SlideShare uma empresa Scribd logo
1 de 24
Baixar para ler offline
TE Seminar Friend Matching protocol
DYPCOE,Akurdi 1 Dept of Computer Engineering
CHAPTER 1: INTRODUCTION
In the last decade, the number of users of online social networking sites and of mobile
phone services has increase rapidly. The most popular online social networking site, Fa-
cebook, has more than 500 million active users, and more than 50% of its active users log
on to Facebook at least once per day [1]. In terms of mobile phone services, there were
4.1 billion mobile cellular subscribers in total in March 2009 [2].
With the proliferation of mobile devices, mobile social networks (MSNs) are becoming
devoted part of our lives. Leveraging networked portable devices such as smart phones
andpersonal digital assistant(PDA) as platforms, MSN not only enables people to use
their existing online social networks (OSNs) at anywhere and anytime, but also introduc-
es a myriad of mobility-oriented applications, such as location-based services and aug-
mented reality. Among them, an important service is to make new social connec-
tions/friends within physical proximity based on the matching of personal profiles. For
example, MagnetU is a MSN application that matches one with nearby people for dating
or friend-making based on common interests. In such an application, a user only needs to
input some (query) attributes in her profile, and the system would automatically find the
persons around with similar profiles. The scopes of these applications are very broad,
since people can input anything as they want, such as hobbies, phone contacts and places
they have been to. The latter can even be used to find “lost connections” and “familiar
strangers”.
TE Seminar Friend Matching protocol
DYPCOE,Akurdi 2 Dept of Computer Engineering
1.1 EXISTING MODEL
Privacy preservation is a significant research issue in social networking. The social net-
working platforms are extended into the mobile environment, users require more exten-
sive privacy-preservation because they are unfamiliar with the neighbors in close vicinity
who may store, and correlate their personal information at different time periods and loca-
tions. Once the personal information is correlated to the location information, the behav-
ior of users will be completely disclosed to the public.
The content-sharing applications, all of which provide no feedback or control mecha-
nisms to users and may cause inappropriate location and identity information disclosure.
As shown in fig.1, Alice has her own profile and Bob has her own. Alice is interested in
finding a boy with similar profile and bob is also interested in finding a girl with same
profile. A successfulmatching could be achieved in case that Alice’s profile matches
Bob’s interest while, at the same time, Bob’s profile matches Alice’s interest [3]. The ex-
isting model support this type of mapping process.
Fig 1.1. Phishing report between 2010 to 2013.
TE Seminar Friend Matching protocol
DYPCOE,Akurdi 3 Dept of Computer Engineering
Further, the existing proposals are one-way only and profile matching requires running a
protocol twice, with reversed roles in the second run. A malicious attacker or dishones-
tuser launch the runaway attackto exploit this two-pass protocol. This runaway attack in-
curs a serious unfairness issue.
1.2 PROPOSED SYSTEM:
The proposed system for Private Profile Matching, which allow two users to compare
theirpersonal profiles without revealing private informationto each other. The private pro-
file matching problem could thenbe converted into Private Set Intersection or Private Set
Intersection Cardinality. In particular, two mobile users, each of whom holds aprivate da-
ta set respectively, could jointly compute theintersection or the intersection cardinality of
the twosets without leaking any additional information to either side.
Fig 1.2 Private profile matching in mobile social networks
To achieve this goal, a novel Blind Vector Transformation Techniqueis introduce, which
could hide the correlation between the original vector and the transformed result. Based
on it,the privacy-preserving and fairness-aware friend matching protocol is proposed,
which enables one party to match its interest with the profile of another, and vice versa,
without revealing their real interest. By the help of Blind Vector Transformation Tech-
TE Seminar Friend Matching protocol
DYPCOE,Akurdi 4 Dept of Computer Engineering
nique, the interest as well as profile private during match its interests with another’s pro-
file is kept. To prevent runaway attack, a lightweight verifier checking technique is ena-
ble that verify the matching at the minimized overhead and prevent from launching the
runaway attack.
Fig.3 Friend discovery in mobile social networks.
TE Seminar Friend Matching protocol
DYPCOE,Akurdi 5 Dept of Computer Engineering
CHAPTER 2.
SYSTEM, ADVERSARY, MODEL AND PRELIMINARIES
In this chapter, firstly introduce a system model as well as the adversary model. Then de-
sign goals is proposed,Before introducing the proposed protocol, a brief introduction on
some cryptographic foundations, including Parlier Holomorphic Encryption is given in
this chapter.
2.1 SYSTEM MODEL
In MSNs, when a user come at new palace and launches a query to find a friend. This pro-
file consists of multiple attributes, which could be denoted as a vector P = {p1, p2,….,pn}.
Here pj (j = 1,…,n) is an integer, which refers to an attribute of P. when a user issues a
query, he firstly generates the corresponding interest vector I = {i1, i2,……,in}.
Fig 2.1. System Architecture
A typical friend discovery process could be described as follows. User A will send his
current interest IA to user B, and then he will obtain B's current interest IB. After the in-
TE Seminar Friend Matching protocol
DYPCOE,Akurdi 6 Dept of Computer Engineering
terests are exchanged, A will compare his own profile PA with IB while B compares his
profile PB with IA. A successful matching as PB matches IB and, at the same time, PB
matches IA[4] is defined.
2.2. ADVERSARY MODEL
The adversary is considered to be curious with others' profile and interest. Therefore, if
without an appropriate security countermeasure, the friend discovery process may suffer
from a series of privacy threats. In particular, the following adversary model is consid-
ered:
i) Privacy Inference from Profile Matching: The adversary tries to find out the
interest or the profile of the other users during the profile matching process.
ii) Privacy Inference from aborting the protocol (Runaway Attack):This attack
will introduce a serious unfairness issue since, in a two-pass protocol, the adver-
sary could refuse to send hismatching result after obtaining the result from his-
partner.
iii) Collusion Attack: The adversary may collude with other users to infer the user’s
private information.
2.3. DESINGNING OBJECTIVE
The proposed Privacy-preserving and fairness-aware Friend Matching Protocol should
satisfy the following objectives:
i) Privacy Guarantee:No any attacker could obtains the profile information of the
users. Each users can only obtained the comparison result “success” or “fail”.
This operation can happen after performing the privacy–preserving friend match-
ing protocol in the proposed protocol.
ii) Fairness Assurance:In each phase of the protocol, a user can obtain personal in-
formation from others as much as his own personal information leaking from the
protocol. In other words, no one can gain more information than what he tell
TE Seminar Friend Matching protocol
DYPCOE,Akurdi 7 Dept of Computer Engineering
2.4.PAILLIER HOMOMORPHIC ENCRYPTION
The protocol proposed in this paper is based on paillier’s homomorphismencryption.
Paillier cryptosystem works to help illustrate and understand our protocol.
I. Key Generation: The trusted third party chooses two large prime numbers pand
qrandomly such that gcd (pq (p - 1) (q - 1)) = 1 and compute n = pq and λ =lcm
(p – 1, q - 1). It then selects a randomg 𝛜 ZN
2
such that gcd (L (gλ
mod N2
), N) = 1,
where L(x) = (x - 1)/N. The entity's Paillier public and private keys are < N, g >
and λ respectively.
II. Encryption: Let m be a message to be encrypted where m 𝜖Zn and r ϵ Zn be a
random number. The ciphertext could be given by
E(m mod N, r mod N) = gm
rn
mod N2
Where E () denotes the Paillier encryption operation.
III. Decryption: Given a ciphertext c ϵ ZN
2
the corresponding plaintext can be de-
rived as
D(c) = L (cλ
mod N2)
/L(gλ mod N2
) mod N
Where D () denotes the Paillier decryption operation using private sk = λ
hereafter
IV. Homomorphic:given m1, m2, r1, r2, ϵ ZN , it satisfies the following homomor-
phioc property:
E (m1). E (m2) = E (m1 + m2)
TE Seminar Friend Matching protocol
DYPCOE,Akurdi 8 Dept of Computer Engineering
CHAPTER 3.
THE PROPOSE PRIVACY PRESERVING PROTOCOL
In this chapter, the details of protocols are presented. Firstly the basic idea behind the
proposed protocol is presented.
3.1. PROTOCOL OVERVIEW
Here two types of protocol are proposed. One is Blind Vector transformation Protocol
and second is Fairness-aware and Collusion-free protocol.
In the blind transformation phase, each participant will encrypt his profile by using his
public key and provide it to his partner for blind transformation. The basic idea of blind
vector transformation protocol is allowing two untrusted parties to transform two vectors
into the blind ones by following a series of private and identical steps, e.g., adding a ran-
dom vector, shuffling in the same order. Since the transformation follows the same step,
the matching results (e.g. the number of matched interest and profiles) keep unchanged
before and after the transformation, which enable the untrusted participants compare the
profile without leaking their real interest or profile information.
For the first time, the user’s interest from its profile is separated, which is expected to be
a generalization of traditional profile matching problem.A novel blind vector transfor-
mation technique, which could hide the correlation between the original vector and the
