移動(dòng)社交網(wǎng)絡(luò)中一種朋友發(fā)現(xiàn)的隱私安全保護(hù)策略
doi: 10.11999/JEIT151479 cstr: 32379.14.JEIT151479
國(guó)家自然科學(xué)基金(61472451, 61402543, 61272151, 61502163),湖南省教育廳科研項(xiàng)目(2015C0589),中南大學(xué)中央高?;究蒲袠I(yè)務(wù)費(fèi)專項(xiàng)資金(2016zzts060, 2016zzts058)
A Novel Friends Matching Privacy Preserving Strategy in Mobile Social Networks
The National Nature Science Foundation of China (61472451, 61402543, 61272151, 61502163), The Project of Hunan Provincial Education Department (2015C0589), The Fundamental Research Funds for the Central Universities of Central South University (2016zzts060, 2016zzts058)
-
摘要: 在移動(dòng)社交網(wǎng)絡(luò)中分享用戶特征屬性配置文件能夠迅速找到與用戶特征屬性相同的朋友。然而,配置文件通常包含用戶的敏感隱私信息,如果被惡意攻擊者截獲將有可能造成不可預(yù)計(jì)的后果。該文提出一種基于用戶偽身份匿名與哈希值比對(duì)認(rèn)證的雙重握手機(jī)制的隱私保護(hù)方案,結(jié)合身份權(quán)限認(rèn)證、單向哈希散列函數(shù)、密鑰協(xié)商等技術(shù)保證惡意攻擊者無(wú)法通過(guò)身份欺騙、偽造特征屬性、竊聽(tīng)安全信道等方式獲取用戶配置文件的真實(shí)內(nèi)容,從而保證用戶的個(gè)人隱私不被泄漏。依靠可信第三方服務(wù)器強(qiáng)大的計(jì)算和抗攻擊能力, 減輕智能用戶終端計(jì)算負(fù)擔(dān)和安全風(fēng)險(xiǎn)。安全分析和實(shí)驗(yàn)分析表明,該方案更具有隱私性、消息不可抵賴性和可驗(yàn)證性,比傳統(tǒng)的解決方案更有效。
-
關(guān)鍵詞:
- 移動(dòng)社交網(wǎng)絡(luò) /
- 隱私保護(hù) /
- 個(gè)人特征屬性配置文件 /
- 屬性匹配 /
- 可信第三方
Abstract: In mobile social networks, people can quickly find potential friends with the same attributes by sharing personal attribute profile. These attribute profiles, however, usually contain sensitive information, if this information gets intercepted by malicious attackers it may result in unpredictable consequences. In this paper, a dual handshake privacy-preserving scheme is proposed based on user pseudo identity anonymous and hash value authentication, which is combined with identity authentication, one-way hash function and key agreement to ensure that malicious attackers can not get the real content of personal profile by identity fraud, attribute forgery, hacking security attributes and eavesdrop secure channel, thus the personal privacy can be protected. At the same time, the scheme relies on the powerful computing and anti-attack ability to trusted third party to reduce the computation cost of the intelligent terminal and security risks. Security and performance analysis demonstrates that this scheme is of high privacy, non-repudiation and verifiability and is more effective than existing solutions. -
LI M, CAO N, Yu S, et al. Findu: privacy-preserving personal profile matching in mobile social networks[C]. Proceedings of INFOCOM, Shanghai, China, 2011: 2435-2443. doi: 10.1109 /INFCOM.2011.5935065. ZHANG Rui, ZHANG Jinxue, Zhang Yanchao, et al. Privacy- preserving profile matching for proximity-based mobile social networking[J]. IEEE Journal on Selected Areas in Communications, 2013, 31(9): 656-668. doi: 10.1109/JSAC. 2013.SUP.0513057.[2] JIANG W, WU J, WANG G, et al. Forming opinions via trusted friends: Time-evolving rating prediction using fluid dynamics[J]. IEEE Transactions on Computers, 2016: 65(4): 1211-1224. doi: 10.1109/TC.2015.2446842. WEI D, VACHA D, ZHANG Y, et al. Secure friend discovery in mobile social networks[C]. Proceedings of INFOCOM, Shanghai, China, 2011: 1647-1655. doi: 10.1109/INFCOM. 