Authentication With Block-Chain Algorithm and Text Encryption Protocol in Calculation of Social Network

Community detection is an important aspect of social network analysis, but social factors such as user intimacy, influence, and user interaction behavior are often overlooked as important factors. Most of the existing methods are single classification algorithms; multi-classification algorithms that...

Full description

Bibliographic Details
Main Authors: Ruiguo Yu, Jianrong Wang, Tianyi Xu, Jie Gao, Yongli An, Gong Zhang, Mei Yu
Format: Article
Language:English
Published: IEEE 2017-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8100712/
id doaj-91003c0153454f37b9f726bcab35280c
record_format Article
spelling doaj-91003c0153454f37b9f726bcab35280c2021-03-29T19:57:59ZengIEEEIEEE Access2169-35362017-01-015249442495110.1109/ACCESS.2017.27672858100712Authentication With Block-Chain Algorithm and Text Encryption Protocol in Calculation of Social NetworkRuiguo Yu0Jianrong Wang1Tianyi Xu2Jie Gao3Yongli An4https://orcid.org/0000-0001-6563-888XGong Zhang5Mei Yu6School of Computer Science and Technology, Tianjin University, Tianjin, ChinaSchool of Computer Science and Technology, Tianjin University, Tianjin, ChinaSchool of Computer Science and Technology, Tianjin University, Tianjin, ChinaSchool of Computer Science and Technology, Tianjin University, Tianjin, ChinaSchool of Computer Science and Technology, Tianjin University, Tianjin, ChinaSchool of Computer Science and Technology, Tianjin University, Tianjin, ChinaSchool of Computer Science and Technology, Tianjin University, Tianjin, ChinaCommunity detection is an important aspect of social network analysis, but social factors such as user intimacy, influence, and user interaction behavior are often overlooked as important factors. Most of the existing methods are single classification algorithms; multi-classification algorithms that can discover overlapping communities are still incomplete. In former works, we calculated intimacy based on the relationship between users, and divided them into their social communities based on intimacy. However, a malicious user can obtain the other user relationships, thus to infer other users interests, and even pretend to be the another user to cheat others. Therefore the information users concerned about needs to be transferred in the manner of privacy protection. In this paper, we propose an efficient privacy preserving algorithm to preserve the privacy of information in social networks. First, during expansion of communities on the base of mining seed, in order to prevent others from malicious users, we verify their identities after they send a request. We make use of the recognition and nontampering of the block chain to store the user's public key and bind to the block address, which is used for authentication. At the same time, in order to prevent the honest but curious users from illegal access to other users' information, we do not send plaintext directly after the authentication, but hash the attributes by mixed hash encryption to make sure that users can only calculate the matching degree rather than know specific information of other users. Analysis shows that our protocol would serve well against different types of attacks.https://ieeexplore.ieee.org/document/8100712/Information protectionblock chainhash encryptiontext encryption protocol
collection DOAJ
language English
format Article
sources DOAJ
author Ruiguo Yu
Jianrong Wang
Tianyi Xu
Jie Gao
Yongli An
Gong Zhang
Mei Yu
spellingShingle Ruiguo Yu
Jianrong Wang
Tianyi Xu
Jie Gao
Yongli An
Gong Zhang
Mei Yu
Authentication With Block-Chain Algorithm and Text Encryption Protocol in Calculation of Social Network
IEEE Access
Information protection
block chain
hash encryption
text encryption protocol
author_facet Ruiguo Yu
Jianrong Wang
Tianyi Xu
Jie Gao
Yongli An
Gong Zhang
Mei Yu
author_sort Ruiguo Yu
title Authentication With Block-Chain Algorithm and Text Encryption Protocol in Calculation of Social Network
title_short Authentication With Block-Chain Algorithm and Text Encryption Protocol in Calculation of Social Network
title_full Authentication With Block-Chain Algorithm and Text Encryption Protocol in Calculation of Social Network
title_fullStr Authentication With Block-Chain Algorithm and Text Encryption Protocol in Calculation of Social Network
title_full_unstemmed Authentication With Block-Chain Algorithm and Text Encryption Protocol in Calculation of Social Network
title_sort authentication with block-chain algorithm and text encryption protocol in calculation of social network
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2017-01-01
description Community detection is an important aspect of social network analysis, but social factors such as user intimacy, influence, and user interaction behavior are often overlooked as important factors. Most of the existing methods are single classification algorithms; multi-classification algorithms that can discover overlapping communities are still incomplete. In former works, we calculated intimacy based on the relationship between users, and divided them into their social communities based on intimacy. However, a malicious user can obtain the other user relationships, thus to infer other users interests, and even pretend to be the another user to cheat others. Therefore the information users concerned about needs to be transferred in the manner of privacy protection. In this paper, we propose an efficient privacy preserving algorithm to preserve the privacy of information in social networks. First, during expansion of communities on the base of mining seed, in order to prevent others from malicious users, we verify their identities after they send a request. We make use of the recognition and nontampering of the block chain to store the user's public key and bind to the block address, which is used for authentication. At the same time, in order to prevent the honest but curious users from illegal access to other users' information, we do not send plaintext directly after the authentication, but hash the attributes by mixed hash encryption to make sure that users can only calculate the matching degree rather than know specific information of other users. Analysis shows that our protocol would serve well against different types of attacks.
topic Information protection
block chain
hash encryption
text encryption protocol
url https://ieeexplore.ieee.org/document/8100712/
work_keys_str_mv AT ruiguoyu authenticationwithblockchainalgorithmandtextencryptionprotocolincalculationofsocialnetwork
AT jianrongwang authenticationwithblockchainalgorithmandtextencryptionprotocolincalculationofsocialnetwork
AT tianyixu authenticationwithblockchainalgorithmandtextencryptionprotocolincalculationofsocialnetwork
AT jiegao authenticationwithblockchainalgorithmandtextencryptionprotocolincalculationofsocialnetwork
AT yonglian authenticationwithblockchainalgorithmandtextencryptionprotocolincalculationofsocialnetwork
AT gongzhang authenticationwithblockchainalgorithmandtextencryptionprotocolincalculationofsocialnetwork
AT meiyu authenticationwithblockchainalgorithmandtextencryptionprotocolincalculationofsocialnetwork
_version_ 1724195536892854272