Download Security and privacy in mobile social networks by Xiaohui Liang, Rongxing Lu, Visit Amazon's Xiaodong Lin PDF

By Xiaohui Liang, Rongxing Lu, Visit Amazon's Xiaodong Lin Page, search results, Learn about Author Central, Xiaodong Lin, , Xuemin Shen

This publication makes a speciality of 3 rising study subject matters in cellular social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative information forwarding (PDF) protocols, and reliable carrier assessment (TSE) platforms. The PPM is helping clients evaluate their own profiles with out disclosing the profiles. The PDF is helping clients ahead information to their acquaintances through a number of cooperative relay friends whereas conserving their identification and site privateness. The TSE permits clients to in the community percentage carrier stories at the proprietors such that clients obtain extra helpful information regarding the providers not just from proprietors but in addition from their depended on social associates. The authors tackle either theoretic and useful facets of those subject matters by means of introducing the procedure version, reviewing the similar works, and providing the strategies. protection and privateness for cellular Social Networks additional presents the safety research and the functionality evaluate according to real-trace simulations. It additionally summarizes the longer term study instructions for this swiftly turning out to be region of study. The booklet may be worthwhile for researchers and practitioners who paintings with cellular social networks, communique systems, instant communique ideas, and net applications.

"Suitable for any form of reader as an creation to the topic... The chapters are good prompted and presented... it is suggested for researchers." -ACM Computing experiences, 21 July 2014

Show description

Read Online or Download Security and privacy in mobile social networks PDF

Similar network security books

Cisco Secure Intrusion Detection System

Enforce an around-the-clock community surveillance method with a certified self-study consultant * presents a finished reference for the layout, deployment, and administration of the Cisco safe Intrusion Detection approach * comprehend the elemental thoughts of community defense and the Cisco protection Wheel * find out about the idea that of intrusion detection, the philosophy at the back of quite a few IDSs, and the main parts of the CSIDS * review CSIDS Sensor deployment by utilizing either 4200 sequence Sensors and Catalyst 6000 IDS modules to figure out the place to put sensors on your community * set up and configure CSPM as a Director platform to control your CSIDS Sensors and study alarm details * learn the multitude of signatures supported via CSIDS and know the way to successfully deal with CSIDS alarms * Configure the most important positive factors of CSIDS, together with IP blockading, sensor configuration, and signature filtering * set up and configure the Cisco safe identity Director platform, the configuration administration software, and the Cisco IOS Firewall IDS * learn function updates and function improvements deliberate for the Cisco safe IDS product lineOrganizations proceed to set up firewalls as their crucial gatekeepers to avoid unauthorized clients from coming into their networks.

The E-Privacy Imperative: Protect Your Customers' Internet Privacy and Ensure Your Company's Survival in the Electronic Age

Merkow, an e-commerce protection consultant with an international monetary companies corporation, and Breithaupt, a venture supervisor with a brokerage company, supply recommendations and strategies for firms with an online presence wishing to guard their very own and their buyers' privateness. They inform easy methods to layout and enforce a privateness coverage and the way to speak guidelines to shoppers.

IP Address Management Principles and Practice (IEEE Press Series on Network Management)

This booklet may be the first masking the topic of IP handle administration (IPAM). The perform of IPAM comprises the appliance of community administration disciplines to IP tackle house and linked community prone, particularly DHCP (Dynamic Host Configuration Protocol) and DNS (Domain identify System). The final result of inaccurately configuring DHCP is that finish clients will not be capable of receive IP addresses to entry the community.

Security and privacy in mobile social networks

This publication makes a speciality of 3 rising learn subject matters in cellular social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative information forwarding (PDF) protocols, and reliable provider evaluate (TSE) structures. The PPM is helping clients evaluate their own profiles with no disclosing the profiles.

Extra info for Security and privacy in mobile social networks

Sample text

Proximity measurement, 3. Morality-driven data forwarding. In the first step, the privacy-preserving route-based authentication enables two encountered users to exchange partial route information. The route information can be constructed in a privacy-preserving structure determined by users themselves. , users have to honestly tell about their hotspots. In the second step, each user measures a proximity score between the destination and the route information provided by the relay user. The proximity score reflects the forwarding capability of a relay node with respect to a specific destination.

2l/c l Ä p=2. p 1/=2. vi;x vj;x / < p. p C 1/=2, ui is able to know whether vi;x > vj;x , vi;x D vj;x , or vi;x < vj;x . 2 (Anonymity). The eCPM does not disclose the attribute values of participating users. Proof. The initiator ui who starts the protocol for attribute ax encrypts its attribute value vi;x using its homomorphic public key pki . Thus, the responder uj is unable to know any information about vi;x . vi;x vj;x / to ui , where ' is a random factor added for anonymity. vi;x vj;x //. l 1/ and l 1 from ui ’s view, and the exact value of vj;x is thus protected.

In the third step, ui decrypts these n ciphertexts and finds n secret shares of s1;y and s0;y . uj finally can obtain s1;y or s0;y from the secret shares. The iPPM is obtained by combining the iCPM with a secret sharing scheme [81] to support a predicate matching. The initiator ui sends its attribute values corresponding to the attributes in A to the responder uj . Without loss of generality, we assume A D fa1 ; ; an g. vi;x ; opt; vj;x /jax 2 Ag", where the comparison operator opt is either > or < and tN Ä n.

Download PDF sample

Rated 4.97 of 5 – based on 12 votes