transformed result is introduced. Based on it, the privacy-preserving and fairness-aware
friend matching protocol is proposed, which enables one party to match its interest with
the profile of another, and vice versa, without revealing their real interest. A novel light-
weight verifier checking approach to thwart runaway attack and thus achieve the fairness
of two participants. The protocols is implemented in real experiments. The performance
of the proposed scheme is demonstrated via extensive experiment results.
TE Seminar Friend Matching protocol
DYPCOE,Akurdi 9 Dept of Computer Engineering
How to hide the real value of the interest or profile of the users is the major challenge of
the blind vector. The basic idea is that two untrusted participants will contribute a part of
this transformation while each of them cannot recover the real interest or profile. To
achieve this, five primitive operation is defined as follow:
i) Encrypt: Given a vector v, it performs Paillier encryption on it with public
key pk to obtain the ciphertext Epk[v]. Such an operation is denoted as En-
crypt(v,pk).
ii) Vecadd: Given two vectors r and v, both of which are encrypted under Pailli-
er encryption, the operation VecAdd will be executed to perform a sum oper-
ation E[v]E[r] D E[v + r]. Such an operation is denoted as VecAdd(v, r).
iii) Vecext: Given a vector v, the operation VecExt(v; r) could hide the real value
of v by performing a diffusion operation, which appends some dummy vec-
tors r to v to obtain v||r.
iv) Vecshuffle: Given a vector v, the operation VecShuffle (v) could hide the real
value of Ev by performing a confusion operation, which randomly shuffles
the elements in vector v.
v) Vecrev: Given a vector v, the operation VecRev(v; k) could further hide the
real value of v by randomly changing the value of k elements in vector v.
In blind vector transformation phase, the user Aencrypts his profile with his own public
key by triggeringoperation Encrypt(v,k). for keeping A's profile private Paillier is adopted
encrypt operation(v,pk).at the same time, allows B toperform blind transformation on it.
The transformation operations include VecAdd, VecExt, VecShuffle, VecRev.The user B
also makes the same blind transformation on B'sprofile. After finishing these steps, in the
matching phase, itis required that each participant should compare the blindedinterest and
profile. Each participant will send the number ofmatching vector pairs as well as the size
of search interest to a verifier. The verifier will compare if the number of search interest
equals to the number of matching vector pairs
TE Seminar Friend Matching protocol
DYPCOE,Akurdi 10 Dept of Computer Engineering
Table 3.1.Five primitive operation in blind transformatiom
Algorithm 1The Blind Transformation Algorithm
Input: P`
a← Ua`s profile encrypted under his public key pka,Ib←Ub`s interest, eb← the
number of interest Ub considered in Ib and lb← a security parameter.
Output: P``a← the blind transformation profile vector for Ua`I``b← the transformed
Interest vector for Ua and sb← the actual matching result for Ub.
Function: BLIND TRANSFORMATION (P`a, pka, Ib, eb,)
rb← random vector of length n = || P`a ||
r`b← encrypt (ra , pka)
Pa← VecAdd (P`a , r`a)
Ia← VecAdd (Ib, rb)
y`b← random vector of length lb
P`a ← encrypt (yb , pka)
kb ← VecExt(Pa, y`b)
yb← random number between[1 , lb]
I`b ← VecRev (yb , kb)
I``b ← VecShuffer (I`b)
P``b ← VecShuffer (P`a)
TE Seminar Friend Matching protocol
DYPCOE,Akurdi 11 Dept of Computer Engineering
Sb ← eb + lb - kb
return P``a ,I``b,sb
end function
3.2. SYSTEM INITIALIZATION PHASE
Uaand Ubare two two potential friend discovery nodes which does not loss any generali-
ty.
In this phase the private and public key pair are generated by the trusted third party.these
key pairs are denoted by (ska , pka) and (skb ,pkb). pa and pb denotes theire profiles.For
a matching, Ua and Ub may only consider ea and eb out of total n interest fields. Thus,
there are n−ea and n−ebattributes which are excluded from this match.thecurrent interest
vectors are Ia and Ibare assumed.
3.3. THE PROPOSED BLIND TRANSFORMATION PROTOCOL
The blind transformation process is introduced by taking Ubtransforming Ua's profile and
his own interest as an example. It is similar for Ua to blind transform Ub's profile. Ua per-
forms Encrypt(Pa,pka) to encrypt his profile Pa, which is denoted as P’a. Ua sends P’a and
pka to Ub. Then, Ub performs the following blind transformation operations:
I. Blind Add:Ubgenerates a random vector rb, and then performs r’b= En-
crypt(rb,pka). After that, Ubcalculates Pa = VecAdd(P’a, rb) and Ib= VecAdd(Ib; r-
b) by adding r’b and rbto P’a and Ib respectively.
II. Blind Append: Ubgenerates a random vector ybof length lb, where lbis a prede-
termined security parameter, then performs y’b= Encrypt(yb , pka) to get P’a=
VecExt(Pa; y’b).
III. Blind Reverse:Ubrandomly selects kb ϵ {1,2,…l2}and performs yb=
VecRev(yb,kb), then obtains I’b =VecExt(Ib; yb).
IV. Blind Shuffle: Ubperforms I’’b= VecShuffle(I’b)and P’’a = VecShuffle(P’a) with
the same order.
TE Seminar Friend Matching protocol
DYPCOE,Akurdi 12 Dept of Computer Engineering
After performing this process, Ub finishes the blind transformation of Pa and Ib. In the
same time, Ub also encrypts his profile and Ua follows the same strategy to make a blind
transformation towards Pb and Ia.
However, if only with VecAdd and VecShuffle, adishonest participant could still infer
another party's profile information without reveal his own profile information by stopping
the protocol as long as he receives the matching information between his interest and an-
other party's profile, which is called as runaway attack. Runaway attack will lead to seri-
ous unfairness issue. To achieve fairness of the proposed protocol, VecExt and VecRev
are further introduced, which are used to hide the exact interest/profile matching numbers.
3.4. THE PROPOSED FAIRNESS-AWARE AND COLLUSION-FREE
MATCHING PROTOCOL
The privacy-preserving and fairness-aware friend matching protocol, which enables one
party to match its interest with the profile of another, and vice versa, without revealing
their real interest. a novel lightweight verifier checking approach to thwart runaway at-
tack and thus achieve the fairness of two participants. This protocols in real experiments.
the performance of the proposed scheme via extensive experiment results is demonstrat-
ed.
Decrypt verification protocol to check that two parties interest match their counterparts or
not is used.
By performing the decryption operation with his own secret key ska,Ua obtains Pa = De-
crypt(P’’a, ska).Afterobtaining Pa, Ua compares it with Ub's blinded interests Ibto get the
number of matched entries sb, while Ub could get sasimilarly. To verify if their interests
and the profiles match or not, Ua sends ha= H(sa || sb) whereas Ubsends hb= H(sa ||sb) to a
randomly chosen verifier. The verifier could verify whether ha = hb. If ha= hb, the match
succeeds, otherwise, it fails.
TE Seminar Friend Matching protocol
DYPCOE,Akurdi 13 Dept of Computer Engineering
A potential weakness of the proposed basic protocol is that it may be vulnerable to collu-
sion attack. To thwart the collusion attack, based on Blind Linear Transformation Fair-
ness-aware and collusion-free Matching protocol to tolerate the collusion attack is pro-
posed. An addition blind linear transformation round is introduced instead of directly
sending the ha and hb to the verifier.The collusion attack is considered impossible under
this scheme for the expensive computation cost.Because In the blind Linear Transfor-
mation ,both of their hash results are preserved by a pair of blinding numbers which are
much larger than (n + la) or (n + lb).
TE Seminar Friend Matching protocol
DYPCOE,Akurdi 14 Dept of Computer Engineering
CHAPTER 4. SECURITY ANALYSIS
In this chapter, demonstration of fairness and the privacy of the proposed protocol by the
detailed security analysis is done.
4.1. SECURITY AGAINST INTEREST/PROFILE LEAKING
Without loss of generality, consider Pa and Ib. Since the profile Pa is encrypted by Palli-
er Cryptogsystem, and without the secret key ska, no one except Ua could get Pa. Thus
the privacy in P could be preserved. The privacy in interest Ib is guaranteed by BPVT
protocol. Since after receiving the processed Pa and Ib, Ua cannot correlate any item of
Ib with the attributes in Pa. At the same time, it is guaranteed for Ub that Ua cannot test
his interest by changing Pa arbitrarily.
4.2 SECURITY AGAINST RUNAWAY ATTACK
The following Theorem to discuss the upper bound of the successful probability that Ua
could guess any item of Ib without any error.
Theorem 1 Given a profile P and an interest I which are blind transformed and matched
by following the proposed protocols, the correct-guess probability P(CG) that U could
infer any item of I based on the blind transformed P and the comparing result s is bounded
by , where n is the length of P and l is the number of attributes appended to P.
Proof: The successful guess probability is expressed as:
min(s,l)
P(CG) = ∑ p(m = m′
)Pr{CG|s,m} . ………………………………...(1)
m′
=1
where p(m = m′
) is the probability that U1 could guess m correctly, and in our scheme,
{1,2,...,l}.
TE Seminar Friend Matching protocol
DYPCOE,Akurdi 15 Dept of Computer Engineering
Pr{CG|s,m} isthe probability that given s and m, U1 could guess s−m items correctly. Ob-
viously, when s-m ≥ n, P(CG|s,m) = 0, when s − m < n,P(CG|s,m) = 1. No matter s > l or
s ≤ l,
…………………………………….(2)
By mathematical induction, P(CG) ≤3/ln (n ≥ 5).
Theorem 1 indicates that given ϵ as the expected secure probability such that P(CG) < ϵ,
if ϵ is small enough, then U1 will get nothing about U2’s interest since he could not guess
any part of I2 correctly, thus he has no incentive to abort the protocol. Furthermore,
bound it with 3/ln saferly. And according to this inequality, calculate l and m to guarantee
the fairness. Theorem 1 also indicates that if two users are not matched finally, they could
not guess anything according to the comparing result. Thus proposed protocol guaranteed
the fairness of profile/interest.
