SPFM: Scalable and Privacy-Preserving Friend Matching in Mobile Cloud

Profile (e.g., contact list, interest, and mobility) matching is more than important for fostering the wide use of mobile social networks. The social networks such as Facebook, Line, or WeChat recommend the friends for the users based on users personal data such as common contact list or mobility traces. However, outsourcing users’ personal information to the cloud for friend matching will raise a serious privacy concern due to the potential risk of data abusing. In this paper, we propose a novel scalable and privacy-preserving friend matching (SPFM) protocol, which aims to provide a scalable friend matching and recommendation solutions without revealing the users personal data to the cloud. Different from the previous works which involves multiple rounds of protocols, SPFM presents a scalable solution which can prevent honest-but-curious mobile cloud from obtaining the original data and support the friend matching of multiple users simultaneously. We give detailed feasibility and security analysis on SPFM and its accuracy and security have been well demonstrated via extensive simulations. The result show that our scheme works even better when original data is large.

[1]  Ramakrishnan Srikant,et al.  Order preserving encryption for numeric data , 2004, SIGMOD '04.

[2]  Shaojie Tang,et al.  Privacy-preserving data aggregation without secure channel: Multivariate polynomial evaluation , 2013, 2013 Proceedings IEEE INFOCOM.

[3]  Pan Li,et al.  Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.

[4]  Ming Li,et al.  FindU: Privacy-preserving personal profile matching in mobile social networks , 2011, 2011 Proceedings IEEE INFOCOM.

[5]  Guanhua Yan,et al.  Privacy-Preserving Profile Matching for Proximity-Based Mobile Social Networking , 2013, IEEE Journal on Selected Areas in Communications.

[6]  Mihir Bellare,et al.  Deterministic and Efficiently Searchable Encryption , 2007, CRYPTO.

[7]  Rui Zhang,et al.  Privacy-Preserving Spatiotemporal Matching for Secure Device-to-Device Communications , 2016, IEEE Internet of Things Journal.

[8]  Xiaohui Liang,et al.  A Secure Handshake Scheme with Symptoms-Matching for mHealthcare Social Network , 2011, Mob. Networks Appl..

[9]  Laurence T. Yang,et al.  Multicloud-Based Evacuation Services for Emergency Management , 2014, IEEE Cloud Computing.

[10]  Dan Boneh,et al.  Location Privacy via Private Proximity Testing , 2011, NDSS.

[11]  Mianxiong Dong,et al.  NetSecCC: A scalable and fault-tolerant architecture for cloud computing security , 2016, Peer-to-Peer Netw. Appl..

[12]  Salve Bhagyashri Salve Bhagyashri,et al.  Privacy-Preserving Public Auditing For Secure Cloud Storage , 2014 .

[13]  Huaxiong Wang,et al.  Distributed Private Matching and Set Operations , 2008, ISPEC.

[14]  Serge Fehr,et al.  On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles , 2008, CRYPTO.

[15]  Emiliano De Cristofaro,et al.  Practical Private Set Intersection Protocols with Linear Complexity , 2010, Financial Cryptography.

[16]  Dawn Xiaodong Song,et al.  Privacy-Preserving Set Operations , 2005, CRYPTO.

[17]  Carmela Troncoso,et al.  Protecting location privacy: optimal strategy against localization attacks , 2012, CCS.

[18]  G. Loewenstein,et al.  Privacy and human behavior in the age of information , 2015, Science.

[19]  Rui Zhang,et al.  Privacy-preserving spatiotemporal matching , 2013, 2013 Proceedings IEEE INFOCOM.

[20]  Brian,et al.  VENETA: Serverless Friend-of-Friend Detection in Mobile Social Networking , 2008 .

[21]  Guanhua Yan,et al.  Fine-grained private matching for proximity-based mobile social networking , 2012, 2012 Proceedings IEEE INFOCOM.

[22]  Nathan Chenette,et al.  Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..

[23]  Xiaohui Liang,et al.  HealthShare: Achieving secure and privacy-preserving health information sharing through health social networks , 2012, Comput. Commun..

[24]  Yin Zhang,et al.  Secure friend discovery in mobile social networks , 2011, 2011 Proceedings IEEE INFOCOM.

[25]  Benny Pinkas,et al.  Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.

[26]  Ramakrishnan Srikant,et al.  Privacy-preserving data mining , 2000, SIGMOD '00.