Back to Search
Start Over
Authentication With Block-Chain Algorithm and Text Encryption Protocol in Calculation of Social Network
- Source :
- IEEE Access, Vol 5, Pp 24944-24951 (2017)
- Publication Year :
- 2017
- Publisher :
- Institute of Electrical and Electronics Engineers (IEEE), 2017.
-
Abstract
- Community detection is an important aspect of social network analysis, but social factors such as user intimacy, influence, and user interaction behavior are often overlooked as important factors. Most of the existing methods are single classification algorithms; multi-classification algorithms that can discover overlapping communities are still incomplete. In former works, we calculated intimacy based on the relationship between users, and divided them into their social communities based on intimacy. However, a malicious user can obtain the other user relationships, thus to infer other users interests, and even pretend to be the another user to cheat others. Therefore the information users concerned about needs to be transferred in the manner of privacy protection. In this paper, we propose an efficient privacy preserving algorithm to preserve the privacy of information in social networks. First, during expansion of communities on the base of mining seed, in order to prevent others from malicious users, we verify their identities after they send a request. We make use of the recognition and nontampering of the block chain to store the user's public key and bind to the block address, which is used for authentication. At the same time, in order to prevent the honest but curious users from illegal access to other users' information, we do not send plaintext directly after the authentication, but hash the attributes by mixed hash encryption to make sure that users can only calculate the matching degree rather than know specific information of other users. Analysis shows that our protocol would serve well against different types of attacks.
- Subjects :
- Challenge-Handshake Authentication Protocol
Otway–Rees protocol
General Computer Science
Computer science
Hash function
02 engineering and technology
computer.software_genre
Encryption
Public-key cryptography
Multiple encryption
Filesystem-level encryption
020204 information systems
Lightweight Extensible Authentication Protocol
0202 electrical engineering, electronic engineering, information engineering
General Materials Science
Data Authentication Algorithm
Authentication
Social network
business.industry
General Engineering
Cryptographic protocol
text encryption protocol
Disk encryption
Probabilistic encryption
Authentication protocol
40-bit encryption
56-bit encryption
Information protection
020201 artificial intelligence & image processing
lcsh:Electrical engineering. Electronics. Nuclear engineering
On-the-fly encryption
business
block chain
hash encryption
lcsh:TK1-9971
computer
Algorithm
Computer network
Subjects
Details
- ISSN :
- 21693536
- Volume :
- 5
- Database :
- OpenAIRE
- Journal :
- IEEE Access
- Accession number :
- edsair.doi.dedup.....154269e90b1fbf851bc98b0715120015
- Full Text :
- https://doi.org/10.1109/access.2017.2767285