4.3 SECURITY AGAINST COLLUSION ATTACK
The probability of guessing (ai,bi),i ∈ (1,2) of the other side is negligible.the following
theorem is implemented.
Theorem 2 Given H(sr′′
b), the probability of guessing sˆa and sb correctly is negligible.
Proof: The attempt to guess the parameters can be formalized as guessing (a,b) iny = ax
+ b given the knowledge of only one pair of (x,y), which is negligible. With a and b, the
result x is transformed into a larger space, making exhaustive enumeration difficult. Thus,
this step prevents either side from guessing the actual value of the other side by brute-
force search over the hash value. In other words, assuming one-way characteristic of the
hash function, both users have no knowledge of the other side’s query results.
The verifier only receives two hash values and should only answer whether they are
equal or not. The only information available to them are the two hash values and the only
answer they can get is whether they are equal, which is just as what intended.
TE Seminar Friend Matching protocol
DYPCOE,Akurdi 16 Dept of Computer Engineering
Because of its one way characteristic no futher information can be derived from hash
value. This phase only disclose the “success” or “fail” information. No other information
disclose by the revealing phase.
TE Seminar Friend Matching protocol
DYPCOE,Akurdi 17 Dept of Computer Engineering
CHAPTER 5. EVALUTION
As see from Fig. 5.1, 5.2, and 5.3 the growth of the execution time remains linear al-
most in all cases. This makes sense since the time taken in each encryption or decryption
is relatively constant as the key size is fixed. Thus the decryption or encryption time
grows in proportion with the number of total attributes.
3 security parameter length l = n, l = 2n, l = 3n is chossen. The number of attributes
range from 20 to 100. the running time against the numberof attributes under those 3 pa-
rameter settings is measured. plotted the average value of 20 runs. Detailed statistics
about the results is shown in Table 1
Fig. 5.1indicates that, most of the computation time is spent in Blind Transformation
phase. This is true as the encryption is the most expensive part in our implementation.
Fig 5.1 Executes time on blind transformation for different number of attributes(ms)
TE Seminar Friend Matching protocol
DYPCOE,Akurdi 18 Dept of Computer Engineering
As Fig. 5.2 shows, the Blind Linear Transformation phase in the protocol introduces quite
low overhead, within 46ms in the transformation step. Thus, compared with the basic
scheme, the advanced scheme is secure yet runs with little overhead
Fig 5.2. Execution time on fair matching phase for different number of attributes(ms).
Fig 5.3. Execution time on blind linear transformation for different number of attributes(ms).
TE Seminar Friend Matching protocol
DYPCOE,Akurdi 19 Dept of Computer Engineering
Table 5.1.statistic of experiment results.
Using different security parameter l will give different performance since l increases the
total vector size and the number of encryption/decryption operations. these 3 parameter
settings to demonstrate a trade-off between security and efficiency. However, given the
fact that even if the adversary has guessed one attribute correctly, he has no way to verify
it and thus, setting l = n is enough in most cases since in comparison with the number of
attributes, the is far less than a random guess with probability . Thus it’s
secure enough in most cases. With l = n, our implementation performs with 40% less run-
ning time . As runs on Intel Core Duo P8600 (2.4GHz), whose clock speed is faster than
our i3-330m, and the simulation is a single thread task with no speed up provided by the
Hyper-Threading technology in Core i3-330m, this scheme is relatively efficient.
Note that the computation overhead on third party users is not measured in the simula-
tion. But it’s clear that the only task for third party users is to test whether two integers(no
larger than 256 bit when using SHA256) are equal. The transformation overhead and
power consumption for them is negligible.
TE Seminar Friend Matching protocol
DYPCOE,Akurdi 20 Dept of Computer Engineering
CHAPTER 6. RELATED WORK
6.1 MOBILE SOCIAL NETWORK
Social networking is where individuals with similar interests connect with each other
through their mobile/tablet. They form virtual communities. For example Facebook,
Twitter, LinkedIn etc. What makes social network sites unique is not that they allow indi-
viduals to meet strangers, but rather that they enable users to articulate and make visible
their social networks. Research has been done in the mobile social networking field. So-
cial serendipity [7] deploys a central server, which contains users’ profiles and user-
defined matchmaking preferences. The central server computes the similarity of users’
profile information based on the profile information itself and matchmaking preferences.
The explosive popularity of online social networks has attracted significant attention re-
cently [8], [9]. Social serendipity to perform matchmaking in mobile social networks is
presented [10]. Loopt is a mobile geo-location service that notifies users of friends' loca-
tion and activities via detailed interactive maps [11]. It is also observed that there is a
large body of industrial efforts, which try to make location based friend discovery by
providing android or IOS based services.
6.1.1Mobile Social Network Applications:
I. Users can, not only surf the internet but also communicate with peers using
shortrangewireless communications.
II. Users may subscribe to a news-feed, a blog, or a service that monitors stock pric-
es,traffic congestion etc.
III. OSNs(Online Social Networks) allow their users to upload multimedia con-
tent,communicate and share various informations.
IV. mHealthcare social network(MHSN) provides a promising platform for the sen-
iors who have the same symptom to exchange their experiences, give mutual sup-
port and inspiration to each other, and help forwarding their health information
wirelessly to a related mhealth center.
TE Seminar Friend Matching protocol
DYPCOE,Akurdi 21 Dept of Computer Engineering
Fig.6.1 mobile network in city
TE Seminar Friend Matching protocol
DYPCOE,Akurdi 22 Dept of Computer Engineering
6.2. SECURE FRIEND DISCOVERY IN MOBILE SOCIAL
NETWORKS
Online social networks, such as Facebook andMyspace, have experienced an explosive
growth recently. Mobile social networks, which bring social networking to mobile
phones, represent a natural next step and have already generated a lot of excitement Mo-
bile social networks extend social networks in the cyberspace into the real world by al-
lowing mobile users to discover and interact with existing and potential friends who hap-
pen to be in their physical vicinity. Despite their promise to enable many exciting applica-
tions, serious security and privacy concerns have hindered wide adoption of these net-
works.
To address these concerns, a novel techniques and protocols to compute social proximity
between two users to discover potential friends is introduce, which is an essential task for
mobile social networks. three major contributions are made.
First, identify a range of potential attacks against friend discovery by analyzing real trac-
es. Second, develop a novel solution for secure proximity estimation, which allows users
to identify potential friends by computing social proximity in a privacy-preserving man-
ner. A distinctive feature of our solution is that it provides both privacy and verifiability,
which are frequently at odds in secure multiparty computation. Third, todemonstrate the
feasibility and effectiveness of our approaches using real implementation on smartphones.
TE Seminar Friend Matching protocol
DYPCOE,Akurdi 23 Dept of Computer Engineering
CHAPTER 7. SUMMARY
With increasing popularity of mobile social networks, it isimportant to develop secure
and practical protocols to enable users to effectively interact with each other. In this re-
port, A secure friend discovery protocol for mobile social networks is discover, and use
both analysis and real implementation to demonstrate its feasibility and effectiveness. A
matchmaking protocol that preserves users’ interest information from unnecessary leaks
in mobile social networking concept is launched. The implementation and evaluation of
the protocol show that the protocol is practical on current smartphones. In terms of future
work, how to investigate how real people use our matchmaking protocol to learn more
about the usefulness of mobile social networking applications in general.
TE Seminar Friend Matching protocol
DYPCOE,Akurdi 24 Dept of Computer Engineering
REFERENCES
1] Facebook.Statistics.http://www.facebook.com/press/info.php?statistic. M. Li, N.
Cao, S. Yu, and W. Lou, ``FindU: Privacy-preserving personal
2] prole matching in mobile social networks,'' in Proc. IEEE INFOCOM,
3] Shanghai, China, Apr. 2011, pp. 24352443.
Accessed March 2011
4] MOCOM2020. 4.1 Billion Mobile Phone Subscribers Worldwide.
http://www.mocom2020.com/2009/03/4.1-billion-mobile-phone-subscribers-
worldwide/. Accessed March 2011.
5] Perfect-Match [Online]. Available: http://www.perfectmatch.com
6] M. Li, N. Cao, S. Yu, and W. Lou, ``FindU: Privacy-preserving personal profile
matching in mobile social networks,'' in Proc. IEEE INFOCOM, Shanghai, China,
Apr. 2011, pp. 2435-2443.
7] Nathan Eagle and Alex Pentland. Social Serendipity: Mobilizing
Social Software. IEEE Pervasive Computing, 4(2):28–34, 2005.
8] H. Zhu, X. Lin, R. Lu, Y. Fan, and X. Shen,``SMART: A secure multilayer cred-
it-Based incentive scheme for delay-tolerant networks,'' IEEE Trans.Veh. Tech-
nol., vol. 58, no. 8, pp. 828836, Oct. 2009.
9] H. Zhu, X. Lin, R. Lu, P.-H. Ho, and X. Shen, ``SLAB: Secure localized authenti-
cation and billing scheme for wireless mesh networks,'' IEEE Trans. Wireless
Commun., vol. 17, no. 10, pp. 3858_3868, Oct. 2008.
10]N. Eagle and A. Pentland, ``Social serendipity: Mobilizing
social software,'' IEEE Pervas. Comput., vol. 4, no. 2, pp. 2834, Apr. 2005.
11] doi.ieeecomputersociety.org
12]http://www.Academia.com