2011.5934958. NIU B, ZHU X, LIU J, et al. Weight-aware private matching scheme for proximity-based mobile social networks[C]. IEEE Global Communications Conference Exhibition Industry Forum, Atlanta, USA, 2013: 3170-3175. doi: 10.1109/ GLOCOM.2013.6831559. ZHANG Lan, LI Xiangyang, LIU Kebin, et al. Message in a sealed bottle: privacy preserving friending in mobile social networks[J]. IEEE Transactions on Mobile Computing, 2015, 14(9): 1888-1902. doi: 10.1109/TMC.2014.2366773. ZHU X, LIU J, JIANG S, et al. Efficient weight-based private matching for proximity-based mobile social networks[C]. 2014 IEEE International Conference on Communications, Sydney, Australia, 2014: 4114-4119. doi: 10.1109/ICC.2014.6883965. CAO Ning, WANG Cong, Li Ming, et al. Privacy- preserving multi-keyword ranked search over encrypted cloud data[J]. IEEE Transactions on Parallel Distributed Systems, 2014, 25(1): 222-233. doi: 10.1109/TPDS.2013.45. GUO Linke, ZHANG Chi, and SUN Jinyuan. A privacy-preserving attribute-based authentication system for mobile health networks[J]. IEEE Transactions on Mobile Computing, 2014, 13(9): 1927-1941. doi: 10.1109/TMC. 2013.84. ZHU Haojin, DU Suguo, LI Muyuan, et al. Fairness-aware and privacy-preserving friend matching protocol in mobile social networks[J]. IEEE Transactions on Emerging Topics in Computing, 2013, 1(1): 192-200. doi: 10.1109/TETC.2013. 2279541. 霍崢, 孟小峰, 黃毅. PrivateCheckIn: 一種移動(dòng)社交網(wǎng)絡(luò)中的軌跡隱私保護(hù)方法[J]. 計(jì)算機(jī)學(xué)報(bào), 2013, 36(4): 716-726. doi: 10.3724/SP.J.1016.2013.00716. HUO Zheng, MENG Xiaofeng, and HUANG Yi. Private CheckIn: Trajectory privacy-preserving for check-in services in MSNS[J]. Chinese Journal of Computers, 2013, 36(4): 716-726. doi: 10.3724/SP.J.1016.2013.00716. KANTARCIOGLU M and CLIFTON C. Privacy-preserving distributed mining of association rules on horizontally partitioned data[J]. IEEE Transactions on Knowledge Data Engineering, 2004, 16(9): 1026-1037. doi: 10.1109/TKDE. 2004.45. CHOW S M, He Y J, Hui L C K, et al. Spicesimple privacy-preserving identity-management for cloud environment[C]. Applied Cryptography and Network Security, Berlin Heidelberg, Germany, 2012: 526-543. [13] doi: 10.1007/ 978-3-642-31284-7_31. LINDELL Y and PINKAS B. An efficient protocol for secure two-party computation in the presence of malicious adversaries[J]. Journal of Cryptology, 2015, 28(2): 312-350. doi: 10.1007/s00145-014-9177-x. HAZAY C and TOFT T. Computationally secure pattern matching in the presence of malicious adversaries[J]. Journal of Cryptology, 2014, 27(2): 358-395. doi: 10.1007/s00145- 013-9147-8. 張玉磊, 王歡, 李臣意, 等. 可證安全的緊致無(wú)證書(shū)聚合簽名方案[J]. 電子與信息學(xué)報(bào), 2015, 37(12): 2838-2843. doi: 10.11999/JEIT150407. ZHANG Yulei, WANG Huan, LI Chenyi, et al. Provable secure and compact certificateless aggregate signcryption scheme[J]. Journal of Electronics Information Technology, 2015, 37(12): 2838-2843. doi: 10.11999/JEIT150407. FREEDMAN M J, NISSIM K, and PINKAS B. Efficient private matching and set intersection[C]. Advances in Cryptology- EUROCRYPT, Berlin Heidelberg, Germany, 2004: 1-19. doi: 10.1007/978-3-540-24676-3_1. LUO Entao, LIU Qin, and WANG Guojun. NMHP: a privacy preserving profile matching protocol in multi-hop proximity mobile social networks[C]. International Conference on Algorithms and Architectures for Parallel Processing, Zhangjiajie, China, 2015: 463-474. doi: 10.1007/978-3-319- 27137-8_34. -
計(jì)量
- 文章訪問(wèn)數(shù): 1601
- HTML全文瀏覽量: 166
- PDF下載量: 485
- 被引次數(shù): 0