Group privacy matching method based on permutation matrix

A permutation matrix and privacy technology, applied in the field of network security, can solve problems such as no effective solutions, achieve the effects of reducing time complexity, improving feasibility, and solving single-point damage attacks

Active Publication Date: 2015-11-18
XIDIAN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the current common privacy matching schemes are for the matching between two users, and the matching between users and user groups. There is currently no effective solution for the security matching between groups.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Group privacy matching method based on permutation matrix
  • Group privacy matching method based on permutation matrix
  • Group privacy matching method based on permutation matrix

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The core idea of ​​the present invention is to use the permutation function based on the permutation matrix to realize the confusion of the weights of the private attribute keywords of the group members, so as to effectively protect the privacy of the group members; The degree of matching between groups; the introduction of a trusted organization TA can effectively manage the permutation function of group members and the corresponding inverse permutation function, so as to solve the problem of single-point destruction attacks in the matching process, and ensure the relationship between groups in the system. For efficient and secure matching.

[0042] refer to figure 1 , the communication system used in the present invention includes: a trusted organization TA, an initiating group G I , the response group G R : Initiating group G I with the response group G R Communication between members and other members in the same user group is carried out through wireless networ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a group privacy matching method based on a permutation matrix. The method is mainly used for solving the problem that the groups can not effectively perform safe matching with each other in the existing mobile social networking services. The implementation procedure of the method is as follows: (1) determining a communication mode of a matching system; (2) generating a group privacy matching matrix; (3) initiating a matching request through an initiation group and giving a response to the matching request through a response group; (4) generating a matrix to be matched based on the group privacy matching matrix; (5) calculating a weighted Manhattan distance matrix based on the matrix to be matched; (6) calculating a matching value between the groups; and (7) judging whether the matching is successful according to the matching value. By using the permutation matrix, the method of the invention obscures the weight of the attribute keyword corresponding to the group member and effectively protects the privacy information of a user. Simultaneously, by introducing trusted authority TA, the method of the invention effectively avoids a single-point destruction attack, improves security and feasibility of a matching process, and can be applied to the safe matching among groups in the mobile social networking services.

Description

Technical field: [0001] The invention belongs to the technical field of network security, relates to the protection of personal privacy of group users, and can be used for group security matching and privacy protection in mobile social networks. Background technique: [0002] With the continuous improvement of Internet technology, social networks, especially mobile social networks, have been widely developed. A social network is a form of social communication groups developed naturally with the application of the Internet such as Email, BBS, blog, Weibo, etc. platform. At the same time, mobile terminal devices such as smart phones and tablet computers have become popular, and the use of mobile terminal devices to access social networks has become more and more popular, and mobile social networks have gradually become mainstream. The latest report released in February 2013 shows that more than half of the world's social network users access social networks through mobile de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08G06F21/62
Inventor 朱晓妍陈增宝苏阳高曼飞裴庆祺
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products