Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








28,967 Hits in 3.4 sec

Secure friend discovery in mobile social networks

Wei Dong, Vacha Dave, Lili Qiu, Yin Zhang
2011 2011 Proceedings IEEE INFOCOM  
To address these concerns, in this paper we develop novel techniques and protocols to compute social proximity between two users to discover potential friends, which is an essential task for mobile social  ...  Second, we develop a novel solution for secure proximity estimation, which allows users to identify potential friends by computing social proximity in a privacy-preserving manner.  ...  To address the challenge, we develop novel techniques and protocols for computing proximity in a privacy-preserving, verifiable, and efficient manner.  ... 
doi:10.1109/infcom.2011.5934958 dblp:conf/infocom/DongDQZ11 fatcat:w2otung3cfhxrhsjd5s2ouqrgm

Secured Friending in Proximity based Mobile Social Network

Y Vidya, B Shemimol
2015 Journal of excellence in Computer Science and Engineering  
In recent days there is a tremendous rise in the need of proximity based mobile social networks.  ...  Evaluation using real data and actual implementation shows that this mechanism improves security and is privacy preserving, verifiable and efficient.  ...  Proximity based mobile social network refers to the interaction among people in the nearby proximity within a WIFI or bluetooth connection.  ... 
doi:10.18831/djcse.in/2015021001 fatcat:s6zpfp7emjfw5ncbabv4mstape

For your phone only: custom protocols for efficient secure function evaluation on mobile devices

Henry Carter, Chaitrali Amrutkar, Italo Dacosta, Patrick Traynor
2013 Security and Communication Networks  
Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching data sources, gathering and maintaining  ...  Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden to  ...  Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright notation thereon.  ... 
doi:10.1002/sec.851 fatcat:vn2ueq6kzvgojj7zdbckamcxuy

Do I know you?

Marcin Nagy, Emiliano De Cristofaro, Alexandra Dmitrienko, N. Asokan, Ahmad-Reza Sadeghi
2013 Proceedings of the 29th Annual Computer Security Applications Conference on - ACSAC '13  
., to enforce access control based on users' social proximity in a privacy-preserving manner.  ...  The increasing penetration of Online Social Networks (OSNs) prompts the need for effectively accessing and utilizing social networking information.  ...  , and Mark Manulis and Bertram Poettering for their fruitful collaboration.  ... 
doi:10.1145/2523649.2523668 dblp:conf/acsac/NagyCDAS13 fatcat:5uijn5tk2vcpfmccvxdzrai56e

Efficient Revocation of Untrusted User in Identity based Cloud Storage System for Shared Big Data

Manjunatha B S
2019 International Journal for Research in Applied Science and Engineering Technology  
This is achieved by generating a key and a new private key update technique.  ...  Using this technique, user revocation is realized by just updating the non-revoked group users' private keys rather than authenticators of the revoked user.  ...  CONCLUSION In this study , we propose an identity-based cloud storage auditing scheme for shared data, which supports real efficient user revocation.  ... 
doi:10.22214/ijraset.2019.6255 fatcat:ro5kqizrfrb5jgpmfj5wxbkud4

Solitude Adaptable User Profile Matching for Mobile Social Cloud Networks

M. Gobi
2022 International Journal of Computer Networks And Applications  
(Ho-En) technique for multiple recipients.  ...  Initially, it ensures verifiability, ensuring that no participant may deceive the initiator by providing an incorrect matching result.  ...  [26] presented a Verifiable Private Interactive technique to achieve Fine-grained PM (VPI-FPM).  ... 
doi:10.22247/ijcna/2022/214506 fatcat:3wgvf3kghba75g37k5t7ktbgly

Message in a Sealed Bottle: Privacy Preserving Friending in Social Networks

Lan Zhang, Xiang-Yang Li, Yunhao Liu
2013 2013 IEEE 33rd International Conference on Distributed Computing Systems  
Many proximity-based mobile social networks are developed to facilitate connections between any two people, or to help a user to find people with a matched profile within a certain distance.  ...  Extensive evaluations using real social network data, and actual system implementation on smart phones show that our mechanisms are significantly more efficient than existing solutions.  ...  The second category measures the social proximity by private vector dot product [7] , [9] , [25] .  ... 
doi:10.1109/icdcs.2013.38 dblp:conf/icdcs/ZhangLL13 fatcat:4mmycpnvnbeu7pk2yh6vbyw6gu

Message in a Sealed Bottle: Privacy Preserving Friending in Mobile Social Networks

Lan Zhang, Xiang-Yang Li, Kebin Liu, Taeho Jung, Yunhao Liu
2015 IEEE Transactions on Mobile Computing  
Many proximity-based mobile social networks are developed to facilitate connections between any two people, or to help a user to find people with a matched profile within a certain distance.  ...  Extensive evaluations using real social network data, and actual system implementation on smart phones show that our mechanisms are significantly more efficient than existing solutions.  ...  The second category considers a user's profile as a vector and measures the social proximity by private vector dot product [6] , [10] , [35] .  ... 
doi:10.1109/tmc.2014.2366773 fatcat:dxfkhvg76vcbfhvwr6z2xbtbla

