Fractal Intelligent Privacy Protection in Online Social Network Using Attribute-Based Encryption Schemes

While the online social network (OSN) has brought much convenience to users, there are still some serious problems, such as personal privacy leaks. Today, OSN security and privacy protection are one of the most important focuses of the research. In this paper, we present an intelligent privacy protection approach to solve problems of security and privacy protection in OSNs. First, the proposed algorithm combines a neural network with a hybrid hierarchy genetic algorithm and radial basis function, which is used to construct a prediction model of OSN security. Then, a support vector machine is applied to preprocess information of the OSN, and the attribute-based encryption scheme is adopted to encrypt the OSN information. Finally, a particle swarm optimization algorithm is used to improve OSN security and privacy protection. The experimental results demonstrate the effectiveness of the proposed method.

[1]  Bin Zhou,et al.  Holes Detection in Anisotropic Sensornets: Topological Methods , 2012, Int. J. Distributed Sens. Networks.

[2]  Refik Molva,et al.  Safebook: A privacy-preserving online social network leveraging on real-life trust , 2009, IEEE Communications Magazine.

[3]  Refik Molva,et al.  On the Security and Feasibility of Safebook: A Distributed Privacy-Preserving Online Social Network , 2009, PrimeLife.

[4]  Ronald E. Leenes Context Is Everything Sociality and Privacy in Online Social Network Sites , 2009, PrimeLife.

[5]  Houbing Song,et al.  Imperfect Information Dynamic Stackelberg Game Based Resource Allocation Using Hidden Markov for Cloud Computing , 2018, IEEE Transactions on Services Computing.

[6]  R. Kalaiselvi,et al.  SCALABLE AND SECURE SHARING OF PERSONAL HEALTH RECORDS IN CLOUD COMPUTING , 2016 .

[7]  Peiyi Shen,et al.  Combined Energy Minimization for Image Reconstruction from Few Views , 2012 .

[8]  Jie Wu,et al.  Stability-Optimal Grouping Strategy of Peer-to-Peer Systems , 2011, IEEE Transactions on Parallel and Distributed Systems.

[9]  Alexandros André Chaaraoui,et al.  Visual privacy protection methods: A survey , 2015, Expert Syst. Appl..

[10]  Zhongzhi Shi,et al.  Editorial: Track on Intelligent Computing and Applications , 2014 .

[11]  G. Loewenstein,et al.  Privacy and human behavior in the age of information , 2015, Science.

[12]  Fatos Xhafa,et al.  Intelligent computing in large-scale systems , 2015, Knowl. Eng. Rev..

[13]  De-Shuang Huang Special issue on advanced intelligent computing theories and applications , 2015, Neurocomputing.

[14]  Umit Topaloglu,et al.  Social network analysis of biomedical research collaboration networks in a CTSA institution , 2014, J. Biomed. Informatics.

[15]  Vinod Vokkarane,et al.  A Study of Online Social Network Privacy Via the TAPE Framework , 2015, IEEE Journal of Selected Topics in Signal Processing.

[16]  Song Guo,et al.  Big Data Meet Green Challenges: Greening Big Data , 2016, IEEE Systems Journal.

[17]  Jiantao Zhou,et al.  Distributional Fractal Creating Algorithm in Parallel Environment , 2013, Int. J. Distributed Sens. Networks.

[18]  Qing Tian,et al.  Cross-heterogeneous-database age estimation through correlation representation learning , 2017, Neurocomputing.

[19]  L. Wang,et al.  GI/Geom/1 queue based on communication model for mesh networks , 2014, Int. J. Commun. Syst..

[20]  Yi-Bing Lin,et al.  Network security management with traffic pattern clustering , 2014, Soft Comput..

[21]  Jun Li,et al.  SOUP: an online social network by the people, for the people , 2015, SIGCOMM 2015.

[22]  Ian Flood,et al.  Predicting Owner's Contingency for Transportation Construction Projects Using Intelligent Computing Techniques , 2009 .

[23]  Yu Xue,et al.  A self-adaptive artificial bee colony algorithm based on global best for global optimization , 2017, Soft Computing.

[24]  Gang Chen,et al.  Supporting Privacy Protection in Personalized Web Search , 2014, IEEE Transactions on Knowledge and Data Engineering.

[25]  Wei Wei,et al.  Research and Simulation of Queue Management Algorithms in Ad Hoc Networks Under DDoS Attack , 2017, IEEE Access.

[26]  Nicholas Christakis,et al.  The Taste for Privacy: An Analysis of College Student Privacy Settings in an Online Social Network , 2008, J. Comput. Mediat. Commun..

[27]  Gulshan Kumar,et al.  Network security – an updated perspective , 2014 .

[28]  Sayyed Mohsen Allameh,et al.  Online Social Network , 2012 .

[29]  Amar Dhand,et al.  Leadership in neurology: A social network analysis , 2014, Annals of neurology.

[30]  Yong Qi,et al.  Information Potential Fields Navigation in Wireless Ad-Hoc Sensor Networks , 2011, Sensors.

[31]  Hari M. Srivastava,et al.  A Local Fractional Integral Inequality on Fractal Space Analogous to Anderson’s Inequality , 2014 .

