2014 IEEE International Conference on Communications (ICC) 2014
DOI: 10.1109/icc.2014.6883965
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Weight-based Private Matching for proximity-based mobile social networks

Abstract: Proximity-based mobile social networks (PMSNs) are becoming increasingly popular in recent years with the explosive growth of mobile devices, where a user can find a best matching friend in vicinity through profile matching. However, the matching process calls for the publication of users' personal information, which conflicts with users' growing privacy concerns about revealing their profiles to strangers. To achieve privacypreserving friend discovery, many schemes are proposed based on traditional cryptograp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…Various solutions have been proposed in recent years [1,7,8,9,13,14] to address the issues of preserving privacy while matching users. These solutions all assume the user has multiple interests chosen from a public set of defined interests.…”
Section: Related Wordmentioning
confidence: 99%
See 1 more Smart Citation
“…Various solutions have been proposed in recent years [1,7,8,9,13,14] to address the issues of preserving privacy while matching users. These solutions all assume the user has multiple interests chosen from a public set of defined interests.…”
Section: Related Wordmentioning
confidence: 99%
“…Different from [10] our work does not rely on third-party matching or computationally expensive encryption algorithms. Also, we ensure differential privacy for users data, which [8] and [14] suffer from as well. Our results show relatively accurate matching, compared to the ambiguous results of [8].…”
Section: Comparison Of Our Solution To Related Workmentioning
confidence: 99%
“…mul 1 , mul 2 , exp 1 and exp 2 denote one 1024-bit multiplication, 2048-bit multiplication, 1024-bit exponentiation, and 2048bit exponentiation, respectively. We assume that the public attribute set in our scheme has n interests, each user has n p attributes, and n c (n c ≤ n p )common attributes and the highest corresponding weight value is l. As shown in Table-I, we compare our scheme with Fine-grained [15], WAS [16], EWPM Level − I privacy [18], EWPM Level − II privacy [18] and two-party scheme of [17]. From Table-I, it is obvious that our scheme significantly reduces computation and communication costs, especially in terms of the online computation cost which directly effects system performance.…”
Section: A Complexity Analysismentioning
confidence: 99%
“…Unfortunately, too much communication and computation overhead is introduced in their paper. Considering the tremendous overhead caused by traditional cryptographic methods, Zhu et al [18] proposed an efficient confusion matrix transformation algorithm to achieve secure and efficient matching. In their scheme, however, users can only order the attributes and the corresponding attribute values for each attribute in the public set to construct the confusion matrix, regardless of whether they have attribute or attribute value, which causes extra communication overhead.…”
Section: Introductionmentioning
confidence: 99%
“…As shown in [2], the protocol is much faster than publickey based protocols using homomorphic encryption. Since then, this protocol has been and is still used in many privacy-preserving solutions, e.g., [3], [4], [5], [6], [7], [8], [9], [10], [11], [12], [13], [14], [15], [16], [17], [18], [19], [20], including support vector machines [17], facial expression classification [9], medical pre-diagnosis [18], and speaker verification [10], [11].…”
Section: Introductionmentioning
confidence: 99%