메뉴 건너뛰기




Volumn 4, Issue 2, 2017, Pages 583-591

SPFM: Scalable and Privacy-Preserving Friend Matching in Mobile Cloud

Author keywords

Cloud security; friend matching; privacy preserving; XOR

Indexed keywords

SOCIAL NETWORKING (ONLINE);

EID: 85019023409     PISSN: None     EISSN: 23274662     Source Type: Journal    
DOI: 10.1109/JIOT.2016.2582780     Document Type: Article
Times cited : (25)

References (27)
  • 1
    • 84921898213 scopus 로고    scopus 로고
    • Privacy and human behavior in the age of information
    • A. Acquisti, L. Brandimarte, and G. Loewenstein, "Privacy and human behavior in the age of information, " Science, vol. 347, no. 6221, pp. 509-514, 2015.
    • (2015) Science , vol.347 , Issue.6221 , pp. 509-514
    • Acquisti, A.1    Brandimarte, L.2    Loewenstein, G.3
  • 2
    • 84960984968 scopus 로고    scopus 로고
    • Jul. [Online]. Available
    • D. Lewis. (Jul. 2015). iCloud Data Breach: Hacking and Celebrity Photos. [Online]. Available: http://www.forbes.com/sites/davelewis/2014/09/02/icloud-data-breach-hacking-And-nude-celebrity-photos/
    • (2015) ICloud Data Breach: Hacking and Celebrity Photos
    • Lewis, D.1
  • 4
    • 79960878565 scopus 로고    scopus 로고
    • FindU: Privacy-preserving personal profile matching in mobile social networks
    • M. Li, N. Cao, S. Yu, and W. Lou, "FindU: Privacy-preserving personal profile matching in mobile social networks, " in Proc. IEEE INFOCOM, Shanghai, China, 2011, pp. 2435-2443.
    • (2011) Proc. IEEE INFOCOM, Shanghai, China , pp. 2435-2443
    • Li, M.1    Cao, N.2    Yu, S.3    Lou, W.4
  • 6
    • 84953364314 scopus 로고    scopus 로고
    • NetSecCC: A scalable and fault-Tolerant architecture for cloud computing security
    • J. He, M. Dong, K. Ota, M. Fan, and G. Wang, "NetSecCC: A scalable and fault-Tolerant architecture for cloud computing security, " Peer-To-Peer Netw. Appl., vol. 9, no. 1, pp. 67-81, 2016.
    • (2016) Peer-To-Peer Netw. Appl. , vol.9 , Issue.1 , pp. 67-81
    • He, J.1    Dong, M.2    Ota, K.3    Fan, M.4    Wang, G.5
  • 7
    • 84925082806 scopus 로고    scopus 로고
    • Multicloud-based evacuation services for emergency management
    • Nov.
    • M. Dong, H. Li, K. Ota, L. T. Yang, and H. Zhu, "Multicloud-based evacuation services for emergency management, " IEEE Cloud Comput., vol. 1, no. 4, pp. 50-59, Nov. 2014.
    • (2014) IEEE Cloud Comput. , vol.1 , Issue.4 , pp. 50-59
    • Dong, M.1    Li, H.2    Ota, K.3    Yang, L.T.4    Zhu, H.5
  • 8
    • 84855674646 scopus 로고    scopus 로고
    • A secure handshake scheme with symptoms-matching for mHealthcare social network
    • R. Lu, X. Lin, X. Liang, and X. Shen, "A secure handshake scheme with symptoms-matching for mHealthcare social network, " Mobile Netw. Appl., vol. 16, no. 6, pp. 683-694, 2011.
    • (2011) Mobile Netw. Appl. , vol.16 , Issue.6 , pp. 683-694
    • Lu, R.1    Lin, X.2    Liang, X.3    Shen, X.4
  • 10
    • 33745160750 scopus 로고    scopus 로고
    • Privacy-preserving set operations
    • Heidelberg, Germany: Springer
    • L. Kissner and D. Song, "Privacy-preserving set operations, " in Advances in Cryptology-CRYPTO. Heidelberg, Germany: Springer, 2005, pp. 241-257.
    • (2005) Advances in Cryptology-CRYPTO , pp. 241-257
    • Kissner, L.1    Song, D.2
  • 11
    • 41549155611 scopus 로고    scopus 로고
    • Distributed private matching and set operations
    • Heidelberg, Germany: Springer
    • Q. Ye, H. Wang, and J. Pieprzyk, "Distributed private matching and set operations, " in Information Security Practice and Experience. Heidelberg, Germany: Springer, 2008, pp. 347-360.
    • (2008) Information Security Practice and Experience , pp. 347-360
    • Ye, Q.1    Wang, H.2    Pieprzyk, J.3
  • 12
    • 35048820609 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • Heidelberg, Germany: Springer
    • M. J. Freedman, K. Nissim, and B. Pinkas, "Efficient private matching and set intersection, " in Advances in Cryptology-EUROCRYPT. Heidelberg, Germany: Springer, 2004, pp. 1-19.
    • (2004) Advances in Cryptology-EUROCRYPT , pp. 1-19
    • Freedman, M.J.1    Nissim, K.2    Pinkas, B.3
  • 13
    • 77955318017 scopus 로고    scopus 로고
    • Practical private set intersection protocols with linear complexity
    • Heidelberg, Germany: Springer
    • E. De Cristofaro and G. Tsudik, "Practical private set intersection protocols with linear complexity, " in Financial Cryptography and Data Security. Heidelberg, Germany: Springer, 2010, pp. 143-159.
    • (2010) Financial Cryptography and Data Security , pp. 143-159
