Prism: Privacy-Aware Interest Sharing and Matching in Social Networks

被引:0
作者
Priya, Shanmuga K. [1 ]
Sankari, Siva S. [1 ]
Krithikka, Udaya G. [1 ]
Veeralakshmi, M. [1 ]
Yogalaxmi, K. N. [1 ]
机构
[1] K Ramakrishnan Coll Technol, Dept CSE, Trichy, Tamil Nadu, India
来源
BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS | 2020年 / 13卷 / 04期
关键词
MOBILE SOCIAL NETWORKS; INTERESTS; PROFILE IN SHAPE-MAKING; PRIVACY;
D O I
暂无
中图分类号
Q81 [生物工程学(生物技术)]; Q93 [微生物学];
学科分类号
071005 ; 0836 ; 090102 ; 100705 ;
摘要
Social networking services use profile matching to help users find friends with comparable characteristics, including entertainment, location, historical background, and more. But privacy concerns often prevent customers from simplifying the process. In a social network, customers face the threat of hacking, leakage or disclosure of the confidentiality of their personal data nearby. The proposed method, the Protocol for mapping the sharing of information on confidentiality, allows customers to maintain a healthy interest in others without revealing their true interests and profile. Therefore, common goals should be considered in such a way as to protect privacy. PRISM allows customers to find mutual benefits without revealing their games. Unlike current practice, PRISM is not required to display server-based entertainment. Moreover, the protocol can deal with situations that have not been discussed before, and provides a powerful solution. Using an attacker reveals the underlying mechanism of any duplication attempt. To control the risk of disclosure of confidentiality, only the minimum interest attribute of the user excludes the actual profile attributes. It is free and prevents customers from hacking a profile.
引用
收藏
页码:29 / 33
页数:5
相关论文
共 11 条
[1]  
Abbas F, 2014, INFORM SECURITY APPL
[2]  
[Anonymous], 2013, IEEE SYST J, DOI DOI 10.1109/JSYST.2013.2284696
[3]  
Avudaiappan V, 2019, J APPL FLUID MECH
[4]  
Dong W, 2011, IEEE INFOCOM SER, P1647, DOI 10.1109/INFCOM.2011.5934958
[5]  
Freudiger J, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P324
[6]  
Kalpana Parijatham V, 2018, INT J PURE APPL MATH
[7]   Applications, Architectures, and Protocol Design Issues for Mobile Social Networks: A Survey [J].
Kayastha, Nipendra ;
Niyato, Dusit ;
Wang, Ping ;
Hossain, Ekram .
PROCEEDINGS OF THE IEEE, 2011, 99 (12) :2130-2158
[8]  
Lu X, 2012, MOBILE NETWAPPL
[9]  
Pietiläinen AK, 2009, 2ND ACM SIGCOMM WORKSHOP ON ONLINE SOCIAL NETWORKS (WOSN 09), P49
[10]  
Reddy Sivakumar Srinivasalu, 2019, MACH LEARN TECHN INT