Second Degree Social Connections - Research on Friend-Matching Privacy Preserving Model in Mobile Social Networks

With the development of smart terminals and mobile social networks, users can find potential friends who have similar interests by sharing personal attribute profile in mobile social networks (MSN). However, the personal attribute profile usually contains sensitive information, and if this information is captured by attackers, it may cause unexpected consequences. So, in this paper we proposed a Second Degree Social Connections scheme, second degree social connection refers to the “familiar strangers” that you see but do not know every day from the circle of acquaintances in our daily life, friends of friends are in the social circle, etc. In this relationship, make friends matching can build trust relationship with each other.,,,, The scheme uses Chinese Remainder Theorem (CRT) and Secure Multi-Party Computation (SMC) techniques to guarantee that the attacker fails to get the real information of user's attribute profile, so the personal privacy can be protected during friend matching process. Finally, security analysis shows that the proposed scheme can protect the user's privacy effectively.

[1]  Roger Wattenhofer,et al.  VENETA: Serverless Friend-of-Friend Detection in Mobile Social Networking , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[2]  Guanhua Yan,et al.  Privacy-Preserving Profile Matching for Proximity-Based Mobile Social Networking , 2013, IEEE Journal on Selected Areas in Communications.

[3]  Jie Liu,et al.  Weight-aware private matching scheme for Proximity-based Mobile Social Networks , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[4]  Jian Dong,et al.  Throughput analysis of cognitive wireless acoustic sensor networks with energy harvesting , 2017, Future Gener. Comput. Syst..

[5]  Carmit Hazay,et al.  Computationally Secure Pattern Matching in the Presence of Malicious Adversaries , 2010, Journal of Cryptology.

[6]  Yehuda Lindell,et al.  Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries , 2008, SCN.

[7]  Mikhail J. Atallah,et al.  A secure protocol for computing dot-products in clustered and distributed environments , 2002, Proceedings International Conference on Parallel Processing.

[8]  Jiannong Cao,et al.  Optimal Resource Allocation for Reliable and Energy Efficient Cooperative Communications , 2013, IEEE Transactions on Wireless Communications.

[9]  Xiaohui Liang,et al.  A Secure Handshake Scheme with Symptoms-Matching for mHealthcare Social Network , 2011, Mob. Networks Appl..

[10]  Yunhao Liu,et al.  Message in a Sealed Bottle: Privacy Preserving Friending in Mobile Social Networks , 2015, IEEE Transactions on Mobile Computing.

[11]  Ming Li,et al.  FindU: Privacy-preserving personal profile matching in mobile social networks , 2011, 2011 Proceedings IEEE INFOCOM.

[12]  P. Vishvapathi,et al.  Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data , 2022 .

[13]  Yin Zhang,et al.  Secure friend discovery in mobile social networks , 2011, 2011 Proceedings IEEE INFOCOM.

[14]  Jie Liu,et al.  Efficient Weight-based Private Matching for proximity-based mobile social networks , 2014, 2014 IEEE International Conference on Communications (ICC).

[15]  Haojin Zhu,et al.  Fairness-Aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks , 2013, IEEE Transactions on Emerging Topics in Computing.

[16]  Jemal H. Abawajy,et al.  A trajectory privacy-preserving scheme based on query exchange in mobile social networks , 2018, Soft Comput..

[17]  Kim-Kwang Raymond Choo,et al.  Enhancing privacy through uniform grid and caching in location-based services , 2017, Future Gener. Comput. Syst..

[18]  Yuguang Fang,et al.  A Privacy-Preserving Attribute-Based Authentication System for Mobile Health Networks , 2014, IEEE Transactions on Mobile Computing.

[19]  Yehuda Lindell,et al.  An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries , 2007, Journal of Cryptology.

[20]  Jie Wu,et al.  Progressive or Conservative: Rationally Allocate Cooperative Work in Mobile Social Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.