Mais conteúdo relacionado

Mais procurados

security framework
security frameworksecurity framework
security frameworkJihad Labban
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesAdz91 Digital Ads Pvt Ltd
 
Automatic Synthesis and Formal Verification of Interfaces Between Incompatibl...
Automatic Synthesis and Formal Verification of Interfaces Between Incompatibl...Automatic Synthesis and Formal Verification of Interfaces Between Incompatibl...
Automatic Synthesis and Formal Verification of Interfaces Between Incompatibl...IDES Editor
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesIGEEKS TECHNOLOGIES
 
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...IJECEIAES
 
An efficient distributed group key management using hierarchical approach wit...
An efficient distributed group key management using hierarchical approach wit...An efficient distributed group key management using hierarchical approach wit...
An efficient distributed group key management using hierarchical approach wit...Alexander Decker
 
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEYPHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEYIJNSA Journal
 
VIDEO OBJECTS DESCRIPTION IN HINDI TEXT LANGUAGE
VIDEO OBJECTS DESCRIPTION IN HINDI TEXT LANGUAGE VIDEO OBJECTS DESCRIPTION IN HINDI TEXT LANGUAGE
VIDEO OBJECTS DESCRIPTION IN HINDI TEXT LANGUAGE ijmpict
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesAdz91 Digital Ads Pvt Ltd
 
IRJET- Chatbot using NLP and Deep Learning
IRJET-  	  Chatbot using NLP and Deep LearningIRJET-  	  Chatbot using NLP and Deep Learning
IRJET- Chatbot using NLP and Deep LearningIRJET Journal
 
Elliptic Curve for Secure Group Key Management in Distributed Network
Elliptic Curve for Secure Group Key Management in Distributed NetworkElliptic Curve for Secure Group Key Management in Distributed Network
Elliptic Curve for Secure Group Key Management in Distributed Networkijceronline
 
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imageseSAT Journals
 
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)IJERA Editor
 
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption AlgorithmsSecrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption AlgorithmsTharindu Weerasinghe
 
New era of authentication
New era of authenticationNew era of authentication
New era of authenticationsunil kumar
 
From ID/locator split to ICN
From ID/locator split to ICNFrom ID/locator split to ICN
From ID/locator split to ICNEricsson
 
Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...
Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...
Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...ijtsrd
 
IRJET - Cyberbulling Detection Model
IRJET -  	  Cyberbulling Detection ModelIRJET -  	  Cyberbulling Detection Model
IRJET - Cyberbulling Detection ModelIRJET Journal
 

Mais procurados (20)

security framework
security frameworksecurity framework
security framework
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devices
 
Automatic Synthesis and Formal Verification of Interfaces Between Incompatibl...
Automatic Synthesis and Formal Verification of Interfaces Between Incompatibl...Automatic Synthesis and Formal Verification of Interfaces Between Incompatibl...
Automatic Synthesis and Formal Verification of Interfaces Between Incompatibl...
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devices
 
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
 
An efficient distributed group key management using hierarchical approach wit...
An efficient distributed group key management using hierarchical approach wit...An efficient distributed group key management using hierarchical approach wit...
An efficient distributed group key management using hierarchical approach wit...
 
3 d password
3 d password3 d password
3 d password
 
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEYPHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
 
VIDEO OBJECTS DESCRIPTION IN HINDI TEXT LANGUAGE
VIDEO OBJECTS DESCRIPTION IN HINDI TEXT LANGUAGE VIDEO OBJECTS DESCRIPTION IN HINDI TEXT LANGUAGE
VIDEO OBJECTS DESCRIPTION IN HINDI TEXT LANGUAGE
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devices
 
IRJET- Chatbot using NLP and Deep Learning
IRJET-  	  Chatbot using NLP and Deep LearningIRJET-  	  Chatbot using NLP and Deep Learning
IRJET- Chatbot using NLP and Deep Learning
 
Elliptic Curve for Secure Group Key Management in Distributed Network
Elliptic Curve for Secure Group Key Management in Distributed NetworkElliptic Curve for Secure Group Key Management in Distributed Network
Elliptic Curve for Secure Group Key Management in Distributed Network
 
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital images
 
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)
 
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption AlgorithmsSecrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
 
New era of authentication
New era of authenticationNew era of authentication
New era of authentication
 
Seminar
SeminarSeminar
Seminar
 
From ID/locator split to ICN
From ID/locator split to ICNFrom ID/locator split to ICN
From ID/locator split to ICN
 
Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...
Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...
Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...
 