Private discovery of common social contacts

Emiliano De Cristofaro, Mark Manulis, Bertram Poettering
2012 International Journal of Information Security  
One common problem occurs when two unfamiliar users, in the process of establishing social relationships, want to assess their social proximity by discovering mutual contacts.  ...  The increasing use of computing devices for social interactions propels the proliferation of online social applications, yet, it prompts a number of privacy concerns.  ...  Introduction The increasing volume of electronic social interactions motivates the need for efficient privacyenhancing techniques.  ... 
doi:10.1007/s10207-012-0183-4 fatcat:qrlzg5vi55avbpgsa3g24ejbiu

Private Discovery of Common Social Contacts [chapter]

Emiliano De Cristofaro, Mark Manulis, Bertram Poettering
2011 Lecture Notes in Computer Science  
One common problem occurs when two unfamiliar users, in the process of establishing social relationships, want to assess their social proximity by discovering mutual contacts.  ...  The increasing use of computing devices for social interactions propels the proliferation of online social applications, yet, it prompts a number of privacy concerns.  ...  Introduction The increasing volume of electronic social interactions motivates the need for efficient privacyenhancing techniques.  ... 
doi:10.1007/978-3-642-21554-4_9 fatcat:bm3cxktzfzf7lllb7ntcn6ui24

A Survey on User's Location Detail Privacy-Preserving Models

M. B. Rajashekar, S. Meenakshi Sundaram
2020 SN Computer Science  
When users want to use social networks, they worry about preserving their privacy. Users normally prefer to maintain their location secure and safe in social networks for many privacy reasons.  ...  In this paper, we present different techniques that are used to protect location privacy of the users. Also it helps us to select an appropriate technique to protect location information of the user.  ...  This article is part of the topical collection "Advances in Computational Approaches for Artificial Intelligence, Image Processing, IoT and Cloud Applications" guest edited by Bhanu Prakash K N and M.  ... 
doi:10.1007/s42979-020-00178-z fatcat:lb35kpnyfngdjhcelbo6uwfhcq

Towards Secure and Practical Location Privacy through Private Equality Testing [chapter]

Emmanouil Magkos, Panayiotis Kotzanikolaou, Marios Magioladitis, Spyros Sioutas, Vassilios S. Verykios
2014 Lecture Notes in Computer Science  
In this paper we deal with private proximity testing in social LBS queries (i.e., Buddy-finder SNSs).  ...  Finally, we describe how we could use our primitive as a building block for a proximity testing buddy-finder service for social networks.  ...  The authors would like to thank Constantinos Patsakis for indicating an attack in an early version of the PET protocol.  ... 
doi:10.1007/978-3-319-11257-2_24 fatcat:eyifeqlxjfchpp23pibe346jvq

Fairness-Aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks

Haojin Zhu, Suguo Du, Muyuan Li, Zhaoyu Gao
2013 IEEE Transactions on Emerging Topics in Computing  
Mobile social networks represent a promising cyber-physical system, which connects mobile nodes within a local physical proximity using mobile smart phones as well as wireless communication.  ...  The detailed security analysis as well as real-world implementations demonstrate the effectiveness and efficiency of the proposed protocol.  ...  Further, to thwart runaway attack, we introduce a lightweight verifier checking technique, which enables the verifier to check the matching at the minimized overhead and prevent any participant from launching  ... 
doi:10.1109/tetc.2013.2279541 fatcat:evrab3jg25h3hfh5f3yd2fus2q

Privacy-preserving Attribute Matchmaking in Proximity-based Mobile Social Networks

Solomon Sarpong, Chunxiang Xu
2015 International Journal of Security and Its Applications  
The major impediments that mostly arise in matchmaking in mobile social networks are ensuring the privacy of users' attributes, finding the intersection of attributes of the matched-pair without revealing  ...  The increasing dependence on anytime-anywhere availability of information and the commensurate increasing fear of losing privacy motivate the need for privacy-preserving techniques in mobile social networks  ...  The main contribution of this research is to formulate a novel hybrid proximity-based matchmaking protocol that is privacypreserving, efficient and secure against malicious attacks.  ... 
doi:10.14257/ijsia.2015.9.5.22 fatcat:uhohipwixvghxm7vwslccxzgse

Message in a Sealed Bottle: Privacy Preserving Friending in Social Networks [article]

Lan Zhang, Xiang-Yang Li
2012 arXiv   pre-print
Our rigorous analysis shows that our mechanism is secure, privacy-preserving, verifiable, and efficient both in communication and computation.  ...  Many proximity-based mobile social networks are developed to facilitate connections between any two people, or to help a user to find people with matched profile within a certain distance.  ...  And there lack efficient methods to verify the result.  ... 
arXiv:1207.7199v1 fatcat:t3pharzujvhkhlphlycs36lp2i
« Previous Showing results 1 — 15 out of 28,967 results