what-when-how
In Depth Tutorials and Information
Besides, Reference 19 proposes a client-server physical architecture which can mini-
mize the data leakage. A server in the architecture can separate the data and com-
munications that are encrypted between the server and client. In Reference 19,
there must be a third party managing the server to preserve the privacy.
Reference 19 provides the collaborative social network addition protocol as follows:
10.5.1.1 Protocol Definitions
10.5.1.1.1 Objects
S : he collaborative social network, which is a set of social networks
S ( o,e ):
O : A node within the social network n ; note that o is already hashed with
function h ( ) as it is created from hashed data
O j : he set of social networks that have provided these attributes; this
numbering is held at the individual attributes level
e : A set of edges related to node o
e i : he set of social networks that have provided this edge
S r : he resulting social network from a user query
N : A social network being added to S
N ( d,g ):
d : A node within the social network N
g : A set of edges related to node o
R : A revocation social network being removed from S ; note that R = N for
social network identification purposes
R ( d,g ):
d : A node within the social network R
g : A set of edges related to node o
U : A user of S
U q : A query containing attributes to look for within S
10.5.1.1.2 Functions
a ( o ): An attribute or set of attributes of a node which can be used to uniquely
identify the node
h ( ): A secure hash function. For example, SHA 512
10.5.1.1.3 Protocol Algorithm
For N ( d = [1... n ], g )
N ( h ( d ), g ) is sent to S
Search WWH ::




Custom Search