Please enable JavaScript.
Coggle requires JavaScript to display documents.
2 Surveys Summary (Privacy-preserving schemes for Ad Hoc Social Networks:…
2 Surveys Summary
Privacy-preserving schemes for Ad Hoc Social Networks: A survey
Network Models
Mobile social network
social profile
social morality
social routing
social health
location-based services
service-oriented sociality
Vehicular social network
social spots
location-based services
service-oriented sociality
Privacy-preserving Model/Scheme
Identity privacy
Location privacy
Anonymity- Untraceability
Traceability
Interest privacy
Backward privacy
Content oriented privacy
Attacks of Leaking Privacy
Information gain/loss
Location-based attack
Eavesdropping-based attack
Service-based attack
Manipulation-based attack
Identity-based attack
Countermeasures
Symmetric-key primitives
symmetric key-ciphers
keyed hash function
pseudo-random sequences
Public-key primitives
public-key encryptions
signatures
Unkeyed primitives
hash functions
random sequences
Game theoretic approaches
(To prove the feasibility of privacy-preserving schemes in practice)
Technical Privacy Metrics: A Systematic Survey
Privacy Domains
Communication system
Database (including SQL query, data mining, ...)
Location-based services
Smart metering
Social networks
Genome privacy
Output Measures (metrics)
Uncertainty
Information gain/loss
Data similarity
Indistinguishability
Success probability
Error
Time
Accuracy or percision
Characteristics of Privacy Metrics (Adversary View)
Adversary goals
Adversary capabilities
local-global
active-passive
internal-external
static-adaptive
prior knowledge
resources
Data sources
Inputs for computation of metrics
Output measures (8 kinds of properties)