Solitude Adaptable User Profile Matching for Mobile Social Cloud Networks

Q4 Computer Science
M. Gobi
{"title":"Solitude Adaptable User Profile Matching for Mobile Social Cloud Networks","authors":"M. Gobi","doi":"10.22247/ijcna/2022/214506","DOIUrl":null,"url":null,"abstract":"– Profile matching (PM) is a crucial method in cloud-based applications including Health Care and Social Networks (HC-SNs). In Mobile Social Cloud Networks (MSCNs), matching user profiles while maintaining privacy is a demanding challenge that has garnered greater attention in recent days. This article represents a new scheme called Modified Cipher Text based Policy Encryption Scheme (MCT-PES), proposed for Solitude Adaptable User Profile Matching for MSCNs (SA-UPM) using Homomorphic Encryption (Ho-En) technique for multiple recipients. In this module, a client submits a Priority-Profile (PP) and searches decentralized MSCNs for people with MP. In this method, neither the participant's profile nor the PP given by the participant is revealed. Furthermore, a Secure Transmission Medium (STM) may be formed between the pair of correctly matched users (MUs). Initially, it ensures verifiability, ensuring that no participant may deceive the initiator by providing an incorrect matching result. Then, the matched profile pair may be used it to create a STM that can withstand an eavesdropping attempt. Furthermore, the mismatched user may be promptly ruled out. Additionally, just a limited exchange between the originator and MUs are required since the MUs can determine the similar outcome without the assistance of the originator, which is beneficial for lowering computational problems and costs.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":"1 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computer Networks and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.22247/ijcna/2022/214506","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 0

Abstract

– Profile matching (PM) is a crucial method in cloud-based applications including Health Care and Social Networks (HC-SNs). In Mobile Social Cloud Networks (MSCNs), matching user profiles while maintaining privacy is a demanding challenge that has garnered greater attention in recent days. This article represents a new scheme called Modified Cipher Text based Policy Encryption Scheme (MCT-PES), proposed for Solitude Adaptable User Profile Matching for MSCNs (SA-UPM) using Homomorphic Encryption (Ho-En) technique for multiple recipients. In this module, a client submits a Priority-Profile (PP) and searches decentralized MSCNs for people with MP. In this method, neither the participant's profile nor the PP given by the participant is revealed. Furthermore, a Secure Transmission Medium (STM) may be formed between the pair of correctly matched users (MUs). Initially, it ensures verifiability, ensuring that no participant may deceive the initiator by providing an incorrect matching result. Then, the matched profile pair may be used it to create a STM that can withstand an eavesdropping attempt. Furthermore, the mismatched user may be promptly ruled out. Additionally, just a limited exchange between the originator and MUs are required since the MUs can determine the similar outcome without the assistance of the originator, which is beneficial for lowering computational problems and costs.
适用于移动社交云网络的孤立自适应用户配置文件匹配
–配置文件匹配(PM)是基于云的应用程序中的一种关键方法,包括医疗保健和社交网络(HC SN)。在移动社交云网络(MSCN)中,在维护隐私的同时匹配用户档案是一项艰巨的挑战,最近几天引起了更多关注。本文提出了一种新的方案,称为基于改进密码文本的策略加密方案(MCT-PES),用于MSCN的孤立自适应用户配置文件匹配(SA-UPM),该方案使用同态加密(Ho-En)技术用于多个接收方。在该模块中,客户端提交优先级配置文件(PP),并在分散的MSCN中搜索患有MP的人。在该方法中,既不显示参与者的配置文件,也不显示参与者提供的PP。此外,可以在一对正确匹配的用户(MU)之间形成安全传输介质(STM)。最初,它确保了可验证性,确保没有参与者通过提供不正确的匹配结果来欺骗发起人。然后,匹配的配置文件对可以用于创建能够承受窃听尝试的STM。此外,可以立即排除不匹配的用户。此外,只需要发起者和MU之间的有限交换,因为MU可以在没有发起者帮助的情况下确定类似的结果,这有利于降低计算问题和成本。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
International Journal of Computer Networks and Applications
International Journal of Computer Networks and Applications Computer Science-Computer Science Applications
CiteScore
2.30
自引率
0.00%
发文量
40
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信