IRJET - Cyberbulling Detection Model
IRJET -  	  Cyberbulling Detection ModelIRJET -  	  Cyberbulling Detection Model
IRJET - Cyberbulling Detection Model
 

Semelhante a Reports on Fairness aware and privacy preserving friend matching protocol in mobile social networks

IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...IJITE
 
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...IRJET Journal
 
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET-  	  Identification of Clone Attacks in Social Networking SitesIRJET-  	  Identification of Clone Attacks in Social Networking Sites
IRJET- Identification of Clone Attacks in Social Networking SitesIRJET Journal
 
76 s201913
76 s20191376 s201913
76 s201913IJRAT
 
Algorithm 1 User-Level Distributed Matrix Factorization Init Server Initial...
Algorithm 1 User-Level Distributed Matrix Factorization Init   Server Initial...Algorithm 1 User-Level Distributed Matrix Factorization Init   Server Initial...
Algorithm 1 User-Level Distributed Matrix Factorization Init Server Initial...Sara Perez
 
Measuring privacy in online social
Measuring privacy in online socialMeasuring privacy in online social
Measuring privacy in online socialijsptm
 
An Improved Explicit Profile Matching In Mobile Social Networks
An Improved Explicit Profile Matching In Mobile Social NetworksAn Improved Explicit Profile Matching In Mobile Social Networks
An Improved Explicit Profile Matching In Mobile Social NetworksIJERA Editor
 
Privacy-Preserving Updates to Anonymous and Confidential Database
Privacy-Preserving Updates to Anonymous and Confidential DatabasePrivacy-Preserving Updates to Anonymous and Confidential Database
Privacy-Preserving Updates to Anonymous and Confidential Databaseijdmtaiir
 
Security Issues related with cloud computing
Security Issues related with cloud computingSecurity Issues related with cloud computing
Security Issues related with cloud computingIJERA Editor
 
Security for Future Networks: A Prospective Study of AAIs
Security for Future Networks: A Prospective Study of AAIsSecurity for Future Networks: A Prospective Study of AAIs
Security for Future Networks: A Prospective Study of AAIsidescitation
 
V1_I1_2012_Paper4.doc
V1_I1_2012_Paper4.docV1_I1_2012_Paper4.doc
V1_I1_2012_Paper4.docpraveena06
 
Enhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart CredentialsEnhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart CredentialsIJCSIS Research Publications
 
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET-  	  Recognizing User Portrait for Fraudulent Identification on Online ...IRJET-  	  Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...IRJET Journal
 
Peer-to-Peer Communication Service and Messaging System
Peer-to-Peer Communication Service and Messaging SystemPeer-to-Peer Communication Service and Messaging System
Peer-to-Peer Communication Service and Messaging SystemEditor IJMTER
 
Wi-Fi Direct P2P Messenger-Browser App
Wi-Fi Direct P2P Messenger-Browser AppWi-Fi Direct P2P Messenger-Browser App
Wi-Fi Direct P2P Messenger-Browser AppAnand Sekar
 
Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Davide Cioccia
 
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...Eswar Publications
 
A Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking WebsitesA Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking WebsitesIRJET Journal
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...IEEEGLOBALSOFTTECHNOLOGIES
 
A Steganography-based Covert Keylogger
A Steganography-based Covert KeyloggerA Steganography-based Covert Keylogger
A Steganography-based Covert KeyloggerCSCJournals
 

Semelhante a Reports on Fairness aware and privacy preserving friend matching protocol in mobile social networks (20)

IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
 
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
 
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET-  	  Identification of Clone Attacks in Social Networking SitesIRJET-  	  Identification of Clone Attacks in Social Networking Sites
IRJET- Identification of Clone Attacks in Social Networking Sites
 
76 s201913
76 s20191376 s201913
76 s201913
 
Algorithm 1 User-Level Distributed Matrix Factorization Init Server Initial...
Algorithm 1 User-Level Distributed Matrix Factorization Init   Server Initial...Algorithm 1 User-Level Distributed Matrix Factorization Init   Server Initial...
Algorithm 1 User-Level Distributed Matrix Factorization Init Server Initial...
 
Measuring privacy in online social
Measuring privacy in online socialMeasuring privacy in online social
Measuring privacy in online social
 
An Improved Explicit Profile Matching In Mobile Social Networks
An Improved Explicit Profile Matching In Mobile Social NetworksAn Improved Explicit Profile Matching In Mobile Social Networks
An Improved Explicit Profile Matching In Mobile Social Networks
 
Privacy-Preserving Updates to Anonymous and Confidential Database
Privacy-Preserving Updates to Anonymous and Confidential DatabasePrivacy-Preserving Updates to Anonymous and Confidential Database
Privacy-Preserving Updates to Anonymous and Confidential Database
 
Security Issues related with cloud computing
Security Issues related with cloud computingSecurity Issues related with cloud computing
Security Issues related with cloud computing
 
Security for Future Networks: A Prospective Study of AAIs
Security for Future Networks: A Prospective Study of AAIsSecurity for Future Networks: A Prospective Study of AAIs
Security for Future Networks: A Prospective Study of AAIs
 
V1_I1_2012_Paper4.doc
V1_I1_2012_Paper4.docV1_I1_2012_Paper4.doc
V1_I1_2012_Paper4.doc
 
Enhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart CredentialsEnhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart Credentials
 
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET-  	  Recognizing User Portrait for Fraudulent Identification on Online ...IRJET-  	  Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
 
Peer-to-Peer Communication Service and Messaging System
Peer-to-Peer Communication Service and Messaging SystemPeer-to-Peer Communication Service and Messaging System
Peer-to-Peer Communication Service and Messaging System
 
Wi-Fi Direct P2P Messenger-Browser App
Wi-Fi Direct P2P Messenger-Browser AppWi-Fi Direct P2P Messenger-Browser App
Wi-Fi Direct P2P Messenger-Browser App
 
Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server
 
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
 
A Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking WebsitesA Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking Websites
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
 
A Steganography-based Covert Keylogger
A Steganography-based Covert KeyloggerA Steganography-based Covert Keylogger
A Steganography-based Covert Keylogger
 

Mais de Shailesh kumar

Segmentation of bank customer
Segmentation of bank customerSegmentation of bank customer
Segmentation of bank customerShailesh kumar
 
Project report Segmentation and Penetration in HDFC bank
Project report Segmentation and Penetration in HDFC bank Project report Segmentation and Penetration in HDFC bank
Project report Segmentation and Penetration in HDFC bank Shailesh kumar
 
Merger of Vodafone and hutch
Merger of Vodafone and hutchMerger of Vodafone and hutch
Merger of Vodafone and hutchShailesh kumar
 
SOLAR MPPT, INVERTER AND AUTOSWITCHING
SOLAR MPPT, INVERTER AND AUTOSWITCHINGSOLAR MPPT, INVERTER AND AUTOSWITCHING
SOLAR MPPT, INVERTER AND AUTOSWITCHINGShailesh kumar
 
MultiModal Image Search on Mobile Device
MultiModal Image Search on Mobile DeviceMultiModal Image Search on Mobile Device
MultiModal Image Search on Mobile DeviceShailesh kumar
 
Fairness aware and privacy preserving friend matching protocol in mobile soci...
Fairness aware and privacy preserving friend matching protocol in mobile soci...Fairness aware and privacy preserving friend matching protocol in mobile soci...
Fairness aware and privacy preserving friend matching protocol in mobile soci...Shailesh kumar
 
Recognition and enhancement of traffic sign for computer generated images
Recognition and enhancement of traffic sign for computer generated imagesRecognition and enhancement of traffic sign for computer generated images
Recognition and enhancement of traffic sign for computer generated imagesShailesh kumar
 
seminar on To block unwanted messages _from osn
seminar on To block  unwanted  messages _from osnseminar on To block  unwanted  messages _from osn
seminar on To block unwanted messages _from osnShailesh kumar
 
TELEPHONE BILLING SYSTEM
TELEPHONE BILLING SYSTEMTELEPHONE BILLING SYSTEM
TELEPHONE BILLING SYSTEMShailesh kumar
 

Mais de Shailesh kumar (12)

Segmentation of bank customer
Segmentation of bank customerSegmentation of bank customer
Segmentation of bank customer
 
Project report Segmentation and Penetration in HDFC bank
Project report Segmentation and Penetration in HDFC bank Project report Segmentation and Penetration in HDFC bank
Project report Segmentation and Penetration in HDFC bank
 
Merger of Vodafone and hutch
Merger of Vodafone and hutchMerger of Vodafone and hutch
Merger of Vodafone and hutch
 
Drivetrain
DrivetrainDrivetrain
Drivetrain
 
ONLINE SOCIAL NETWORK
ONLINE SOCIAL NETWORKONLINE SOCIAL NETWORK
ONLINE SOCIAL NETWORK
 
SOLAR MPPT, INVERTER AND AUTOSWITCHING
SOLAR MPPT, INVERTER AND AUTOSWITCHINGSOLAR MPPT, INVERTER AND AUTOSWITCHING
SOLAR MPPT, INVERTER AND AUTOSWITCHING
 
snake game
snake gamesnake game
snake game
 
MultiModal Image Search on Mobile Device
MultiModal Image Search on Mobile DeviceMultiModal Image Search on Mobile Device
MultiModal Image Search on Mobile Device
 
Fairness aware and privacy preserving friend matching protocol in mobile soci...
Fairness aware and privacy preserving friend matching protocol in mobile soci...Fairness aware and privacy preserving friend matching protocol in mobile soci...
Fairness aware and privacy preserving friend matching protocol in mobile soci...
 
