Open Access   Article Go Back

Efficient and Persistent Profile Matching in the Propinquity Mobile Social Networks

A. Shaik1 , L.N.B. Jyotsna2

Section:Review Paper, Product Type: Journal Paper
Volume-2 , Issue-7 , Page no. 71-74, Jul-2014

Online published on Jul 30, 2014

Copyright © A. Shaik, L.N.B. Jyotsna . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: A. Shaik, L.N.B. Jyotsna, “Efficient and Persistent Profile Matching in the Propinquity Mobile Social Networks,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.7, pp.71-74, 2014.

MLA Style Citation: A. Shaik, L.N.B. Jyotsna "Efficient and Persistent Profile Matching in the Propinquity Mobile Social Networks." International Journal of Computer Sciences and Engineering 2.7 (2014): 71-74.

APA Style Citation: A. Shaik, L.N.B. Jyotsna, (2014). Efficient and Persistent Profile Matching in the Propinquity Mobile Social Networks. International Journal of Computer Sciences and Engineering, 2(7), 71-74.

BibTex Style Citation:
@article{Shaik_2014,
author = {A. Shaik, L.N.B. Jyotsna},
title = {Efficient and Persistent Profile Matching in the Propinquity Mobile Social Networks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2014},
volume = {2},
Issue = {7},
month = {7},
year = {2014},
issn = {2347-2693},
pages = {71-74},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=210},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=210
TI - Efficient and Persistent Profile Matching in the Propinquity Mobile Social Networks
T2 - International Journal of Computer Sciences and Engineering
AU - A. Shaik, L.N.B. Jyotsna
PY - 2014
DA - 2014/07/30
PB - IJCSE, Indore, INDIA
SP - 71-74
IS - 7
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3646 3363 downloads 3582 downloads
  
  
           

Abstract

Mobile social networks (MSNs) refer to the social networking for making new connections. In the MSNs personal preferences is an imperative service, where user can find matching users within the range. In the existing systems all services, generally all users can create specific profile and publish it into social networks to interconnect with the new people. It may contain some sensitive information also these types of sensitive users may not publish their profile into social networks as a public. A propinquity mobile social network refers to virtual interaction with the data (BLUETOOTH/WI-FI) interfaces on their smart phones. These social networks are more popular due to the recently growth of smart phone users. To reveal sensitive user�s profile is most vulnerable in these devices. In these services conflicts with the user�s privacy concerns about reveal their personal profiles to complete strangers before deciding to interact with them. In this paper takes this open challenge to overcome with the novel strategy. In this paper prior security work is focused on privacy to users� profiles with using high efficient symmetric cryptographic primitives.

Key-Words / Index Term

Privacy, Mobile Social Networking, Profile Matching, Vulnerable, Ad-Hoc Networks

References

[1]. Z. Yang, B. Zhang, J.Dai, A.Champion, D.Xuan, and D. Li, �E-smart Talker: A distributed mobile system for social networking in physical proximity,� in ICDCS�10, Genoa, Italy, June 2010, pp. 468-477.
[2]. T. Nishide and K. Ohta, �Multyparty Computation for interval, equality, and comparisons without bit-decomposition protocol,� in PKC�07,2007, pp. 343-360.
[3]. Y. Qi and M. J. Atallah, �Efficient privacy-preserving K-nearest neighbor search,� in IEEE ICDCS�08,2008, pp. 311-319.
[4]. M. Li, S. Yu, J.D. Guttman, W. Lou, and K. Ren, �Secure Adhoc trust initialization and key management in wireless body area networks,� ACM Transactions on sensor Networks(TOSN), 2012.
[5]. Z. Yang, B. Zhang, J. Dai, A. Champion, D. Xuan, D. Li, �E-smarttaliker: A distributed mobile system for social networking in physical proximity,� in IEEE ICDCS�10, June, 2010.
[6]. G. Asharov and Y. Lindell, � A full proof of the bgw protocol for perfectly-secure multiparty computation,� Advances in CryptologyCRYPTO 2011,2011.
[7]. M. Ben-Or, S.Goldwasser, and A.Wigderson,�Completeness theorems for non-cryptographic fault-tolerant distributed computation.�
[8]. R. Gennaro, M.O.Rabin, and T. Rabin, �simplified vss and fast-track multiparty computations with applications to threshold cryptography,� in ACM PODC �98, 1998, pp. 101-111.
[9]. Josef Pieprzyk , Hossein Ghodosi and Ron Steinfeld, �multi-Party Computation with Conversion of secret Sharing,� NTU, Singapore, September 2011.
[10]. R. W. Baldwin and W. C. Gramlich, �Cryptographic protocol for trustable match making,� in IEEE S&P�85, Oakland, CA,April 1985.
[11]. G. Ateniese, M. Blanton, and J. Kirsch, �Secret handshakes with dynamic and fuzzy matching,� in NDSS�07, San Diego, CA, FEB. 2007.
[12]. Srihari babu. Kolla and B B K Prasad, �A Survey of Source Routing Protocols, Vulnerabilities and Security in wireless Adhoc networks� IJCSE vol 2 no.4 pp. 20-25. April 2014.