Privacy-preserving and efficient user matching based on attribute encryption in mobile social networks

被引:0
|
作者
Wu, Lei [1 ,2 ]
Zhao, Shengnan [1 ]
Wei, Xia [1 ]
Meng, Lingzhen [1 ]
机构
[1] Shandong Normal Univ, Sch Informat Sci & Engn, Jinan, Peoples R China
[2] Shandong Prov Key Lab Novel Distributed Comp Soft, Jinan, Peoples R China
基金
中国国家自然科学基金;
关键词
Privacy-preserving techniques - Social networking (online) - User profile;
D O I
10.1002/nem.2192
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid popularity of social networking platforms, users can be matched when sharing their profiles. However, there is a risk of leakage of sensitive user information during the user matching process, which leads to the lack of user privacy protection. In this paper, we propose a privacy protection scheme based on the encryption of hidden attributes during user matching in mobile social networks, which uses linear secret sharing scheme (LSSS) as the access structure based on ciphertext policy attribute-based encryption (CP-ABE), and the match server can perform friend recommendation by completing bi-directional attribute matching determination without disclosing user attribute information. In addition, the use of selective keywords protects the privacy of requesters and publishers in selecting keywords and selecting plaintext attacks. The scheme reduces the encryption and decryption overhead for users by dividing encryption into a preparation phase and an online phase and shifting most of the decryption overhead from the requester to the match server. The experimental results show that the scheme ensures user privacy while effectively reducing communication overhead.
引用
收藏
页数:21
相关论文
共 50 条
  • [41] Privacy-Preserving Profile Matching for Proximity-Based Mobile Social Networking
    Zhang, Rui
    Zhang, Jinxue
    Zhang, Yanchao
    Sun, Jinyuan
    Yan, Guanhua
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) : 656 - 668
  • [42] Privacy-Preserving Attribute-Based Multi-keyword Search Encryption Scheme with User Tracing
    Liu, Zhenhua
    Liu, Yan
    Xu, Jing
    Wang, Baocang
    CYBERSPACE SAFETY AND SECURITY, PT II, 2019, 11983 : 382 - 397
  • [43] Novel Secure Privacy-Preserving Decentralized Attribute-Based Encryption
    Liang, Pengfei
    Zhang, Leyou
    Shang, Yujie
    FRONTIERS IN CYBER SECURITY, 2018, 879 : 66 - 80
  • [44] A privacy preserving attribute-based encryption scheme with user revocation
    Li, Jiguo
    Shi, Yuerong
    Zhang, Yichen
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (10): : 2281 - 2292
  • [45] Privacy-Preserving Digital Rights Management based on Attribute-based Encryption
    Petrlic, Ronald
    Sorge, Christoph
    2014 6TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2014,
  • [46] Efficient, Verifiable and Privacy Preserving Decentralized Attribute-Based Encryption for Mobile Cloud Computing
    Lyu, Maoxu
    Li, Xuejun
    Li, Hui
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 195 - 204
  • [47] A Novel Privacy-Preserving Group Matching Scheme in Social Networks
    Chi, Jialin
    Lv, Zhiquan
    Zhang, Min
    Li, Hao
    Hong, Cheng
    Feng, Dengguo
    WEB-AGE INFORMATION MANAGEMENT, WAIM 2014, 2014, 8485 : 336 - 347
  • [48] Gmatch: Secure and Privacy-Preserving Group Matching in Social Networks
    Wang, Boyang
    Li, Baochun
    Li, Hui
    2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 726 - 731
  • [49] Privacy-Preserving Subgraph Matching Scheme With Authentication in Social Networks
    Zuo, Xiangjian
    Li, Lixiang
    Peng, Haipeng
    Luo, Shoushan
    Yang, Yixian
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (03) : 2038 - 2049
  • [50] Efficient Attribute-Based Encryption with Privacy-Preserving Key Generation and Its Application in Industrial Cloud
    Song, Yujiao
    Wang, Hao
    Wei, Xiaochao
    Wu, Lei
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019