Muutke küpsiste eelistusi

Security and Privacy in Mobile Social Networks 2013 ed. [Pehme köide]

  • Formaat: Paperback / softback, 100 pages, kõrgus x laius: 235x155 mm, kaal: 1766 g, 27 Illustrations, black and white; VIII, 100 p. 27 illus., 1 Paperback / softback
  • Sari: SpringerBriefs in Computer Science
  • Ilmumisaeg: 13-Oct-2013
  • Kirjastus: Springer-Verlag New York Inc.
  • ISBN-10: 1461488567
  • ISBN-13: 9781461488569
  • Pehme köide
  • Hind: 48,70 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 57,29 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 100 pages, kõrgus x laius: 235x155 mm, kaal: 1766 g, 27 Illustrations, black and white; VIII, 100 p. 27 illus., 1 Paperback / softback
  • Sari: SpringerBriefs in Computer Science
  • Ilmumisaeg: 13-Oct-2013
  • Kirjastus: Springer-Verlag New York Inc.
  • ISBN-10: 1461488567
  • ISBN-13: 9781461488569
This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems. The PPM helps two users compare their personal profiles without disclosing the profiles. The PDF helps users forward data to their friends via multiple cooperative relay peers while preserving their identity and location privacy. The TSE enables users to locally share service reviews on the vendors such that users receive more valuable information about the services not only from vendors but also from their trusted social friends. The authors address both theoretic and practical aspects of these topics by introducing the system model, reviewing the related works, and presenting the solutions. Security and Privacy for Mobile Social Networks further provides the security analysis and the performance evaluation based on real-trace simulations. It also summarizes the future research directions for this rapidly growing area of research. The book will be valuable for researchers and practitioners who work with mobile social networks, communication platforms, wireless communication techniques, and internet applications.





"Suitable for any type of reader as an introduction to the topic... The chapters are well motivated and presented... It is recommended for researchers." -ACM Computing Reviews, 21 July 2014

Arvustused

From the book reviews:

Security and privacy are two important issues in social networks. This book, divided into four chapters, approaches the topic from a research perspective. It is recommended for researchers interested in security and privacy concerns in mobile social networks. (Mercedes Martínez González, Computing Reviews, July, 2014)

1 Overview
1(18)
1.1 Mobile Social Network
1(4)
1.1.1 Mobile Social Network
1(2)
1.1.2 Mobile Applications
3(2)
1.2 Characteristics of MSN
5(4)
1.2.1 Multiple Communication Domains
5(1)
1.2.2 Social Behavior
6(1)
1.2.3 Social Graph
7(1)
1.2.4 Security and Privacy
7(2)
1.3 Research Topics in Mobile Social Network
9(2)
1.4 Security Primitives
11(8)
1.4.1 K Anonymity
11(1)
1.4.2 Multiple Pseudonym Technique
11(1)
1.4.3 Prediction Method: Autoregression
12(1)
1.4.4 Cryptographic Techniques
13(6)
2 Profile Matching Protocol with Anonymity Enhancing Techniques
19(24)
2.1 Introduction
19(1)
2.2 Network Model and Design Goal
20(2)
2.2.1 Network Model
20(1)
2.2.2 Design Goal
20(2)
2.3 PPM Solutions
22(8)
2.3.1 Approach 1: Explicit Comparison-Based Approach
24(2)
2.3.2 Approach 2: Implicit Comparison-Based Approach
26(2)
2.3.3 Approach 3: Implicit Predicate-Based Approach
28(2)
2.4 Anonymity Enhancing Techniques
30(4)
2.4.1 Anonymity Measurement
30(2)
2.4.2 Anonymity Enhancement
32(2)
2.5 Performance Evaluation
34(5)
2.5.1 Simulation Setup
35(1)
2.5.2 Simulation Results
36(3)
2.6 Related Work
39(1)
2.7 Conclusion and Future Directions
40(3)
3 Cooperative Data Forwarding Strategy with Privacy Preservation
43(24)
3.1 Introduction
43(1)
3.2 Models and Design Goal
44(3)
3.2.1 Network Model and Social Behavior Model
44(2)
3.2.2 Design Goal
46(1)
3.3 PDF Solutions
47(11)
3.3.1 Overview of the Protocol
47(1)
3.3.2 Phase 1: Privacy-Preserving Route-Based Authentication
48(3)
3.3.3 Phase 2: Proximity Measurement
51(2)
3.3.4 Phase 3: Morality-Driven Data Forwarding
53(4)
3.3.5 Summary of Data Forwarding Strategy
57(1)
3.4 Performance Evaluation
58(6)
3.4.1 Simulation Settings
58(3)
3.4.2 Simulation Results
61(3)
3.5 Related Work
64(2)
3.6 Conclusion and Future Directions
66(1)
4 Recommendation-Based Trustworthy Service Evaluation
67(28)
4.1 Introduction
67(2)
4.2 System Model and Design Goal
69(2)
4.2.1 System Model
69(1)
4.2.2 Design Goal
70(1)
4.3 TSE Solutions
71(11)
4.3.1 Phase 1 of bTSE: Structured Reviews
72(1)
4.3.2 Phase 2 of bTSE: Token Generation
73(3)
4.3.3 Phase 3 of bTSE: Review Generation and Submission
76(2)
4.3.4 SrTSE
78(3)
4.3.5 Summary of bTSE and SrTSE
81(1)
4.4 Security Analysis
82(5)
4.4.1 Resilience to Review Linkability Attacks
82(1)
4.4.2 Resilience to Review Rejection Attacks
82(1)
4.4.3 Resilience to Review Modification Attacks
83(1)
4.4.4 Resilience to Sybil Attacks
84(1)
4.4.5 Numerical Results of Detecting Sybil Attack
85(2)
4.5 Performance Evaluation
87(4)
4.5.1 Simulation Setup
88(1)
4.5.2 Simulation Results
89(2)
4.6 Related Work
91(1)
4.7 Conclusion and Future Directions
92(3)
References 95