    • De Cristofaro, E.1    Tsudik, G.2
  • 14
    • 0041783510 scopus 로고    scopus 로고
    • Privacy-preserving data mining
    • R. Agrawal and R. Srikant, "Privacy-preserving data mining, " in ACM Sigmod Rec., vol. 29, no. 2, pp. 439-450, 2000.
    • (2000) ACM Sigmod Rec. , vol.29 , Issue.2 , pp. 439-450
    • Agrawal, R.1    Srikant, R.2
  • 15
    • 38149068986 scopus 로고    scopus 로고
    • Deterministic and efficiently searchable encryption
    • Heidelberg, Germany: Springer
    • M. Bellare, A. Boldyreva, and A. O'Neill, "Deterministic and efficiently searchable encryption, " in Advances in Cryptology-CRYPTO. Heidelberg, Germany: Springer, 2007, pp. 535-552.
    • (2007) Advances in Cryptology-CRYPTO , pp. 535-552
    • Bellare, M.1    Boldyreva, A.2    O'Neill, A.3
  • 16
    • 51849114183 scopus 로고    scopus 로고
    • On notions of security for deterministic encryption, and efficient constructions without random oracles
    • Heidelberg, Germany: Springer
    • A. Boldyreva, S. Fehr, and A. O'Neill, "On notions of security for deterministic encryption, and efficient constructions without random oracles, " in Advances in Cryptology-CRYPTO. Heidelberg, Germany: Springer, 2008, pp. 335-359.
    • (2008) Advances in Cryptology-CRYPTO , pp. 335-359
    • Boldyreva, A.1    Fehr, S.2    O'Neill, A.3
  • 20
    • 84929338540 scopus 로고    scopus 로고
    • Asymmetric social proximity based private matching protocols for online social networks
    • Jun.
    • A. Thapa, M. Li, S. Salinas, and P. Li, "Asymmetric social proximity based private matching protocols for online social networks, " IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 6, pp. 1547-1559, Jun. 2015.
    • (2015) IEEE Trans. Parallel Distrib. Syst. , vol.26 , Issue.6 , pp. 1547-1559
    • Thapa, A.1    Li, M.2    Salinas, S.3    Li, P.4
  • 21
    • 84865705618 scopus 로고    scopus 로고
    • HealthShare: Achieving secure and privacy-preserving health information sharing through health social networks
    • X. Liang, M. Barua, R. Lu, X. Lin, and X. S. Shen, "HealthShare: Achieving secure and privacy-preserving health information sharing through health social networks, " Comput. Commun., vol. 35, no. 15, pp. 1910-1920, 2012.
    • (2012) Comput. Commun. , vol.35 , Issue.15 , pp. 1910-1920
    • Liang, X.1    Barua, M.2    Lu, R.3    Lin, X.4    Shen, X.S.5
  • 22
    • 84861649075 scopus 로고    scopus 로고
    • Fine-grained private matching for proximity-based mobile social networking
    • R. Zhang, Y. Zhang, J. Sun, and G. Yan, "Fine-grained private matching for proximity-based mobile social networking, " in Proc. IEEE INFOCOM, Orlando, FL, USA, 2012, pp. 1969-1977.
    • (2012) Proc. IEEE INFOCOM, Orlando, FL, USA , pp. 1969-1977
    • Zhang, R.1    Zhang, Y.2    Sun, J.3    Yan, G.4
  • 23
    • 84883385828 scopus 로고    scopus 로고
    • Privacy-preserving profile matching for proximity-based mobile social networking
    • Sep.
    • R. Zhang, J. Zhang, Y. Zhang, J. Sun, and G. Yan, "Privacy-preserving profile matching for proximity-based mobile social networking, " IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 656-668, Sep. 2013.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.9 , pp. 656-668
    • Zhang, R.1    Zhang, J.2    Zhang, Y.3    Sun, J.4    Yan, G.5
  • 24
    • 84861959172 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for secure cloud storage
    • Feb.
    • C.Wang, S. S. Chow, Q.Wang, K. Ren, andW. Lou, "Privacy-preserving public auditing for secure cloud storage, " IEEE Trans. Comput., vol. 62, no. 2, pp. 362-375, Feb. 2013.
    • (2013) IEEE Trans. Comput. , vol.62 , Issue.2 , pp. 362-375
    • Wang, C.1    Chow, S.S.2    Wang, Q.3    Ren, K.4    Lou, W.5
  • 26
    • 84883089676 scopus 로고    scopus 로고
    • Privacy-preserving data aggregation without secure channel: Multivariate polynomial evaluation
    • T. Jung, et al., "Privacy-preserving data aggregation without secure channel: Multivariate polynomial evaluation, " in Proc. IEEE INFOCOM, Turin, Italy, 2013, pp. 2634-2642.
    • (2013) Proc. IEEE INFOCOM, Turin, Italy , pp. 2634-2642
    • Jung, T.1
  • 27
    • 85010059588 scopus 로고    scopus 로고
    • Privacy-preserving spatiotemporal matching for secure device-To-device communications
    • to be published
    • J. Sun, R. Zhang, and Y. Zhang, "Privacy-preserving spatiotemporal matching for secure device-To-device communications, " IEEE Internet Things J., to be published.
    • IEEE Internet Things J.
    • Sun, J.1    Zhang, R.2    Zhang, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.