Interest-driven private friend recommendation

The emerging growth of online social networks has opened new doors for various kinds of applications such as business intelligence and expanding social connections through friend recommendations. In particular, friend recommendation facilitates users to explore new friendships based on social network structures, user profile information (similar interest) or both. However, as the privacy concerns of users are on the rise, searching for new friends is not a straightforward task under the assumption that users’ information is kept private. Along this direction, this paper proposes two private friend recommendation algorithms based on the social network structure and the users’ social tags. The first protocol is more efficient from a user’s perspective compared to the second protocol, and this efficiency gain comes at the expense of relaxing the underlying privacy assumptions. On the other hand, the second protocol provides the best security guarantee. In addition, we empirically analyze the complexities of the proposed protocols and provide various experimental results.

[1]  Oded Goldreich Foundations of Cryptography: Encryption Schemes , 2004 .

[2]  Starr Roxanne Hiltz,et al.  Trust and Privacy Concern Within Social Networking Sites: A Comparison of Facebook and MySpace , 2007, AMCIS.

[3]  Stanley Wasserman,et al.  Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.

[4]  Refik Molva,et al.  Analysis of Privacy in Online Social Networks from the Graph Theory Perspective , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[5]  Dinan Gunawardena,et al.  Social tags: meaning and suggestions , 2008, CIKM '08.

[6]  Aristides Gionis,et al.  Social Network Analysis and Mining for Business Applications , 2011, TIST.

[7]  A. Yao,et al.  Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.

[8]  Ravi Kumar,et al.  Structure and evolution of online social networks , 2006, KDD '06.

[9]  Chris Clifton,et al.  Privacy-preserving k-means clustering over vertically partitioned data , 2003, KDD '03.

[10]  Danah Boyd,et al.  Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..

[11]  Donna M. Ehrlich Social network survey paper , 2006 .

[12]  Dawn Xiaodong Song,et al.  Privacy-Preserving Set Operations , 2005, CRYPTO.

[13]  Chris Clifton,et al.  AC-Framework for Privacy-Preserving Collaboration , 2007, SDM.

[14]  Wesley W. Chu,et al.  A Social Network-Based Recommender System (SNRS) , 2010, Data Mining for Social Network Data.

[15]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[16]  Bernardo A. Huberman,et al.  Predicting the Future with Social Media , 2010, Web Intelligence.

[17]  Ashwin Machanavajjhala,et al.  Personalized Social Recommendations - Accurate or Private? , 2011, Proc. VLDB Endow..

[18]  Silvio Micali,et al.  The knowledge complexity of interactive proof-systems , 1985, STOC '85.

[19]  Jing Wang,et al.  TagNetLens: multiscale visualization of knowledge structures in social tags , 2010, VINCI '10.

[20]  Xing Xie,et al.  Potential Friend Recommendation in Online Social Network , 2010, 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing.

[21]  Benny Pinkas,et al.  Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.

[22]  Chris Clifton,et al.  Efficient privacy-preserving similar document detection , 2010, The VLDB Journal.

[23]  Jaime Delgado,et al.  User's privacy in applications provided through social networks , 2010, WSM@MM.

[24]  Peng Liu,et al.  Stalking online: on user privacy in social networks , 2012, CODASPY '12.

[25]  Michael J. Muller,et al.  Make new friends, but keep the old: recommending people on social networking sites , 2009, CHI.

[26]  Chris Clifton,et al.  Similar Document Detection with Limited Information Disclosure , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[27]  Jon Kleinberg,et al.  KDD '07: Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining , 2007, KDD 2007.

[28]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[29]  Rajeev Motwani,et al.  Link Privacy in Social Networks , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[30]  Jun Hu,et al.  Security Issues in Online Social Networks , 2011, IEEE Internet Computing.

[31]  Ran Canetti,et al.  Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.

[32]  Balachander Krishnamurthy,et al.  Characterizing privacy in online social networks , 2008, WOSN '08.

[33]  Krishna P. Gummadi,et al.  Measurement and analysis of online social networks , 2007, IMC '07.

[34]  Wei Jiang,et al.  Structural and Message Based Private Friend Recommendation , 2012, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.

[35]  Rajeev Motwani,et al.  Link Privacy in Social Networks , 2008, ICDE.

[36]  Wei Jiang,et al.  N-Gram Based Secure Similar Document Detection , 2011, DBSec.

[37]  David Liben-Nowell,et al.  The link-prediction problem for social networks , 2007 .

[38]  Vijay V. Raghavan,et al.  Proceedings: 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology—Workshops , 2010 .

[39]  Edgar R. Weippl,et al.  Cheap and automated socio-technical attacks based on social networking sites , 2010, AISec '10.

[40]  Michael R. Lyu,et al.  Improving Recommender Systems by Incorporating Social Contextual Information , 2011, TOIS.

[41]  J. Shane Culpepper,et al.  Efficient set intersection for inverted indexing , 2010, TOIS.

[42]  Bart Goethals,et al.  On Private Scalar Product Computation for Privacy-Preserving Data Mining , 2004, ICISC.

[43]  Keith W. Ross,et al.  Facebook users have become much more private: A large-scale study , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops.

[44]  Silvio Micali,et al.  How to play ANY mental game , 1987, STOC.

[45]  George D. C. Cavalcanti,et al.  A graph-based friend recommendation system using Genetic Algorithm , 2010, IEEE Congress on Evolutionary Computation.

[46]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[47]  Chris Clifton,et al.  Transforming Semi-Honest Protocols to Ensure Accountability , 2006, ICDM Workshops.

[48]  Shuchuan Lo,et al.  WMR--A Graph-Based Algorithm for Friend Recommendation , 2006, 2006 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2006 Main Conference Proceedings)(WI'06).

[49]  Jun Guo,et al.  SFViz: interest-based friends exploration and recommendation in social networks , 2011, VINCI '11.

[50]  Oded Goldreich,et al.  Foundations of Cryptography: General Cryptographic Protocols , 2004 .

[51]  Bi-Ru Dai,et al.  A Framework of Recommendation System Based on Both Network Structure and Messages , 2011, 2011 International Conference on Advances in Social Networks Analysis and Mining.

[52]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[53]  Benny Pinkas,et al.  FairplayMP: a system for secure multi-party computation , 2008, CCS.

[54]  Yehuda Lindell,et al.  Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series) , 2007 .

[55]  Jon M. Kleinberg,et al.  Challenges in mining social network data: processes, privacy, and paradoxes , 2007, KDD '07.

[56]  Yehuda Lindell,et al.  Introduction to Modern Cryptography , 2004 .

[57]  Jonathan Katz,et al.  Introduction to Modern Cryptography: Principles and Protocols , 2007 .

[58]  David M. Nicol,et al.  unFriendly: Multi-party Privacy Risks in Social Networks , 2010, Privacy Enhancing Technologies.

[59]  Sushil J. Louis,et al.  Friend recommendations in social networks using genetic algorithms and network topology , 2011, 2011 IEEE Congress of Evolutionary Computation (CEC).

[60]  Yin Zhang,et al.  Secure friend discovery in mobile social networks , 2011, 2011 Proceedings IEEE INFOCOM.