Recognition and enhancement of traffic sign for computer generated images
Recognition and enhancement of traffic sign for computer generated imagesRecognition and enhancement of traffic sign for computer generated images
Recognition and enhancement of traffic sign for computer generated images
 
seminar on To block unwanted messages _from osn
seminar on To block  unwanted  messages _from osnseminar on To block  unwanted  messages _from osn
seminar on To block unwanted messages _from osn
 
TELEPHONE BILLING SYSTEM
TELEPHONE BILLING SYSTEMTELEPHONE BILLING SYSTEM
TELEPHONE BILLING SYSTEM
 

Último

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 

Último (20)

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 

Reports on Fairness aware and privacy preserving friend matching protocol in mobile social networks

  • 1. TE Seminar Friend Matching protocol DYPCOE,Akurdi 1 Dept of Computer Engineering CHAPTER 1: INTRODUCTION In the last decade, the number of users of online social networking sites and of mobile phone services has increase rapidly. The most popular online social networking site, Fa- cebook, has more than 500 million active users, and more than 50% of its active users log on to Facebook at least once per day [1]. In terms of mobile phone services, there were 4.1 billion mobile cellular subscribers in total in March 2009 [2]. With the proliferation of mobile devices, mobile social networks (MSNs) are becoming devoted part of our lives. Leveraging networked portable devices such as smart phones andpersonal digital assistant(PDA) as platforms, MSN not only enables people to use their existing online social networks (OSNs) at anywhere and anytime, but also introduc- es a myriad of mobility-oriented applications, such as location-based services and aug- mented reality. Among them, an important service is to make new social connec- tions/friends within physical proximity based on the matching of personal profiles. For example, MagnetU is a MSN application that matches one with nearby people for dating or friend-making based on common interests. In such an application, a user only needs to input some (query) attributes in her profile, and the system would automatically find the persons around with similar profiles. The scopes of these applications are very broad, since people can input anything as they want, such as hobbies, phone contacts and places they have been to. The latter can even be used to find “lost connections” and “familiar strangers”.
  • 2. TE Seminar Friend Matching protocol DYPCOE,Akurdi 2 Dept of Computer Engineering 1.1 EXISTING MODEL Privacy preservation is a significant research issue in social networking. The social net- working platforms are extended into the mobile environment, users require more exten- sive privacy-preservation because they are unfamiliar with the neighbors in close vicinity who may store, and correlate their personal information at different time periods and loca- tions. Once the personal information is correlated to the location information, the behav- ior of users will be completely disclosed to the public. The content-sharing applications, all of which provide no feedback or control mecha- nisms to users and may cause inappropriate location and identity information disclosure. As shown in fig.1, Alice has her own profile and Bob has her own. Alice is interested in finding a boy with similar profile and bob is also interested in finding a girl with same profile. A successfulmatching could be achieved in case that Alice’s profile matches Bob’s interest while, at the same time, Bob’s profile matches Alice’s interest [3]. The ex- isting model support this type of mapping process. Fig 1.1. Phishing report between 2010 to 2013.
  • 3. TE Seminar Friend Matching protocol DYPCOE,Akurdi 3 Dept of Computer Engineering Further, the existing proposals are one-way only and profile matching requires running a protocol twice, with reversed roles in the second run. A malicious attacker or dishones- tuser launch the runaway attackto exploit this two-pass protocol. This runaway attack in- curs a serious unfairness issue. 1.2 PROPOSED SYSTEM: The proposed system for Private Profile Matching, which allow two users to compare theirpersonal profiles without revealing private informationto each other. The private pro- file matching problem could thenbe converted into Private Set Intersection or Private Set Intersection Cardinality. In particular, two mobile users, each of whom holds aprivate da- ta set respectively, could jointly compute theintersection or the intersection cardinality of the twosets without leaking any additional information to either side. Fig 1.2 Private profile matching in mobile social networks To achieve this goal, a novel Blind Vector Transformation Techniqueis introduce, which could hide the correlation between the original vector and the transformed result. Based on it,the privacy-preserving and fairness-aware friend matching protocol is proposed, which enables one party to match its interest with the profile of another, and vice versa, without revealing their real interest. By the help of Blind Vector Transformation Tech-
  • 4. TE Seminar Friend Matching protocol DYPCOE,Akurdi 4 Dept of Computer Engineering nique, the interest as well as profile private during match its interests with another’s pro- file is kept. To prevent runaway attack, a lightweight verifier checking technique is ena- ble that verify the matching at the minimized overhead and prevent from launching the runaway attack. Fig.3 Friend discovery in mobile social networks.
  • 5. TE Seminar Friend Matching protocol DYPCOE,Akurdi 5 Dept of Computer Engineering CHAPTER 2. SYSTEM, ADVERSARY, MODEL AND PRELIMINARIES In this chapter, firstly introduce a system model as well as the adversary model. Then de- sign goals is proposed,Before introducing the proposed protocol, a brief introduction on some cryptographic foundations, including Parlier Holomorphic Encryption is given in this chapter. 2.1 SYSTEM MODEL In MSNs, when a user come at new palace and launches a query to find a friend. This pro- file consists of multiple attributes, which could be denoted as a vector P = {p1, p2,….,pn}. Here pj (j = 1,…,n) is an integer, which refers to an attribute of P. when a user issues a query, he firstly generates the corresponding interest vector I = {i1, i2,……,in}. Fig 2.1. System Architecture A typical friend discovery process could be described as follows. User A will send his current interest IA to user B, and then he will obtain B's current interest IB. After the in-
  • 6. TE Seminar Friend Matching protocol DYPCOE,Akurdi 6 Dept of Computer Engineering terests are exchanged, A will compare his own profile PA with IB while B compares his profile PB with IA. A successful matching as PB matches IB and, at the same time, PB matches IA[4] is defined. 2.2. ADVERSARY MODEL The adversary is considered to be curious with others' profile and interest. Therefore, if without an appropriate security countermeasure, the friend discovery process may suffer from a series of privacy threats. In particular, the following adversary model is consid- ered: i) Privacy Inference from Profile Matching: The adversary tries to find out the interest or the profile of the other users during the profile matching process. ii) Privacy Inference from aborting the protocol (Runaway Attack):This attack will introduce a serious unfairness issue since, in a two-pass protocol, the adver- sary could refuse to send hismatching result after obtaining the result from his- partner. iii) Collusion Attack: The adversary may collude with other users to infer the user’s private information. 2.3. DESINGNING OBJECTIVE The proposed Privacy-preserving and fairness-aware Friend Matching Protocol should satisfy the following objectives: i) Privacy Guarantee:No any attacker could obtains the profile information of the users. Each users can only obtained the comparison result “success” or “fail”. This operation can happen after performing the privacy–preserving friend match- ing protocol in the proposed protocol. ii) Fairness Assurance:In each phase of the protocol, a user can obtain personal in- formation from others as much as his own personal information leaking from the protocol. In other words, no one can gain more information than what he tell
