透過您的圖書館登入
IP:3.145.166.7
  • 學位論文

應用於手機社群網路之低負擔隱私連接服務

SMILE+: A Privacy Preserving Missed-Connection Service with Low Overheads in Mobile Social Networks

指導教授 : 鄭伯炤
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


手機社群網絡(MSN)的用戶們大多數的時間都使用著社群網路,在社群網路中有一項服務稱為連接服務。連接服務提供曾經在同時間、同地點互相碰過面卻因為某些因素而沒有交換連絡方式的陌生人再一次聯繫的機會。在傳統的連接服務當中,集中式伺服器會儲存所有過程中所產生的訊息,但實際上伺服器的可信度有多少便不得而知,由於伺服器的不可信,敏感訊息便處於高風險的環境下,既有的隱私保護方法中,因為使用k匿名處理而造成在隱私保護的過程中會產生多餘的訊息。為了改善手機社群網路的用戶們使用連接服務時其隱私能夠受到充份的保護並且在隱私獲得充份保護時亦能抑制產生多餘的訊息,本論文提出了一種新的方法並稱之為SMILE+,方法包含兩個主要階段記錄連接及重建連接,記錄連接會將使用者被動建立的連接記錄下來,重建連接則是將記錄下的連接重新建立起一個溝通的管通,在本論文的方法中使用了代理人來替我們轉送訊息,透過代理人的使用有效的保護用戶們的隱私。為了評估本論文所提出方法之成效,我們針對各項隱私保護進行分析及討論並透過實驗結果說明,本論文提出之方法能夠在用戶使用連接服務時確實達到隱私保護及減少負擔。

關鍵字

匿名 連接服務 隱私 負擔

並列摘要


Users in Mobile Social Networks (MSNs) are connected to social networks all the time and can make use of Missed-Connection Services. It provides its users with the possibility to meet strangers who were at the same place and time and allow them to contact each other at a later time. In traditional missed-connection services, the centralized server stores all information and in a scenario, where the server is untrusted, the sensitive information is in danger. We propose SMILE+, a two-phase algorithm that ensures privacy by still being efficient. We also perform a privacy analysis and the experiment results to show that we could reduce the overheads with the privacy protection.

並列關鍵字

Anonymity Missed-connection Privacy Overhead

參考文獻


[1] N. Kayastha, D. Niyato, P. Wang, andE.Hossain. "Applications, architectures, and protocol design issues for mobile social networks: A survey." Proceedings of the IEEE 99.12 (2011): 2130-2158.
[2] N.Vastardis, andK.Yang, (2013). Mobile Social Networks: Architectures, Social Properties, and Key Research Challenges. Communications Surveys & Tutorials, IEEE, 15(3), 1355-1371.
[5] Y.H. Lin, A. Studer, H.C. Hsiao, J.M. McCune, K.H. Wang, M. Krohn, P.L. Lin, A. Perrig, H.M. Sun, andB.Y. Yang. "SPATE: small-group PKI-less authenticated trust establishment." Proceedings of the 7th international conference on Mobile systems, applications, and services. ACM, 2009.
[7] A. Mohaisen, D.F. Kune, E.Y. Vasserman, M.S. Kim, andY.D. Kim. "Secure encounter-based mobile social networks: Requirements, designs, and tradeoffs." (2013): 1-1.
[8] Y. Zheng, L.Z. Zhang, X. Xie, andW.Y. Ma. "Mining interesting locations and travel sequences from GPS trajectories." Proceedings of the 18th international conference on World wide web. ACM, 2009.

延伸閱讀