in clustered and distributed environments
    • I. Ioannidis, A. Grama, and M. J. Atallah, "A secure protocol for computing dot-products in clustered and distributed environments," in ICPP, 2002, pp. 379-384.
    • (2002) ICPP , pp. 379-384
    • Ioannidis, I.1    Grama, A.2    Atallah, M.J.3
  • 40
    • 35048846561 scopus 로고    scopus 로고
    • Strong conditional oblivious transfer and computing on intervals
    • I. F. Blake and V. Kolesnikov, "Strong conditional oblivious transfer and computing on intervals," in ASIACRYPT, 2004, pp. 515-529.
    • (2004) ASIACRYPT , pp. 515-529
    • Blake, I.F.1    Kolesnikov, V.2
  • 41
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in EUROCRYPT, 1999, pp. 223-238.
    • (1999) EUROCRYPT , pp. 223-238
    • Paillier, P.1
  • 42
    • 80955157888 scopus 로고    scopus 로고
    • Can homomorphic encryption be practical?
    • M. Naehrig, K. Lauter, and V. Vaikuntanathan, "Can homomorphic encryption be practical?" in CCSW, 2011, pp. 113-124.
    • (2011) CCSW , pp. 113-124
    • Naehrig, M.1    Lauter, K.2    Vaikuntanathan, V.3
  • 43
    • 84864583229 scopus 로고    scopus 로고
    • Eppa: An efficient and privacy-preserving aggregation scheme for secure smart grid communications
    • R. Lu, X. Liang, X. Li, X. Lin, and X. Shen, "Eppa: An efficient and privacy-preserving aggregation scheme for secure smart grid communications," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 9, pp. 1621-1631, 2012.
    • (2012) IEEE Trans. Parallel Distrib. Syst. , vol.23 , Issue.9 , pp. 1621-1631
    • Lu, R.1    Liang, X.2    Li, X.3    Lin, X.4    Shen, X.5
  • 45
    • 84861648316 scopus 로고    scopus 로고
    • Exploiting prediction to enable secure and reliable routing in wireless body area networks
    • X. Liang, X. Li, Q. Shen, R. Lu, X. Lin, X. Shen, and W. Zhuang, "Exploiting prediction to enable secure and reliable routing in wireless body area networks," in Proc. IEEE INFOCOM, 2012, pp. 388-396.
    • (2012) Proc. IEEE INFOCOM , pp. 388-396
    • Liang, X.1    Li, X.2    Shen, Q.3    Lu, R.4    Lin, X.5    Shen, X.6    Zhuang, W.7
  • 46
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 49
    • 85044912675 scopus 로고    scopus 로고
    • Small worlds: The dynamics of networks between order and randomness
    • D. J. Watts, "Small worlds: The dynamics of networks between order and randomness," J. Artificial Societies and Social Simulation, vol. 6, no. 2, 2003.
    • (2003) J. Artificial Societies and Social Simulation , vol.6 , Issue.2
    • Watts, D.J.1
  • 50
    • 84976668743 scopus 로고
    • Finding all cliques of an undirected graph (algorithm 457)
    • C. Bron and J. Kerbosch, "Finding all cliques of an undirected graph (algorithm 457)," Commun. ACM, vol. 16, no. 9, pp. 575-576, 1973. of Canada
    • (1973) Commun. ACM , vol.16 , Issue.9 , pp. 575-576
    • Bron, C.1    Kerbosch, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.