Privacy Preserving Intersection of Neighbor Sets Exploiting Cross Checking Capability in a Peer to Peer Social Network Service

Due to the privacy concerns on the data generated by the users, Peer to Peer Social Network Services are getting popular these days because the data is kept in a distributed manner. In some cases, the list of neighbors of a node should be kept private, too. However, for some applications, we may need to compute the list of common neighbors between two nodes without revealing the whole list of neighbors. In this paper, we propose a Bloom filter based approach to compute the intersection of neighbors between two nodes in SNSes. We exploit the cross-checking property enabled by the neighbor relationships to simplify the computation while getting more accurate results. Our proposed method can get a near perfect intersection with mostly zero or one false common neighbors. Furthermore, the Bloom filter can successfully hide the neighbor information from attackers. We show the performance through numerical analysis and extensive simulations.

[1]  Benny Pinkas,et al.  Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.

[2]  Sonja Buchegger,et al.  A case for P2P infrastructure for social networks - opportunities & challenges , 2009, 2009 Sixth International Conference on Wireless On-Demand Network Systems and Services.

[3]  Peter Winkler,et al.  Comparing information without leaking it , 1996, CACM.

[4]  Sonja Buchegger,et al.  PeerSoN: P2P social networking: early experiences and insights , 2009, SNS '09.

[5]  Elisa Bertino,et al.  A Hybrid Approach to Private Record Matching , 2012, IEEE Transactions on Dependable and Secure Computing.

[6]  Sanghwan Lee,et al.  Efficient bloom filter design for information hiding in peer to peer social networks , 2015, 2015 International Conference on Information Networking (ICOIN).

[7]  Bill Fitzgerald Facebook Tinkers With Users’ Emotions in News Feed Experiment, Stirring Outcry , 2015 .

[8]  Divyakant Agrawal,et al.  Privacy Preserving Query Processing Using Third Parties , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[9]  Iain Parris,et al.  Privacy-enhanced social network routing in opportunistic networks , 2010, 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).

[10]  Yijie Wang,et al.  On the feasibility of common-friend measurements for the distributed online social networks , 2012, 7th International Conference on Communications and Networking in China.

[11]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[12]  Refik Molva,et al.  Safebook: A privacy-preserving online social network leveraging on real-life trust , 2009, IEEE Communications Magazine.

[13]  Robert Morris,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM 2001.

[14]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.