AN APPROACH TOWARDS EXPLOITATION OF SOCIAL COMMUNICATIONS IN MOBILE SYSTEMS

Maddali Dhanesh, Prakash Jordan Jency.J

Abstract


Social network is the networking of communications which bond the people cooperatively and comprise the flow of information connecting people, business connections. Mobile social networks as promising social communication platforms have achieved enormous attention in recent times. Privacy preservation is an important issue of research in social networking. The protection of user’s privacy is connected to their profiles and their results of profile matching. The protocols of profile matching allow the users to get hold of the results of profile matching which enclose partial information of profile and can be categorized on the basis of profiles format and the types of matching functions into three classes such as non anonymity, conditional anonymity and full anonymity.  A family of novel protocols such as profile matching approaches of explicit comparison-based with conditional anonymity which allows two users to measure up to their values of attribute on a specific attribute devoid of revealing the values to each other; implicit comparison-based the responder organizes numerous categories of messages where two messages are created for each group; and implicit predicate-based with full anonymity permits the comparisons of numerous attributes intended for profile matching  were introduced.


Keywords


Mobile social networks; Profile matching protocols; User privacy; Anonymity;

References


X. Liang, X. Li, Q. Shen, R. Lu, X. Lin, X. Shen, and W. Zhuang, “Exploiting prediction to enable secure and reliable routing in wireless body area networks,” in Proc. IEEE INFOCOM, 2012, pp. 388–396.

R. Lu, X. Lin, H. Luan, X. Liang, and X. Shen, “Pseudonym changing at social spots: An effective strategy for location privacy in vanets,” IEEE Trans. Veh. Technol., vol. 61, no. 1, pp. 86 – 96, 2011.

R. Lu, X. Lin, X. Liang, and X. Shen, “A secure handshake scheme with symptoms-matching for mhealthcare social network,” ACM Mobile Networks and Applications (MONET), vol. 16, no. 6, pp. 683–694, 2011

G. Chen and F. Rahman, “Analyzing privacy designs of mobile social networking applications,” IEEE/IFIP International Conference on Embedded

and Ubiquitous Computing, vol. 2, pp. 83–88, 2008.

R. Lu, X. Lin, and X. Shen, “Spring: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks,” in

Proc. IEEE INFOCOM, 2010, pp. 632–640.

I. Ioannidis, A. Grama, and M. J. Atallah, “A secure protocol for computing dot-products in clustered and distributed environments,” in ICPP, 2002, pp. 379–384.

E.Bulut and B.Szymanski, “Exploiting friendship relations for efficient routing in delay tolerant mobile social networks,” IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 12, pp. 2254–2265, 2012.

D. Balfanz, G. Durfee, N. Shankar, D. K. Smetters, J. Staddon, and H.-C. Wong, “Secret handshakes from pairing-based key agreements,”

in IEEE Symposium on Security and Privacy, 2003, pp. 180–196.

C. Hazay and Y. Lindell, “Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries,”

J. Cryptology, vol. 23, no. 3, pp. 422–456, 2010.

Z. Yang, B. Zhang, J. Dai, A. C. Champion, D. Xuan, and D. Li, “E-smalltalker: A distributed mobile system for social networking in physical proximity,” in ICDCS, 2010, pp. 468–477.

R. Lu, X. Liang, X. Li, X. Lin, and X. Shen, “Eppa: An efficient and privacy-preserving aggregation scheme for secure smart grid communications,” IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 9, pp. 1621– 1631, 2012.

Z. Yang, B. Zhang, J. Dai, A. C. Champion, D. Xuan, and D. Li, “E-smalltalker: A distributed mobile system for social networking in physical proximity,” in ICDCS, 2010, pp. 468–477.

D. Niyato, P.Wang, W. Saad, and A. Hjørungnes, “Controlled coalitional games for cooperative mobile social networks,” IEEE Trans. Veh. Technol., vol. 60, no. 4, pp. 1812–1824, 2011.

O. Goldreich, S. Micali, and A. Wigderson, “How to play any mental game or a completeness theorem for protocols with honest majority,” in STOC, 1987, pp. 218–229.

X. Liang, X. Li, T. H. Luan, R. Lu, X. Lin, and X. Shen, “Moralitydriven data forwarding with privacy preservation in mobile social networks,” IEEE Trans. Veh. Technol., vol. 7, no. 61, pp. 3209–3222, 2012.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2021, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.