  • 7. TE Seminar Friend Matching protocol DYPCOE,Akurdi 7 Dept of Computer Engineering 2.4.PAILLIER HOMOMORPHIC ENCRYPTION The protocol proposed in this paper is based on paillier’s homomorphismencryption. Paillier cryptosystem works to help illustrate and understand our protocol. I. Key Generation: The trusted third party chooses two large prime numbers pand qrandomly such that gcd (pq (p - 1) (q - 1)) = 1 and compute n = pq and λ =lcm (p – 1, q - 1). It then selects a randomg 𝛜 ZN 2 such that gcd (L (gλ mod N2 ), N) = 1, where L(x) = (x - 1)/N. The entity's Paillier public and private keys are < N, g > and λ respectively. II. Encryption: Let m be a message to be encrypted where m 𝜖Zn and r ϵ Zn be a random number. The ciphertext could be given by E(m mod N, r mod N) = gm rn mod N2 Where E () denotes the Paillier encryption operation. III. Decryption: Given a ciphertext c ϵ ZN 2 the corresponding plaintext can be de- rived as D(c) = L (cλ mod N2) /L(gλ mod N2 ) mod N Where D () denotes the Paillier decryption operation using private sk = λ hereafter IV. Homomorphic:given m1, m2, r1, r2, ϵ ZN , it satisfies the following homomor- phioc property: E (m1). E (m2) = E (m1 + m2)
  • 8. TE Seminar Friend Matching protocol DYPCOE,Akurdi 8 Dept of Computer Engineering CHAPTER 3. THE PROPOSE PRIVACY PRESERVING PROTOCOL In this chapter, the details of protocols are presented. Firstly the basic idea behind the proposed protocol is presented. 3.1. PROTOCOL OVERVIEW Here two types of protocol are proposed. One is Blind Vector transformation Protocol and second is Fairness-aware and Collusion-free protocol. In the blind transformation phase, each participant will encrypt his profile by using his public key and provide it to his partner for blind transformation. The basic idea of blind vector transformation protocol is allowing two untrusted parties to transform two vectors into the blind ones by following a series of private and identical steps, e.g., adding a ran- dom vector, shuffling in the same order. Since the transformation follows the same step, the matching results (e.g. the number of matched interest and profiles) keep unchanged before and after the transformation, which enable the untrusted participants compare the profile without leaking their real interest or profile information. For the first time, the user’s interest from its profile is separated, which is expected to be a generalization of traditional profile matching problem.A novel blind vector transfor- mation technique, which could hide the correlation between the original vector and the transformed result is introduced. Based on it, the privacy-preserving and fairness-aware friend matching protocol is proposed, which enables one party to match its interest with the profile of another, and vice versa, without revealing their real interest. A novel light- weight verifier checking approach to thwart runaway attack and thus achieve the fairness of two participants. The protocols is implemented in real experiments. The performance of the proposed scheme is demonstrated via extensive experiment results.
  • 9. TE Seminar Friend Matching protocol DYPCOE,Akurdi 9 Dept of Computer Engineering How to hide the real value of the interest or profile of the users is the major challenge of the blind vector. The basic idea is that two untrusted participants will contribute a part of this transformation while each of them cannot recover the real interest or profile. To achieve this, five primitive operation is defined as follow: i) Encrypt: Given a vector v, it performs Paillier encryption on it with public key pk to obtain the ciphertext Epk[v]. Such an operation is denoted as En- crypt(v,pk). ii) Vecadd: Given two vectors r and v, both of which are encrypted under Pailli- er encryption, the operation VecAdd will be executed to perform a sum oper- ation E[v]E[r] D E[v + r]. Such an operation is denoted as VecAdd(v, r). iii) Vecext: Given a vector v, the operation VecExt(v; r) could hide the real value of v by performing a diffusion operation, which appends some dummy vec- tors r to v to obtain v||r. iv) Vecshuffle: Given a vector v, the operation VecShuffle (v) could hide the real value of Ev by performing a confusion operation, which randomly shuffles the elements in vector v. v) Vecrev: Given a vector v, the operation VecRev(v; k) could further hide the real value of v by randomly changing the value of k elements in vector v. In blind vector transformation phase, the user Aencrypts his profile with his own public key by triggeringoperation Encrypt(v,k). for keeping A's profile private Paillier is adopted encrypt operation(v,pk).at the same time, allows B toperform blind transformation on it. The transformation operations include VecAdd, VecExt, VecShuffle, VecRev.The user B also makes the same blind transformation on B'sprofile. After finishing these steps, in the matching phase, itis required that each participant should compare the blindedinterest and profile. Each participant will send the number ofmatching vector pairs as well as the size of search interest to a verifier. The verifier will compare if the number of search interest equals to the number of matching vector pairs
  • 10. TE Seminar Friend Matching protocol DYPCOE,Akurdi 10 Dept of Computer Engineering Table 3.1.Five primitive operation in blind transformatiom Algorithm 1The Blind Transformation Algorithm Input: P` a← Ua`s profile encrypted under his public key pka,Ib←Ub`s interest, eb← the number of interest Ub considered in Ib and lb← a security parameter. Output: P``a← the blind transformation profile vector for Ua`I``b← the transformed Interest vector for Ua and sb← the actual matching result for Ub. Function: BLIND TRANSFORMATION (P`a, pka, Ib, eb,) rb← random vector of length n = || P`a || r`b← encrypt (ra , pka) Pa← VecAdd (P`a , r`a) Ia← VecAdd (Ib, rb) y`b← random vector of length lb P`a ← encrypt (yb , pka) kb ← VecExt(Pa, y`b) yb← random number between[1 , lb] I`b ← VecRev (yb , kb) I``b ← VecShuffer (I`b) P``b ← VecShuffer (P`a)
  • 11. TE Seminar Friend Matching protocol DYPCOE,Akurdi 11 Dept of Computer Engineering Sb ← eb + lb - kb return P``a ,I``b,sb end function 3.2. SYSTEM INITIALIZATION PHASE Uaand Ubare two two potential friend discovery nodes which does not loss any generali- ty. In this phase the private and public key pair are generated by the trusted third party.these key pairs are denoted by (ska , pka) and (skb ,pkb). pa and pb denotes theire profiles.For a matching, Ua and Ub may only consider ea and eb out of total n interest fields. Thus, there are n−ea and n−ebattributes which are excluded from this match.thecurrent interest vectors are Ia and Ibare assumed. 3.3. THE PROPOSED BLIND TRANSFORMATION PROTOCOL The blind transformation process is introduced by taking Ubtransforming Ua's profile and his own interest as an example. It is similar for Ua to blind transform Ub's profile. Ua per- forms Encrypt(Pa,pka) to encrypt his profile Pa, which is denoted as P’a. Ua sends P’a and pka to Ub. Then, Ub performs the following blind transformation operations: I. Blind Add:Ubgenerates a random vector rb, and then performs r’b= En- crypt(rb,pka). After that, Ubcalculates Pa = VecAdd(P’a, rb) and Ib= VecAdd(Ib; r- b) by adding r’b and rbto P’a and Ib respectively. II. Blind Append: Ubgenerates a random vector ybof length lb, where lbis a prede- termined security parameter, then performs y’b= Encrypt(yb , pka) to get P’a= VecExt(Pa; y’b). III. Blind Reverse:Ubrandomly selects kb ϵ {1,2,…l2}and performs yb= VecRev(yb,kb), then obtains I’b =VecExt(Ib; yb). IV. Blind Shuffle: Ubperforms I’’b= VecShuffle(I’b)and P’’a = VecShuffle(P’a) with the same order.
  • 12. TE Seminar Friend Matching protocol DYPCOE,Akurdi 12 Dept of Computer Engineering After performing this process, Ub finishes the blind transformation of Pa and Ib. In the same time, Ub also encrypts his profile and Ua follows the same strategy to make a blind transformation towards Pb and Ia. However, if only with VecAdd and VecShuffle, adishonest participant could still infer another party's profile information without reveal his own profile information by stopping the protocol as long as he receives the matching information between his interest and an- other party's profile, which is called as runaway attack. Runaway attack will lead to seri- ous unfairness issue. To achieve fairness of the proposed protocol, VecExt and VecRev are further introduced, which are used to hide the exact interest/profile matching numbers. 3.4. THE PROPOSED FAIRNESS-AWARE AND COLLUSION-FREE MATCHING PROTOCOL The privacy-preserving and fairness-aware friend matching protocol, which enables one party to match its interest with the profile of another, and vice versa, without revealing their real interest. a novel lightweight verifier checking approach to thwart runaway at- tack and thus achieve the fairness of two participants. This protocols in real experiments. the performance of the proposed scheme via extensive experiment results is demonstrat- ed. Decrypt verification protocol to check that two parties interest match their counterparts or not is used. By performing the decryption operation with his own secret key ska,Ua obtains Pa = De- crypt(P’’a, ska).Afterobtaining Pa, Ua compares it with Ub's blinded interests Ibto get the number of matched entries sb, while Ub could get sasimilarly. To verify if their interests and the profiles match or not, Ua sends ha= H(sa || sb) whereas Ubsends hb= H(sa ||sb) to a randomly chosen verifier. The verifier could verify whether ha = hb. If ha= hb, the match succeeds, otherwise, it fails.
