Privacy-preserving and efficient user matching based on attribute encryption in mobile social networks

被引:0
|
作者
Wu, Lei [1 ,2 ]
Zhao, Shengnan [1 ]
Wei, Xia [1 ]
Meng, Lingzhen [1 ]
机构
[1] Shandong Normal Univ, Sch Informat Sci & Engn, Jinan, Peoples R China
[2] Shandong Prov Key Lab Novel Distributed Comp Soft, Jinan, Peoples R China
基金
中国国家自然科学基金;
关键词
Privacy-preserving techniques - Social networking (online) - User profile;
D O I
10.1002/nem.2192
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid popularity of social networking platforms, users can be matched when sharing their profiles. However, there is a risk of leakage of sensitive user information during the user matching process, which leads to the lack of user privacy protection. In this paper, we propose a privacy protection scheme based on the encryption of hidden attributes during user matching in mobile social networks, which uses linear secret sharing scheme (LSSS) as the access structure based on ciphertext policy attribute-based encryption (CP-ABE), and the match server can perform friend recommendation by completing bi-directional attribute matching determination without disclosing user attribute information. In addition, the use of selective keywords protects the privacy of requesters and publishers in selecting keywords and selecting plaintext attacks. The scheme reduces the encryption and decryption overhead for users by dividing encryption into a preparation phase and an online phase and shifting most of the decryption overhead from the requester to the match server. The experimental results show that the scheme ensures user privacy while effectively reducing communication overhead.
引用
收藏
页数:21
相关论文
共 50 条
  • [21] PUMTD: Privacy-Preserving User-Profile Matching Protocol in Social Networks
    Jianhong Zhang
    Haoting Han
    Hongwei Su
    Zhengtao Jiang
    Changgen Peng
    China Communications, 2022, 19 (06) : 77 - 90
  • [22] An Efficient Attribute Encryption Scheme with Privacy-Preserving Policy in Smart Grid
    Cheng, Jing
    Wen, Mi
    International Journal of Network Security, 2023, 25 (01): : 140 - 150
  • [23] An Efficient Privacy-Preserving Attribute-Based Encryption with Hidden Policy for Cloud Storage
    Huang, Chanying
    Wei, Songjie
    Fu, Anmin
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2019, 28 (11)
  • [24] Fine-Grained Privacy-Preserving Spatiotemporal Matching in Mobile Social Networks
    Li, Xiuguang
    Yang, Kai
    Li, Hui
    2015 International Conference on Intelligent Networking and Collaborative Systems IEEE INCoS 2015, 2015, : 374 - 378
  • [25] A Cloud Aided Privacy-Preserving Profile Matching Scheme In Mobile Social Networks
    Cheng, Qiong
    Gao, Chong-zhi
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 2, 2017, : 195 - 198
  • [26] Toward Privacy-Preserving Symptoms Matching in SDN-Based Mobile Healthcare Social Networks
    Jiang, Shunrong
    Duan, Mengjie
    Wang, Liangmin
    IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (03): : 1379 - 1388
  • [27] SymMatch:Secure and Privacy-Preserving Symptom Matching for Mobile Healthcare Social Networks
    Xing, Hui
    Chen, Cailian
    Yang, Bo
    Guan, Xinping
    2013 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP 2013), 2013,
  • [28] A user sensitive privacy-preserving location sharing system in mobile social networks
    Cheng, Wei Cherng
    Aritsugi, Masayoshi
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 18TH ANNUAL CONFERENCE, KES-2014, 2014, 35 : 1692 - 1701
  • [29] A Privacy Protection Scheme Based on Attribute Encryption in Mobile Social Networks
    Niu, Shufen
    Ge, Peng
    Mi, Song
    Su, Yun
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2023, 45 (03) : 847 - 855
  • [30] A Privacy-Preserving Attribute-Based Authentication System for Mobile Health Networks
    Guo, Linke
    Zhang, Chi
    Sun, Jinyuan
    Fang, Yuguang
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014, 13 (09) : 1927 - 1941