Security and Privacy in Mobile Social Networks (SpringerBriefs in Computer Science)

By Xiaohui Liang, Rongxing Lu, Xiaodong Lin

This ebook makes a speciality of 3 rising learn issues in cellular social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative facts forwarding (PDF) protocols, and reliable provider evaluate (TSE) structures. The PPM is helping clients examine their own profiles with no disclosing the profiles. The PDF is helping clients ahead facts to their buddies through a number of cooperative relay friends whereas retaining their identification and site privateness. The TSE permits clients to in the neighborhood proportion carrier reports at the owners such that clients obtain extra useful information regarding the providers not just from owners but additionally from their relied on social buddies. The authors deal with either theoretic and functional features of those issues via introducing the procedure version, reviewing the comparable works, and providing the ideas. safeguard and privateness for cellular Social Networks extra offers the safety research and the functionality overview in keeping with real-trace simulations. It additionally summarizes the long run examine instructions for this swiftly transforming into zone of analysis. The publication can be useful for researchers and practitioners who paintings with cellular social networks, communique structures, instant communique ideas, and web applications.

"Suitable for any form of reader as an advent to the topic... The chapters are good influenced and presented... it is strongly recommended for researchers." -ACM Computing stories, 21 July 2014

Show description

Preview of Security and Privacy in Mobile Social Networks (SpringerBriefs in Computer Science) PDF

Similar Security books

Cyber War: The Next Threat to National Security and What to Do About It

Writer of the number 1 ny occasions bestseller opposed to All Enemies, former presidential consultant and counter-terrorism specialist Richard A. Clarke sounds a well timed and chilling caution approximately America’s vulnerability in a terrifying new overseas conflict—Cyber conflict! each involved American may still learn this startling and explosive ebook that gives an insider’s view of White residence ‘Situation Room’ operations and incorporates the reader to the frontlines of our cyber security.

Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

The world's bestselling desktop safeguard book--fully extended and updated"Right now you carry on your hand probably the most profitable defense books ever written. instead of being a sideline player, leverage the precious insights Hacking uncovered 6 presents to assist your self, your organization, and your nation struggle cyber-crime.

Information Security: The Complete Reference, Second Edition

Increase and enforce a good end-to-end safeguard application Today’s advanced global of cellular systems, cloud computing, and ubiquitous information entry places new protection calls for on each IT specialist. details safeguard: the full Reference, moment variation (previously titled community protection: the full Reference) is the single accomplished booklet that gives vendor-neutral information on all features of knowledge security, with a watch towards the evolving hazard panorama.

Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

State-of-the-art ideas for locating and solving severe defense flaws give a boost to your community and evade electronic disaster with confirmed techniques from a workforce of protection specialists. thoroughly up-to-date and that includes 12 new chapters, grey Hat Hacking: the moral Hacker's instruction manual, Fourth variation explains the enemy’s present guns, abilities, and strategies and provides field-tested treatments, case experiences, and ready-to-deploy trying out labs.

Extra info for Security and Privacy in Mobile Social Networks (SpringerBriefs in Computer Science)

Show sample text content

Four. three. 2) and submits the aggregated studies REVj (REVj D revj if REVw D nul l) including tok to the seller. the seller tests the validity of REVj and tok, and broadcast the up-to-date TP checklist. evaluate aggregation is similar strategy as signature aggregation in the course of token forwarding offered within the earlier part. evaluation aggregation has benefits: (1) it successfully resists the evaluate assaults; (2) it principally reduces the verbal exchange overhead. word that uj is not able to forge a evaluation of uw since it can't receive any pseudonym mystery key pskw; ; , and uj is not able to exchange the overview with the other overview bought from uw long ago simply because time stamp is used to avoid evaluate replay. Direct substitute may be simply detected and rejected by way of the seller. additional, uj can't ahead the token with no filing REVw and/or revj as the token files the forwarding historical past and the seller will realize the evaluate lacking whilst it later gets the token as a part of a overview submission made by way of one other consumer. After filing REVj and tok to the seller, uj assessments the up-to-date TP record from the seller. An unsuccessful submission might be as a result of verbal exchange failure or evaluate rejection. To tolerate communique failure, a couple of submission retrials will be made sooner than drawing a submission failure end. Upon receiving the up-to-date TP record, uj will payment which pseudonym tok is said to within the checklist. If tok is expounded to pidj;h; , which means that uj have effectively submitted REVj , uj will ahead tok to a close-by consumer as defined within the prior part. If tok continues to be relating to pidw; ; , that means that uj ’s submission failed, uj will inn for cooperative submission by way of sending tok and REVj jointly to a close-by consumer that's soliciting for for a token. If tok is said to another pseudonym, implying that uw should have despatched the token to a number of clients and uj ’s submission failed, uj will attempt to discover a new token from close by clients and publish REVj utilizing it. seventy eight four Recommendation-Based reliable carrier evaluate reviews: in the course of carrier info dissemination, the seller must broadcast its whole assessment assortment including the most recent models of the tokens. After receiving the provider info, a person assessments the authenticity of the studies and compares the pseudonyms linked to studies to these embedded in tokens. as the token comprises its flow historical past (implemented by way of hierarchical signatures and time stamps), the person might organize the studies in accordance with the move background. Any ignored evaluate can be detected. If a number of experiences from an analogous consumer look, it's going to use time stamp to tell apart them. four. three. four SrTSE In earlier subsections, we have now brought a bTSE the place evaluate linkability, rejection and amendment assaults are thought of. We extra expand the bTSE to a Sybil-resisted TSE, named SrTSE, which successfully prevents the sybil assaults. within the following, we first describe the sybil assaults within the S-MSN, after which introduce our recommendations to accomplish the layout of the SrTSE.

Download PDF sample

Rated 4.03 of 5 – based on 48 votes