what-when-how
In Depth Tutorials and Information
Besides, Reference 19 proposes a client-server physical architecture which can mini-
mize the data leakage. A server in the architecture can separate the data and com-
munications that are encrypted between the server and client. In Reference 19,
there must be a third party managing the server to preserve the privacy.
Reference 19 provides the collaborative social network addition protocol as follows:
10.5.1.1 Protocol Definitions
10.5.1.1.1 Objects
◾
S
: he collaborative social network, which is a set of social networks
−
S
(
o,e
):
◾
O
: A node within the social network
n
; note that
o
is already hashed with
function
h
( ) as it is created from hashed data
−
O
j
: he set of social networks that have provided these attributes; this
numbering is held at the individual attributes level
◾
e
: A set of edges related to node
o
−
e
i
: he set of social networks that have provided this edge
−
S
r
: he resulting social network from a user query
◾
N
: A social network being added to
S
−
N
(
d,g
):
◾
d
: A node within the social network
N
◾
g
: A set of edges related to node
o
◾
R
: A revocation social network being removed from
S
; note that
R
=
N
for
social network identification purposes
−
R
(
d,g
):
◾
d
: A node within the social network
R
◾
g
: A set of edges related to node o
◾
U
: A user of
S
◾
U
q
: A query containing attributes to look for within
S
10.5.1.1.2 Functions
◾
a
(
o
): An attribute or set of attributes of a node which can be used to uniquely
identify the node
◾
h
( ): A secure hash function. For example, SHA 512
10.5.1.1.3 Protocol Algorithm
For
N
(
d
= [1...
n
],
g
)
N
(
h
(
d
),
g
) is sent to
S