2017
DOI: 10.1016/j.jnca.2016.11.024
|View full text |Cite
|
Sign up to set email alerts
|

User-defined privacy location-sharing system in mobile online social networks

Abstract: With the fusion of social networks and location-based services, location sharing is one of the most important services in mobile online social networks (mOSNs). In location-sharing services, users have to provide their location information to service provider. However, location information is sensitive to users, which may cause a privacy-preserving issue needs to be solved. In the existing research, location-sharing services, such as friends' query, does not consider the attacks from friends. In fact, a user m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 70 publications
(27 citation statements)
references
References 26 publications
0
27
0
Order By: Relevance
“…In addition, the available bandwidth resources must satisfy the requirements of the S in the corresponding user request. Similar to [10,20], this paper assumes that each VNF from the same SFC needs to use different physical network nodes. Then, the number of VNFs (denoted as ‖Fs‖) should be less than the number of nodes of physical path P { } (denoted by ‖ { }‖).…”
Section: Problem Formulationmentioning
confidence: 99%
See 2 more Smart Citations
“…In addition, the available bandwidth resources must satisfy the requirements of the S in the corresponding user request. Similar to [10,20], this paper assumes that each VNF from the same SFC needs to use different physical network nodes. Then, the number of VNFs (denoted as ‖Fs‖) should be less than the number of nodes of physical path P { } (denoted by ‖ { }‖).…”
Section: Problem Formulationmentioning
confidence: 99%
“…= Algorithm 3(; ; true; max{ }); (9) → Path; (10) = ; (11) else (12) = Algorithm 3(; ; false; max{ }); (13) → Path; (14) = ; (15) end if (16) = -1;…”
Section: Algorithm Designmentioning
confidence: 99%
See 1 more Smart Citation
“…As the data accumulated, the EHRs of the patients become medical big data with high volume, which faces a lot of challenges, such as the information privacy, search, updating and sharing. It is emergent to design a privacy-preserving e-health system for the fusion of IoT and medical big data [4,5,6], which handles these challenges.…”
Section: Introductionmentioning
confidence: 99%
“…This plan is versatile and could be effortlessly embraced by different undertakings as their device to perceive the users. Sun et al (2017) depicted the issue of securing the client protection in area sharing administrations, for example, adjacent companions' inquiry and outsider's question. Another system and another inquiry calculation (UDPLS) were proposed to ensure client area protection on informal organization server and client's interpersonal organization security on area protection.…”
Section: Introduction:-mentioning
confidence: 99%