scispace - formally typeset
Proceedings ArticleDOI

Verifiable social data outsourcing

TLDR
This paper proposes three schemes for verifiable queries over outsourced social data that require the OSN provider to generate some cryptographic auxiliary information, based on which the SDP can construct a verification object for the data consumer to verify the query-result trustworthiness.
Abstract
Social data outsourcing is an emerging paradigm for effective and efficient access to the social data. In such a system, a third-party Social Data Provider (SDP) purchases complete social datasets from Online Social Network (OSN) operators and then resells them to data consumers who can be any individuals or entities desiring the complete social data satisfying some criteria. The SDP cannot be fully trusted and may return wrong query results to data consumers by adding fake data and deleting/modifying true data in favor of the businesses willing to pay. In this paper, we initiate the study on verifiable social data outsourcing whereby a data consumer can verify the trustworthiness of the social data returned by the SDP. We propose three schemes for verifiable queries over outsourced social data. The three schemes all require the OSN provider to generate some cryptographic auxiliary information, based on which the SDP can construct a verification object for the data consumer to verify the query-result trustworthiness. They differ in how the auxiliary information is generated and how the verification object is constructed and verified. Extensive experiments based on a real Twitter dataset confirm the high efficacy and efficiency of our schemes.

read more

Citations
More filters
Journal ArticleDOI

Task Scheduling for Smart City Applications Based on Multi-Server Mobile Edge Computing

TL;DR: This paper introduces a cooperative strategy for IoV and formulates an optimization problem to minimize the completion time with a specified cost and develops four evolving variants based on the alternating direction method of multipliers (ADMM) algorithm to solve the proposed problem.
Journal ArticleDOI

Predict and Forward: An Efficient Routing-Delivery Scheme Based on Node Profile in Opportunistic Networks

TL;DR: This study constructs an efficient routing-delivery scheme (P Predict and Forward) based on node profile for the opportunistic networks and implements the optimal transmission for Prelearn messages by dividing the complex data transmission process into two different phases (Predict and Forward).
Journal ArticleDOI

LDP-Based Social Content Protection for Trending Topic Recommendation

TL;DR: A novel local DP-based TTR (LDPTR) scheme to perform high-quality online TTR services while achieving local privacy-preserving social contents and a dynamic graph-based CSI (DGCSI) algorithm is proposed to protect the online social content privacy while ensuring data usability.
Journal Article

Authenticated Data Structures for Graph and Geometric Searching

TL;DR: Following in the spirit of data structure and algorithm correctness checking, authenticated data structures provide cryptographic proofs that their answers are as accurate as the author intended, even if the data structure is being maintained by a remote host.
Journal ArticleDOI

Verifiable Keyword-Based Semantic Similarity Search on Social Data Outsourcing

TL;DR: An emerging social data outsourcing paradigm in which different online social network (OSN) operators outsource their social data to a third-party social data provider (SDP), who resells them to data consumers who can be any individual or entities is considered.
References
More filters
Journal ArticleDOI

Space/time trade-offs in hash coding with allowable errors

TL;DR: Analysis of the paradigm problem demonstrates that allowing a small number of test messages to be falsely identified as members of the given set will permit a much smaller hash area to be used without increasing reject time.
Journal ArticleDOI

Network Applications of Bloom Filters: A Survey

TL;DR: The aim of this paper is to survey the ways in which Bloom filters have been used and modified in a variety of network problems, with the aim of providing a unified mathematical and practical framework for understanding them and stimulating their use in future applications.
Book ChapterDOI

A Certified Digital Signature

TL;DR: A practical digital signature system based on a conventionalryption function which is as secure as the conventional encryption function is described, without the several years delay required for certification of an untested system.
Posted Content

Is the Sample Good Enough? Comparing Data from Twitter's Streaming API with Twitter's Firehose

TL;DR: Data collected using Twitter's sampled API service is compared with data collected using the full, albeit costly, Firehose stream that includes every single published tweet to help researchers and practitioners understand the implications of using the Streaming API.
Proceedings ArticleDOI

Providing database as a service

TL;DR: A novel paradigm for data management in which a third party service provider hosts "database as a service", providing its customers with seamless mechanisms to create, store, and access their databases at the host site is explored.
Related Papers (5)