[32]  Song Guo,et al.  Big Data Meet Green Challenges: Big Data Toward Green Applications , 2016, IEEE Systems Journal.

[33]  Jing Zhang,et al.  A Bijection between Lattice-Valued Filters and Lattice-Valued Congruences in Residuated Lattices , 2013 .

[34]  Yunhao Liu,et al.  Challenges, Designs, and Performances of Large-Scale Open-P2SP Content Distribution , 2013, IEEE Transactions on Parallel and Distributed Systems.

[35]  Yan Liu,et al.  On the source switching problem of Peer-to-Peer streaming , 2010, J. Parallel Distributed Comput..

[36]  László Gyarmati,et al.  Measuring user behavior in online social networks , 2010, IEEE Network.

[37]  Jin Wang,et al.  Mutual Verifiable Provable Data Auditing in Public Cloud Storage , 2015 .

[38]  Jiantao Zhou,et al.  Fractal property of generalized M-set with rational number exponent , 2013, Appl. Math. Comput..

[39]  Wei Wei,et al.  Gradient-driven parking navigation using a continuous information potential field based on wireless sensor network , 2017, Inf. Sci..

[40]  John Keeney,et al.  Multilevel pattern mining architecture for automatic network monitoring in heterogeneous wireless communication networks , 2016, China Communications.

[41]  Quanyan Zhu,et al.  Game theory meets network security and privacy , 2013, CSUR.

[42]  Julián Salas,et al.  A data driven anonymization system for information rich online social network graphs , 2016, Expert Syst. Appl..

[43]  Chengwen Xing,et al.  Performance Analysis of DF Cooperative Diversity System With OSTBC Over Spatially Correlated Nakagami-$m$ Fading Channels , 2014, IEEE Transactions on Vehicular Technology.

[44]  Vitoantonio Bevilacqua,et al.  Genetic Algorithm and Neural Network Based Classification in Microarray Data Analysis with Biological Validity Assessment , 2006, ICIC.

[45]  Jinsong Wu,et al.  Green wireless communications: from concept to reality [Industry Perspectives] , 2012, IEEE Wireless Communications.

[46]  Jiang-She Zhang,et al.  Big data analytics enabled by feature extraction based on partial independence , 2017, Neurocomputing.

[47]  Stefano Chessa,et al.  SIDEMAN: Service Discovery in Mobile Social Networks , 2016, Ad Hoc Sens. Wirel. Networks.

[48]  Dan Guo Privacy Protection in E-commerce: Identity-based Anonymous Privacy Agent , 2014 .

[49]  李振华,et al.  Offline Downloading in China: A Comparative Study , 2015, ACM/SIGCOMM Internet Measurement Conference.

[50]  Jiantao Zhou,et al.  Distribution of primary additional errors in fractal encoding method , 2014, Multimedia Tools and Applications.

[51]  Yunhao Liu,et al.  Towards Network-level Efficiency for Cloud Storage Services , 2014, Internet Measurement Conference.

[52]  Joon S. Park,et al.  Trusted Online Social Network (OSN) services with optimal data management , 2014, Comput. Secur..

[53]  Richard Van Noorden Online collaboration: Scientists and the social network , 2014, Nature.

[54]  Xi Chen,et al.  Privacy Issues and Solutions in Social Network Sites , 2012, IEEE Technology and Society Magazine.

[55]  Johan Bollen,et al.  Twitter mood predicts the stock market , 2010, J. Comput. Sci..

[56]  Tania Rabesandratana Europe. E.U. privacy protection bill would hamper research, scientists warn. , 2014, Science.

[57]  Yuxiang Wang,et al.  Construction of Tree Network with Limited Delivery Latency in Homogeneous Wireless Sensor Networks , 2014, Wirel. Pers. Commun..

[58]  Gang Liu,et al.  Towards Cost-Effective Cloud Downloading with Tencent Big Data , 2015, Journal of Computer Science and Technology.

[59]  Xiaochun Cheng,et al.  Numeric characteristics of generalized M-set with its asymptote , 2014, Appl. Math. Comput..

[60]  Cliff Lampe,et al.  Cultivating Social Resources on Social Network Sites: Facebook Relationship Maintenance Behaviors and Their Role in Social Capital Processes , 2014, J. Comput. Mediat. Commun..

[61]  Minjie Zhang,et al.  A belief propagation-based method for task allocation in open and dynamic cloud environments , 2017, Knowl. Based Syst..

[62]  Jinsong Wu,et al.  New Constructions of Codebooks Nearly Meeting the Welch Bound With Equality , 2014, IEEE Transactions on Information Theory.

[63]  Zhi-Li Zhang,et al.  Coarse-grained cloud synchronization mechanism design may lead to severe traffic overuse , 2013 .

[64]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[65]  Joel J. P. C. Rodrigues,et al.  Exploring Social Networks and Improving Hypertext Results for Cloud Solutions , 2016, Mob. Networks Appl..

[66]  Che-Hung Liu,et al.  Evaluating and selecting the biometrics in network security , 2015, Secur. Commun. Networks.

[67]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[68]  Bobby Bhattacharjee,et al.  Persona: an online social network with user-defined privacy , 2009, SIGCOMM '09.

[69]  Na Li,et al.  Preserving Relation Privacy in Online Social Network Data , 2011, IEEE Internet Computing.