Privacy-Preserving Similarity Computation in Cloud-Based Mobile Social Networks

7Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

A growing number of mobile social network applications are taking advantage of cloud computing to store profiles of end users and run protocols which are compute-intensive. We focus on an application scenario of similarity computation between two users. To protect data security and privacy, mobile users encrypt their sensitive profiles before outsourcing to the cloud and different users choose different encryption keys. Three challenges need attention - how to compute on encrypted profiles under different keys, how to allow mobile users to stay offline during execution of the protocol, and how to select similarity metric. Existing schemes either rely on multi-key fully homomorphic encryption with one server or partially homomorphic encryption with two non-colluding servers. To balance computational complexity on one server and communication overhead between two servers, we put forward a privacy-preserving similarity computation protocol which supports both homomorphic additions and one homomorphic multiplication. We conduct security analysis and experimental evaluation of our scheme. The results show that our protocol is provably secure and runs reasonably fast, and thus can be applied in practice.

Cite

CITATION STYLE

APA

Zhang, J., Hu, S., & Jiang, Z. L. (2020). Privacy-Preserving Similarity Computation in Cloud-Based Mobile Social Networks. IEEE Access, 8, 111889–111898. https://doi.org/10.1109/ACCESS.2020.3003373

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free