
浏览全部资源
扫码关注微信
1. 广州大学计算机科学与网络工程学院,广东 广州 510006
2. 湖南科技学院信息工程学院,湖南 永州 425000
3. 福建师范大学计算机与网络空间安全学院,福建 福州 350117
4. 桂林电子科技大学计算机与信息安全学院,广西 桂林 541000
5. 挪威科技大学计算机科学学院,挪威 约维克 2815
Online First:2022-11,
Published:25 November 2022
移动端阅览
Tao PENG, Wentao ZHONG, Guojun WANG, et al. Privacy-preserving precise profile matching in mobile social network[J]. Journal on Communications, 2022, 43(11): 90-103.
Tao PENG, Wentao ZHONG, Guojun WANG, et al. Privacy-preserving precise profile matching in mobile social network[J]. Journal on Communications, 2022, 43(11): 90-103. DOI: 10.11959/j.issn.1000-436x.2022208.
好友匹配通过比较用户间属性相似度向交友请求者推荐好友,是移动社交网络应用中的核心功能。然而,在好友匹配的过程中,用户个人信息很可能会被服务器或者其他恶意用户窃取导致隐私泄露,且现有方案存在匹配结果不精确或者无法满足用户多维度隐私保护需求等挑战。基于此,提出面向隐私保护的精确好友匹配(P3M)方案,查询者可以根据自身需求灵活设定特征属性和距离的匹配范围。利用可比较内积编码(CIPE)和Paillier加密算法对用户属性和查询范围进行编码和加密,并设计安全点积协议实现用户属性和查询范围的安全比较。相较于现有方案, P3M 方案支持查询者自定义查询范围以获得精确的查询结果,综合考虑用户特征属性及位置属性等多维度的隐私保护。最后,对P3M的正确性和安全性进行详细分析和证明,并通过实验验证P3M方案的有效性和高效性。
Profile matching is a key feature in mobile social networking applications
where friends are recommended to requesters by comparing the similarity of attributes between them.However
users’ personal information is exposed to the risk of privacy disclosure in the process of profile matching.The existing solutions exist some issues such as inaccurate matching results or inability to meet users’ requirements for multi-dimensional privacy protection.Baesed on this
a privacy-preserving precise profile matching (P3M) scheme was proposed
which allowed users to flexibly set the matching range of attributes and distances according to their requirements.The Paillier encryption was utilized to ensure data security of users
and a secure dot product protocol was designed to achieve secure ciphertext comparison of user attributes and query ranges.The P3M realized multi-dimensional privacy-preserving of users including user feature attributes and location attributes.Finally
the correctness and security of P3M scheme were analyzed and proved in detail
and extensive experimental results verified the effectiveness and efficiency of P3M scheme.
FREEDMAN M J , HAZAY C , NISSIM K , et al . Efficient set intersection with simulation-based security [J ] . Journal of Cryptology , 2016 , 29 ( 1 ): 115 - 155 .
GAO C Z , CHENG Q , LI X , et al . Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network [J ] . Cluster Computing , 2019 , 22 ( 1 ): 1655 - 1663 .
ATENIESE G , FRANCATI D , NUÑEZ D , , et al . Match me if you can:matchmaking encryption and its applications [J ] . Journal of Cryptology , 2021 , 34 ( 3 ): 1 - 50 .
YI X , BERTINO E , RAO F Y , et al . Privacy-preserving user profile matching in social networks [J ] . IEEE Transactions on Knowledge and Data Engineering , 2020 , 32 ( 8 ): 1572 - 1585 .
LIU Q , WU S X , PEI S Y , et al . Secure and efficient multi-attribute range queries based on comparable inner product encoding [C ] // Proceedings of 2018 IEEE Conference on Communications and Network Security . Piscataway:IEEE Press , 2018 : 1 - 9 .
AGRAWAL R , EVFIMIEVSKI A , SRIKANT R . Information sharing across private databases [C ] // Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data . New York:ACM Press , 2003 : 86 - 97 .
VON ARB M , BADER M , KUHN M , et al . VENETA:serverless friend-of-friend detection in mobile social networking [C ] // Proceedings of 2008 IEEE International Conference on Wireless and Mobile Computing,Networking and Communications . Piscataway:IEEE Press , 2008 : 184 - 189 .
MAHMOUD M , RABIEH K , SHERIF A , et al . Privacy-preserving fine-grained data retrieval schemes for mobile social networks [J ] . IEEE Transactions on Dependable and Secure Computing , 2019 , 16 ( 5 ): 871 - 884 .
LUO E T , GUO K H , TANG Y Y , et al . Hidden the true identity and dating characteristics based on quick private matching in mobile social networks [J ] . Future Generation Computer Systems , 2020 , 109 : 633 - 641 .
