Authentication With Block-Chain Algorithm and Text Encryption Protocol in Calculation of Social Network
Community detection is an important aspect of social network analysis, but social factors such as user intimacy, influence, and user interaction behavior are often overlooked as important factors. Most of the existing methods are single classification algorithms; multi-classification algorithms that...
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2017-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8100712/ |
id |
doaj-91003c0153454f37b9f726bcab35280c |
---|---|
record_format |
Article |
spelling |
doaj-91003c0153454f37b9f726bcab35280c2021-03-29T19:57:59ZengIEEEIEEE Access2169-35362017-01-015249442495110.1109/ACCESS.2017.27672858100712Authentication With Block-Chain Algorithm and Text Encryption Protocol in Calculation of Social NetworkRuiguo Yu0Jianrong Wang1Tianyi Xu2Jie Gao3Yongli An4https://orcid.org/0000-0001-6563-888XGong Zhang5Mei Yu6School of Computer Science and Technology, Tianjin University, Tianjin, ChinaSchool of Computer Science and Technology, Tianjin University, Tianjin, ChinaSchool of Computer Science and Technology, Tianjin University, Tianjin, ChinaSchool of Computer Science and Technology, Tianjin University, Tianjin, ChinaSchool of Computer Science and Technology, Tianjin University, Tianjin, ChinaSchool of Computer Science and Technology, Tianjin University, Tianjin, ChinaSchool of Computer Science and Technology, Tianjin University, Tianjin, ChinaCommunity detection is an important aspect of social network analysis, but social factors such as user intimacy, influence, and user interaction behavior are often overlooked as important factors. Most of the existing methods are single classification algorithms; multi-classification algorithms that can discover overlapping communities are still incomplete. In former works, we calculated intimacy based on the relationship between users, and divided them into their social communities based on intimacy. However, a malicious user can obtain the other user relationships, thus to infer other users interests, and even pretend to be the another user to cheat others. Therefore the information users concerned about needs to be transferred in the manner of privacy protection. In this paper, we propose an efficient privacy preserving algorithm to preserve the privacy of information in social networks. First, during expansion of communities on the base of mining seed, in order to prevent others from malicious users, we verify their identities after they send a request. We make use of the recognition and nontampering of the block chain to store the user's public key and bind to the block address, which is used for authentication. At the same time, in order to prevent the honest but curious users from illegal access to other users' information, we do not send plaintext directly after the authentication, but hash the attributes by mixed hash encryption to make sure that users can only calculate the matching degree rather than know specific information of other users. Analysis shows that our protocol would serve well against different types of attacks.https://ieeexplore.ieee.org/document/8100712/Information protectionblock chainhash encryptiontext encryption protocol |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Ruiguo Yu Jianrong Wang Tianyi Xu Jie Gao Yongli An Gong Zhang Mei Yu |
spellingShingle |
Ruiguo Yu Jianrong Wang Tianyi Xu Jie Gao Yongli An Gong Zhang Mei Yu Authentication With Block-Chain Algorithm and Text Encryption Protocol in Calculation of Social Network IEEE Access Information protection block chain hash encryption text encryption protocol |
author_facet |
Ruiguo Yu Jianrong Wang Tianyi Xu Jie Gao Yongli An Gong Zhang Mei Yu |
author_sort |
Ruiguo Yu |
title |
Authentication With Block-Chain Algorithm and Text Encryption Protocol in Calculation of Social Network |
title_short |
Authentication With Block-Chain Algorithm and Text Encryption Protocol in Calculation of Social Network |
title_full |
Authentication With Block-Chain Algorithm and Text Encryption Protocol in Calculation of Social Network |
title_fullStr |
Authentication With Block-Chain Algorithm and Text Encryption Protocol in Calculation of Social Network |
title_full_unstemmed |
Authentication With Block-Chain Algorithm and Text Encryption Protocol in Calculation of Social Network |
title_sort |
authentication with block-chain algorithm and text encryption protocol in calculation of social network |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2017-01-01 |
description |
Community detection is an important aspect of social network analysis, but social factors such as user intimacy, influence, and user interaction behavior are often overlooked as important factors. Most of the existing methods are single classification algorithms; multi-classification algorithms that can discover overlapping communities are still incomplete. In former works, we calculated intimacy based on the relationship between users, and divided them into their social communities based on intimacy. However, a malicious user can obtain the other user relationships, thus to infer other users interests, and even pretend to be the another user to cheat others. Therefore the information users concerned about needs to be transferred in the manner of privacy protection. In this paper, we propose an efficient privacy preserving algorithm to preserve the privacy of information in social networks. First, during expansion of communities on the base of mining seed, in order to prevent others from malicious users, we verify their identities after they send a request. We make use of the recognition and nontampering of the block chain to store the user's public key and bind to the block address, which is used for authentication. At the same time, in order to prevent the honest but curious users from illegal access to other users' information, we do not send plaintext directly after the authentication, but hash the attributes by mixed hash encryption to make sure that users can only calculate the matching degree rather than know specific information of other users. Analysis shows that our protocol would serve well against different types of attacks. |
topic |
Information protection block chain hash encryption text encryption protocol |
url |
https://ieeexplore.ieee.org/document/8100712/ |
work_keys_str_mv |
AT ruiguoyu authenticationwithblockchainalgorithmandtextencryptionprotocolincalculationofsocialnetwork AT jianrongwang authenticationwithblockchainalgorithmandtextencryptionprotocolincalculationofsocialnetwork AT tianyixu authenticationwithblockchainalgorithmandtextencryptionprotocolincalculationofsocialnetwork AT jiegao authenticationwithblockchainalgorithmandtextencryptionprotocolincalculationofsocialnetwork AT yonglian authenticationwithblockchainalgorithmandtextencryptionprotocolincalculationofsocialnetwork AT gongzhang authenticationwithblockchainalgorithmandtextencryptionprotocolincalculationofsocialnetwork AT meiyu authenticationwithblockchainalgorithmandtextencryptionprotocolincalculationofsocialnetwork |
_version_ |
1724195536892854272 |