Table of Contents Author Guidelines Submit a Manuscript
Wireless Communications and Mobile Computing
Volume 2017 (2017), Article ID 1393026, 9 pages
https://doi.org/10.1155/2017/1393026
Research Article

An Advanced Private Social Activity Invitation Framework with Friendship Protection

1Department of Computer Sciences, Georgia Southern University, Statesboro, GA 30460, USA
2Department of Information Technology, Georgia Southern University, Statesboro, GA 30460, USA
3Department of Electrical Engineering, Georgia Southern University, Statesboro, GA 30460, USA

Correspondence should be addressed to Weitian Tong; ude.nrehtuosaigroeg@gnotw

Received 31 August 2017; Accepted 25 October 2017; Published 16 November 2017

Academic Editor: Chaokun Wang

Copyright © 2017 Weitian Tong et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. L. Adamic and E. Adar, “How to search a social network,” Social Networks, vol. 27, no. 3, pp. 187–203, 2005. View at Publisher · View at Google Scholar · View at Scopus
  2. E. Cho, S. A. Myers, and J. Leskovec, “Friendship and mobility: user movement in location-based social networks,” in Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1082–1090, ACM, August 2011. View at Publisher · View at Google Scholar · View at Scopus
  3. Z. He, Z. Cai, Q. Han, W. Tong, L. Sun, and Y. Li, “An energy efficient privacy-preserving content sharing scheme in mobile social networks,” Personal and Ubiquitous Computing, vol. 20, no. 5, pp. 833–846, 2016. View at Publisher · View at Google Scholar · View at Scopus
  4. Z. He, Z. Cai, and X. Wang, “Modeling propagation dynamics and developing optimized countermeasures for rumor spreading in online social networks,” in Proceedings of the 35th IEEE International Conference on Distributed Computing Systems (ICDCS '15), pp. 205–214, July 2015. View at Publisher · View at Google Scholar · View at Scopus
  5. R. Kumar, J. Novak, and A. Tomkins, “Structure and evolution of online social networks,” in Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '06), pp. 611–617, August 2006. View at Scopus
  6. M. Szell, R. Lambiotte, and S. Thurner, “Multirelational organization of large-scale social networks in an online world,” Proceedings of the National Acadamy of Sciences of the United States of America, vol. 107, no. 31, pp. 13636–13641, 2010. View at Publisher · View at Google Scholar · View at Scopus
  7. R. Xiang, J. Neville, and M. Rogati, “Modeling relationship strength in online social networks,” in Proceedings of the 19th International Conference on World Wide Web, pp. 981–990, ACM, April 2010. View at Publisher · View at Google Scholar · View at Scopus
  8. W. Tong, S. Buglass, J. Li, L. Chen, and C. Ai, “Smart and private social activity invitation framework based on historical data from smart devices,” in Proceedings of the 10th EAI International Conference on Mobile Multimedia Communications (MOBIMEDIA '17), pp. 1–10, 2017.
  9. S. Poslad, Ubiquitous Computing: Smart Devices, Environments and Interactions, John Wiley & Sons, 2011.
  10. C. Ai, M. Han, J. Wang, and M. Yan, “An efficient social event invitation framework based on historical data of smart devices,” in Proceedings of the IEEE International Conferences on Big Data and Cloud Computing (BDCloud), Social Computing and Networking (SocialCom), Sustainable Computing and Communications (SustainCom) (BDCloud-SocialCom-SustainCom), pp. 229–236, Atlanta, Ga, USA, October 2016. View at Publisher · View at Google Scholar · View at Scopus
  11. L. Backstrom, C. Dwork, and J. Kleinberg, “Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography,” in Proceedings of the 16th International World Wide Web Conference (WWW '07), pp. 181–190, Alberta, Canada, May 2007. View at Publisher · View at Google Scholar · View at Scopus
  12. M. Hay, G. Miklau, D. Jensen, D. Towsley, and P. Weis, “Resisting structural re-identification in anonymized social networks,” Proceedings of the VLDB Endowment, vol. 1, no. 1, pp. 102–114, 2008. View at Google Scholar · View at Scopus
