Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2016, Article ID 8575187, 12 pages
http://dx.doi.org/10.1155/2016/8575187
Research Article

PRUB: A Privacy Protection Friend Recommendation System Based on User Behavior

University of Electronic Science and Technology of China, Chengdu 611731, China

Received 13 February 2016; Accepted 2 August 2016

Academic Editor: Salvatore Alfonzetti

Copyright © 2016 Wei Jiang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. H. Shen, Z. Li, G. Liu, and J. Li, “SOS: a distributed mobile Q&A system based on social networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 4, pp. 1066–1077, 2014. View at Publisher · View at Google Scholar · View at Scopus
  2. J. Liu, P. Dolan, and E. R. Pedersen, “Personalized news recommendation based on click behavior,” in Proceedings of the 15th International Conference on Intelligent User Interfaces (IUI '10), pp. 31–40, ACM, 2010. View at Publisher · View at Google Scholar
  3. A. C. Squicciarini, F. Paci, and S. Sundareswaran, “Prima: a comprehensive approach to privacy protection in social network sites,” Annals of Telecommunications, vol. 69, no. 1-2, pp. 21–36, 2014. View at Google Scholar
  4. T. R. Hoens, M. Blanton, A. Steele, and N. V. Chawla, “Reliable medical recommendation systems with patient privacy,” ACM Transactions on Intelligent Systems and Technology, vol. 4, no. 4, article 67, 2013. View at Publisher · View at Google Scholar · View at Scopus
  5. L. Fang, H. Kim, K. LeFevre, and A. Tami, “A privacy recommendation wizard for users of social networking sites,” in Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS '10), pp. 630–632, ACM, Chicago, Ill, USA, October 2010. View at Publisher · View at Google Scholar · View at Scopus
  6. Q. Xie and U. Hengartner, “Privacy-preserving matchmaking for mobile social networking secure against malicious users,” in Proceedings of the 9th Annual International Conference on Privacy, Security and Trust (PST '11), pp. 252–259, Montreal, Canada, July 2011. View at Publisher · View at Google Scholar · View at Scopus
  7. R. Agrawal, A. Evfimievski, and R. Srikant, “Information sharing across private databases,” in Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 86–97, June 2003. View at Scopus
  8. M. Moricz, Y. Dosbayev, and M. Berlyant, “PYMK: friend recommendation at myspace,” in Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 999–1002, ACM, June 2010.
  9. B. K. Samanthula and W. Jiang, “Structural and message based private friend recommendation,” in Proceedings of the International Conference on Advances in Social Networks Analysis and Mining (ASONAM '12), pp. 684–690, IEEE Computer Society, 2012.
  10. L. M. Aiello and G. Ruffo, “LotusNet: tunable privacy for distributed online social network services,” Computer Communications, vol. 35, no. 1, pp. 75–88, 2012. View at Publisher · View at Google Scholar · View at Scopus
  11. M. Li, S. Yu, N. Cao, and W. Lou, “Privacy-preserving distributed profile matching in proximity-based mobile social networks,” IEEE Transactions on Wireless Communications, vol. 12, no. 5, pp. 2024–2033, 2013. View at Publisher · View at Google Scholar · View at Scopus
  12. M. Li, N. Cao, S. Yu, and W. Lou, “FindU: privacy-preserving personal profile matching in mobile social networks,” in Proceedings of the IEEE (INFOCOM '11), pp. 2435–2443, IEEE, Shanghai, China, April 2011. View at Publisher · View at Google Scholar · View at Scopus
  13. S. Alsaleh, R. Nayak, Y. Xu, and L. Chen, “Improving matching process in social network using implicit and explicit user information,” in Web Technologies and Applications, pp. 313–320, Springer, Berlin, Germany, 2011. View at Google Scholar
  14. R. Zhang, Y. Zhang, J. Sun, and G. Yan, “Fine-grained private matching for proximity-based mobile social networking,” in Proceedings of the IEEE Conference on Computer Communications (INFOCOM '12), pp. 1969–1977, IEEE, Orlando, Fla, USA, March 2012. View at Publisher · View at Google Scholar · View at Scopus
  15. M. J. Freedman, K. Nissim, and B. Pinkas, “Efficient private matching and set intersection,” in Advances in Cryptology—EUROCRYPT 2004, pp. 1–19, Springer, Berlin, Germany, 2004. View at Google Scholar
  16. M. Von Arb, M. Bader, M. Kuhn, and R. Wattenhofer, “Veneta: serverless friend-of-friend detection in mobile social networking,” in Proceedings of the IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WIMOB '08), pp. 184–189, IEEE, Avignon, France, 2008.
  17. L. Shundong, W. Daoshun, D. Yiqi, and L. Ping, “Symmetric cryptographic solution to Yao's millionaires' problem and an evaluation of secure multiparty computations,” Information Sciences, vol. 178, no. 1, pp. 244–255, 2008. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  18. L. Kissner and D. Song, “Privacy-preserving set operations,” in Advances in Cryptology—CCRYPTO 2005, pp. 241–257, Springer, Berlin, Germany, 2005. View at Google Scholar
  19. D. Dachman-Soled, T. Malkin, M. Raykova, and M. Yung, “Efficient robust private set intersection,” International Journal of Applied Cryptography, vol. 2, no. 4, pp. 289–303, 2012. View at Publisher · View at Google Scholar · View at MathSciNet
  20. R. Lu, X. Lin, X. Liang, and X. S. Shen, “Secure handshake with symptoms-matching: the essential to the success of mhealthcare social network,” in Proceedings of the 5th International ICST Conference on Body Area Networks (BodyNets '10), pp. 8–15, ACM, Corfu Island, Greece, September 2010. View at Publisher · View at Google Scholar · View at Scopus
  21. C. Hazay and Y. Lindell, “Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries,” in Theory of Cryptography, pp. 155–175, Springer, Berlin, Germany, 2008. View at Google Scholar
  22. Z. Yang, B. Zhang, J. Dai, A. C. Champion, D. Xuan, and D. Li, “E-SmallTalker: a distributed mobile system for social networking in physical proximity,” in Proceedings of the 30th IEEE International Conference on Distributed Computing Systems (ICDCS '10), pp. 468–477, IEEE, Genova, Italy, June 2010. View at Publisher · View at Google Scholar · View at Scopus
  23. D. Dolev and A. C. Yao, “On the security of public key protocols,” IEEE Transactions on Information Theory, vol. 29, no. 2, pp. 198–208, 1983. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  24. M. Madden, A. Lenhart, S. Cortesi et al., “Teens, social media, and privacy, part 2: information sharing, friending, and privacy settings on social media,” 2013, http://www.pewinternet.org/2013/05/21/part-2-information-sharing-friending-and-privacy-settings-on-social-media/.