2020
DOI: 10.1109/jiot.2020.2986341
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy-Preserving Scheme for Interactive Messaging Over Online Social Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(8 citation statements)
references
References 40 publications
0
8
0
Order By: Relevance
“…The research presented in [43] identifies privacy bounds on the data of individuals' unique mobility traces; individuals' privacy is preserved by coarsening data spatially and temporally for anonymity. A mechanism for the preservation of privacy during message transmission was introduced in [44] via message obfuscation, using the message replication and sensitive attributes replacement strategy; the authors analyzed the social behaviors of each user in order to compute their credibility for privacy preservation in OSNs. The differential privacy scheme proposed in [45] combines different series to achieve privacy of all of the graph elements; the dK-1 series holds the degree frequency, the dK-2 series holds the joint degree frequency, and the linking knowledge between the edges is stored in the dK-3 series.…”
Section: Privacy Methods In Osnsmentioning
confidence: 99%
See 1 more Smart Citation
“…The research presented in [43] identifies privacy bounds on the data of individuals' unique mobility traces; individuals' privacy is preserved by coarsening data spatially and temporally for anonymity. A mechanism for the preservation of privacy during message transmission was introduced in [44] via message obfuscation, using the message replication and sensitive attributes replacement strategy; the authors analyzed the social behaviors of each user in order to compute their credibility for privacy preservation in OSNs. The differential privacy scheme proposed in [45] combines different series to achieve privacy of all of the graph elements; the dK-1 series holds the degree frequency, the dK-2 series holds the joint degree frequency, and the linking knowledge between the edges is stored in the dK-3 series.…”
Section: Privacy Methods In Osnsmentioning
confidence: 99%
“…Other different types of OSN graph-based methods [34][35][36][37][38][42][43][44] fail to achieve privacy in all of the components, i.e., nodes, edges, and attributes of nodes. In such techniques, attackers can efficiently utilize the structural information of anonymized network graphs, leading to information loss.…”
Section: Motivationmentioning
confidence: 99%
“…Believability is an individual's perception and there is no specific benchmarking to decide the quality of content (Cai et al, 2020;Shah et al, 2020). The same piece of information can be mentioned in diverse ways, depending upon the expertise, perception, and target user (Li, 2020) .…”
Section: Elsinoëampelina Elsinoaceae Incertaesedismentioning
confidence: 99%
“…By controlling the set of user attributes and the relationship among users to hide sensitive information, the proposed method resists against the set inference attack in the process of data publishing in social networks. Cai et al [38] proposed a privacy-preserving scheme for interactive messaging by leveraging user credibility and social behaviors, which guarantees the privacy protection in the process of information exchange through information confusion and sensitive attribute substitution. In order to solve the trust difficulties, Sharma et al [39] proposed a novel solution in the form of fission computing.…”
Section: Related Workmentioning
confidence: 99%