<p><i>Security and Privacy in Social Networks</i> brings to the forefront innovative approaches for analyzing and enhancing the security and privacy dimensions in online social networks, and is the first comprehensive attempt dedicated entirely to this field. In order to facilitate the transition of
Security and privacy in mobile social networks
โ Scribed by Xiaohui Liang, Rongxing Lu, Xiaodong Lin, Xuemin Shen (auth.)
- Publisher
- Springer-Verlag New York
- Year
- 2013
- Tongue
- English
- Leaves
- 106
- Series
- SpringerBriefs in computer science
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems. The PPM helps two users compare their personal profiles without disclosing the profiles. The PDF helps users forward data to their friends via multiple cooperative relay peers while preserving their identity and location privacy. The TSE enables users to locally share service reviews on the vendors such that users receive more valuable information about the services not only from vendors but also from their trusted social friends. The authors address both theoretic and practical aspects of these topics by introducing the system model, reviewing the related works, and presenting the solutions. Security and Privacy for Mobile Social Networks further provides the security analysis and the performance evaluation based on real-trace simulations. It also summarizes the future research directions for this rapidly growing area of research. The book will be valuable for researchers and practitioners who work with mobile social networks, communication platforms, wireless communication techniques, and internet applications.
"Suitable for any type of reader as an introduction to the topic... The chapters are well motivated and presented... It is recommended for researchers." -ACM Computing Reviews, 21 July 2014
โฆ Table of Contents
Front Matter....Pages i-viii
Overview....Pages 1-17
Profile Matching Protocol with Anonymity Enhancing Techniques....Pages 19-41
Cooperative Data Forwarding Strategy with Privacy Preservation....Pages 43-66
Recommendation-Based Trustworthy Service Evaluation....Pages 67-93
Back Matter....Pages 95-100
โฆ Subjects
Computer Communication Networks; Communications Engineering, Networks; Information Systems Applications (incl. Internet); Systems and Data Security; Information Systems and Communication Service
๐ SIMILAR VOLUMES
<p><i>Security and Privacy in Social Networks</i> brings to the forefront innovative approaches for analyzing and enhancing the security and privacy dimensions in online social networks, and is the first comprehensive attempt dedicated entirely to this field. In order to facilitate the transition of
<p>This volume aims at assessing the current approaches and technologies, as well as to outline the major challenges and future perspectives related to the security and privacy protection of social networks. It provides the reader with an overview of the state-of-the art techniques, studies, and app
<P><EM>Mobile and Wireless Network Security and Privacy</EM> analyzes important security and privacy problems in the realms of wireless networks and mobile computing. The material includes a report to the National Science Foundation of the United States which will be used by program managers for the
This book brings together a number of papers that represent seminal contributions underlying mobile and wireless network security and privacy. It provides a foundation for implementation and standardization as well as further research. The diverse topics and protocols described in this book give the