SHEN H J , ZHOU J , CAO Z F , et al . Blockchain-based lightweight certificate authority for efficient privacy-preserving location-based service in vehicular social networks [J ] . IEEE Internet of Things Journal , 2020 , 7 ( 7 ): 6610 - 6622 .
LI J , ZENG F Z , XIAO Z , et al . Drive2friends:inferring social relationships from individual vehicle mobility data [J ] . IEEE Internet of Things Journal , 2020 , 7 ( 6 ): 5116 - 5127 .
PENG T , LIU Q , WANG G J , et al . Multidimensional privacy preservation in location-based services [J ] . Future Generation Computer Systems , 2019 , 93 : 312 - 326 .
LIU Q , HOU P L , WANG G J , et al . Intelligent route planning on large road networks with efficiency and privacy [J ] . Journal of Parallel and Distributed Computing , 2019 , 133 : 93 - 106 .
LIU Q , PENG Y , WU J , et al . Secure multi-keyword fuzzy searches with enhanced service quality in cloud computing [J ] . IEEE Transactions on Network and Service Management , 2021 , 18 ( 2 ): 2046 - 2062 .
LIU Q , PENG Y , PEI S Y , et al . Prime inner product encoding for effective wildcard-based multi-keyword fuzzy search [J ] . IEEE Transactions on Services Computing , 2022 , 15 ( 4 ): 1799 - 1812 .
李宇溪 , 周福才 , 徐紫枫 . 支持K-近邻搜索的移动社交网络隐私保护方案 [J ] . 计算机学报 , 2021 , 44 ( 7 ): 1481 - 1500 .
LI Y X , ZHOU F C , XU Z F . Privacy preserving K-nearest-neighbor search over mobile social network [J ] . Chinese Journal of Computers , 2021 , 44 ( 7 ): 1481 - 1500 .
崔炜荣 , 杜承烈 . 社交网络中基于CP-ABE的隐私保护属性匹配方法 [J ] . 计算机应用 , 2018 , 38 ( 4 ): 1051 - 1057 .
CUI W R , DU C L . Privacy preserving attribute matching method based on CP-ABE in social networks [J ] . Journal of Computer Applications , 2018 , 38 ( 4 ): 1051 - 1057 .
LUO E T , LIU Q , ABAWAJY J H , et al . Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks [J ] . Future Generation Computer Systems , 2017 , 68 : 222 - 233 .
SAMANTHULA B K , ELMEHDWI Y , HOWSER G , et al . A secure data sharing and query processing framework via federation of cloud computing [J ] . Information Systems , 2015 , 48 : 196 - 212 .
XU G Q , LIU B Y , JIAO L T , et al . Trust2Privacy:a novel fuzzy trust-to-privacy mechanism for mobile social networks [J ] . IEEE Wireless Communications , 2020 , 27 ( 3 ): 72 - 78 .
LI F H , HE Y Y , NIU B , et al . Small-world:secure friend matching over physical world and social networks [J ] . Information Sciences , 2017 , 387 : 205 - 220 .
ZHANG L , LI X Y , LIU K B , et al . Message in a sealed bottle:privacy preserving friending in mobile social networks [J ] . IEEE Transactions on Mobile Computing , 2014 , 14 ( 9 ): 1888 - 1902 .
PENG T , GUAN K , LIU J , et al . A blockchain-based mobile crowdsensing scheme with enhanced privacy [J ] . Concurrency and Computation:Practice and Experience , 2021 :doi.org/10.1002/cpe.6664.
PENG T , GUAN K , LIU J . A privacy-preserving mobile crowdsensing scheme based on blockchain and trusted execution environment [J ] . The IEICE Transactions on Information and Systems,2021:doi.org/10.1587/transinf . 2021 BCP0001.
DING X F , WANG Z , ZHOU P , et al . Efficient and privacy-preserving multi-party skyline queries over encrypted data [J ] . IEEE Transactions on Information Forensics and Security , 2021 , 16 : 4589 - 4604 .
LIU L , CHEN R M , LIU X M , et al . Towards practical privacy-preserving decision tree training and evaluation in the cloud [J ] . IEEE Transactions on Information Forensics and Security , 2020 , 15 : 2914 - 2929 .
PENG T , LIU Q , MENG D , et al . Collaborative trajectory privacy preserving scheme in location-based services [J ] . Information Sciences , 2017 , 387 : 165 - 179 .
LIU Q , TIAN Y , WU J , et al . Enabling verifiable and dynamic ranked search over outsourced data [J ] . IEEE Transactions on Services Computing , 2022 , 15 ( 1 ): 69 - 82 .
WANG J . Encyclopedia of data warehousing and mining [M ] . Hershey : IGI Global , 2005 .
0
Views
2155
下载量
0
CSCD
Publicity Resources
Related Articles
Related Author
Related Institution
京公网安备11010802024621