  13. D. Mir and R. N. Wright, “A differentially private estimator for the stochastic Kronecker graph model,” in Proceedings of the Joint EDBT/ICDT Workshops, pp. 167–176, March 2012. View at Publisher · View at Google Scholar · View at Scopus
  14. C. Dwork, “Differential privacy,” in Proceedings of the 33rd International Colloquium on Automata, Languages and Programming (ICALP '06), pp. 1–12, 2006.
  15. A. Blum, C. Dwork, F. McSherry, and K. Nissim, “Practical privacy: the SulQ framework,” in Proceedings of the 24th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS 2005, pp. 128–138, June 2005. View at Publisher · View at Google Scholar · View at Scopus
  16. C. Dwork, K. Kenthapadi, F. McSherry, I. Mironov, and M. Naor, “Our data, ourselves: privacy via distributed noise generation,” in EUROCRYPT, pp. 486–503, 2006. View at Google Scholar · View at MathSciNet
  17. C. Dwork, F. McSherry, K. Nissim, and A. Smith, “Calibrating noise to sensitivity in private data analysis,” in Proceedings of the Theory of Cryptography Conference, pp. 265–284, 2006. View at Publisher · View at Google Scholar · View at Scopus
  18. C. Dwork and K. Nissim, “Privacy-preserving datamining on vertically partitioned databases,” in Advances in Cryptology—CRYPTO 2004, pp. 528–544, 2004. View at Google Scholar · View at MathSciNet
  19. F. McSherry and K. Talwar, “Mechanism design via differential privacy,” in Proceedings of the 48th Annual Symposium on Foundations of Computer Science (FOCS '07), pp. 94–103, Providence, RI, USA, October 2007. View at Publisher · View at Google Scholar · View at Scopus
  20. A. Ghosh, T. Roughgarden, and M. Sundararajan, “Universally utility-maximizing privacy mechanisms,” SIAM Journal on Computing, vol. 41, no. 6, pp. 1673–1693, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  21. A. Nikolov, K. Talwar, and L. Zhang, “The geometry of differential privacy: The sparse and approximate cases,” in Proceedings of the 45th Annual ACM Symposium on Theory of Computing (STOC '13), pp. 351–360, June 2013. View at Publisher · View at Google Scholar · View at Scopus
  22. H. H. Nguyen, A. Imine, and M. Rusinowitch, “Differentially private publication of social graphs at linear cost,” in Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM '15), pp. 596–599, August 2015. View at Publisher · View at Google Scholar · View at Scopus
  23. Y. Mülle, C. Clifton, and K. Böhm, “Privacy-integrated graph clustering through differential privacy,” in Proceedings of the Workshops of the EDBT/ICDT Joint Conference (EDBT/ICDT), pp. 247–254, 2015.
  24. A. Sala, X. Zhao, C. Wilson, H. Zheng, and B. Y. Zhao, “Sharing graphs using differentially private graph models,” in Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC '11), pp. 81–97, Berlin, Germany, November 2011. View at Publisher · View at Google Scholar · View at Scopus
  25. Y. Wang and X. Wu, “Preserving differential privacy in degree-correlation based graph generation,” Transactions on Data Privacy, vol. 6, no. 2, pp. 127–145, 2013. View at Google Scholar · View at MathSciNet
  26. Y. Wang, X. Wu, and L. Wu, “Differential privacy preserving spectral graph analysis,” in Proceedings of 17th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining (PAKDD '13), pp. 329–340, 2013.
  27. R. Chen, B. C. M. Fung, P. S. Yu, and B. C. Desai, “Correlated network data publication via differential privacy,” The VLDB Journal, vol. 23, no. 4, pp. 653–676, 2014. View at Publisher · View at Google Scholar · View at Scopus
  28. Q. Xiao, R. Chen, and K.-L. Tan, “Differentially private network data release via structural inference,” in Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '14), pp. 911–920, New York, NY, USA, August 2014. View at Publisher · View at Google Scholar · View at Scopus
  29. W. Lu and G. Miklau, “Exponential random graph estimation under differential privacy,” in Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '14), pp. 921–930, August 2014. View at Publisher · View at Google Scholar · View at Scopus
  30. C. Dwork and A. Roth, The Algorithmic Foundations of Differential Privacy, Now Publishers, 2014.