  • 13. TE Seminar Friend Matching protocol DYPCOE,Akurdi 13 Dept of Computer Engineering A potential weakness of the proposed basic protocol is that it may be vulnerable to collu- sion attack. To thwart the collusion attack, based on Blind Linear Transformation Fair- ness-aware and collusion-free Matching protocol to tolerate the collusion attack is pro- posed. An addition blind linear transformation round is introduced instead of directly sending the ha and hb to the verifier.The collusion attack is considered impossible under this scheme for the expensive computation cost.Because In the blind Linear Transfor- mation ,both of their hash results are preserved by a pair of blinding numbers which are much larger than (n + la) or (n + lb).
  • 14. TE Seminar Friend Matching protocol DYPCOE,Akurdi 14 Dept of Computer Engineering CHAPTER 4. SECURITY ANALYSIS In this chapter, demonstration of fairness and the privacy of the proposed protocol by the detailed security analysis is done. 4.1. SECURITY AGAINST INTEREST/PROFILE LEAKING Without loss of generality, consider Pa and Ib. Since the profile Pa is encrypted by Palli- er Cryptogsystem, and without the secret key ska, no one except Ua could get Pa. Thus the privacy in P could be preserved. The privacy in interest Ib is guaranteed by BPVT protocol. Since after receiving the processed Pa and Ib, Ua cannot correlate any item of Ib with the attributes in Pa. At the same time, it is guaranteed for Ub that Ua cannot test his interest by changing Pa arbitrarily. 4.2 SECURITY AGAINST RUNAWAY ATTACK The following Theorem to discuss the upper bound of the successful probability that Ua could guess any item of Ib without any error. Theorem 1 Given a profile P and an interest I which are blind transformed and matched by following the proposed protocols, the correct-guess probability P(CG) that U could infer any item of I based on the blind transformed P and the comparing result s is bounded by , where n is the length of P and l is the number of attributes appended to P. Proof: The successful guess probability is expressed as: min(s,l) P(CG) = ∑ p(m = m′ )Pr{CG|s,m} . ………………………………...(1) m′ =1 where p(m = m′ ) is the probability that U1 could guess m correctly, and in our scheme, {1,2,...,l}.
  • 15. TE Seminar Friend Matching protocol DYPCOE,Akurdi 15 Dept of Computer Engineering Pr{CG|s,m} isthe probability that given s and m, U1 could guess s−m items correctly. Ob- viously, when s-m ≥ n, P(CG|s,m) = 0, when s − m < n,P(CG|s,m) = 1. No matter s > l or s ≤ l, …………………………………….(2) By mathematical induction, P(CG) ≤3/ln (n ≥ 5). Theorem 1 indicates that given ϵ as the expected secure probability such that P(CG) < ϵ, if ϵ is small enough, then U1 will get nothing about U2’s interest since he could not guess any part of I2 correctly, thus he has no incentive to abort the protocol. Furthermore, bound it with 3/ln saferly. And according to this inequality, calculate l and m to guarantee the fairness. Theorem 1 also indicates that if two users are not matched finally, they could not guess anything according to the comparing result. Thus proposed protocol guaranteed the fairness of profile/interest. 4.3 SECURITY AGAINST COLLUSION ATTACK The probability of guessing (ai,bi),i ∈ (1,2) of the other side is negligible.the following theorem is implemented. Theorem 2 Given H(sr′′ b), the probability of guessing sˆa and sb correctly is negligible. Proof: The attempt to guess the parameters can be formalized as guessing (a,b) iny = ax + b given the knowledge of only one pair of (x,y), which is negligible. With a and b, the result x is transformed into a larger space, making exhaustive enumeration difficult. Thus, this step prevents either side from guessing the actual value of the other side by brute- force search over the hash value. In other words, assuming one-way characteristic of the hash function, both users have no knowledge of the other side’s query results. The verifier only receives two hash values and should only answer whether they are equal or not. The only information available to them are the two hash values and the only answer they can get is whether they are equal, which is just as what intended.
  • 16. TE Seminar Friend Matching protocol DYPCOE,Akurdi 16 Dept of Computer Engineering Because of its one way characteristic no futher information can be derived from hash value. This phase only disclose the “success” or “fail” information. No other information disclose by the revealing phase.
  • 17. TE Seminar Friend Matching protocol DYPCOE,Akurdi 17 Dept of Computer Engineering CHAPTER 5. EVALUTION As see from Fig. 5.1, 5.2, and 5.3 the growth of the execution time remains linear al- most in all cases. This makes sense since the time taken in each encryption or decryption is relatively constant as the key size is fixed. Thus the decryption or encryption time grows in proportion with the number of total attributes. 3 security parameter length l = n, l = 2n, l = 3n is chossen. The number of attributes range from 20 to 100. the running time against the numberof attributes under those 3 pa- rameter settings is measured. plotted the average value of 20 runs. Detailed statistics about the results is shown in Table 1 Fig. 5.1indicates that, most of the computation time is spent in Blind Transformation phase. This is true as the encryption is the most expensive part in our implementation. Fig 5.1 Executes time on blind transformation for different number of attributes(ms)
  • 18. TE Seminar Friend Matching protocol DYPCOE,Akurdi 18 Dept of Computer Engineering As Fig. 5.2 shows, the Blind Linear Transformation phase in the protocol introduces quite low overhead, within 46ms in the transformation step. Thus, compared with the basic scheme, the advanced scheme is secure yet runs with little overhead Fig 5.2. Execution time on fair matching phase for different number of attributes(ms). Fig 5.3. Execution time on blind linear transformation for different number of attributes(ms).
  • 19. TE Seminar Friend Matching protocol DYPCOE,Akurdi 19 Dept of Computer Engineering Table 5.1.statistic of experiment results. Using different security parameter l will give different performance since l increases the total vector size and the number of encryption/decryption operations. these 3 parameter settings to demonstrate a trade-off between security and efficiency. However, given the fact that even if the adversary has guessed one attribute correctly, he has no way to verify it and thus, setting l = n is enough in most cases since in comparison with the number of attributes, the is far less than a random guess with probability . Thus it’s secure enough in most cases. With l = n, our implementation performs with 40% less run- ning time . As runs on Intel Core Duo P8600 (2.4GHz), whose clock speed is faster than our i3-330m, and the simulation is a single thread task with no speed up provided by the Hyper-Threading technology in Core i3-330m, this scheme is relatively efficient. Note that the computation overhead on third party users is not measured in the simula- tion. But it’s clear that the only task for third party users is to test whether two integers(no larger than 256 bit when using SHA256) are equal. The transformation overhead and power consumption for them is negligible.
  • 20. TE Seminar Friend Matching protocol DYPCOE,Akurdi 20 Dept of Computer Engineering CHAPTER 6. RELATED WORK 6.1 MOBILE SOCIAL NETWORK Social networking is where individuals with similar interests connect with each other through their mobile/tablet. They form virtual communities. For example Facebook, Twitter, LinkedIn etc. What makes social network sites unique is not that they allow indi- viduals to meet strangers, but rather that they enable users to articulate and make visible their social networks. Research has been done in the mobile social networking field. So- cial serendipity [7] deploys a central server, which contains users’ profiles and user- defined matchmaking preferences. The central server computes the similarity of users’ profile information based on the profile information itself and matchmaking preferences. The explosive popularity of online social networks has attracted significant attention re- cently [8], [9]. Social serendipity to perform matchmaking in mobile social networks is presented [10]. Loopt is a mobile geo-location service that notifies users of friends' loca- tion and activities via detailed interactive maps [11]. It is also observed that there is a large body of industrial efforts, which try to make location based friend discovery by providing android or IOS based services. 6.1.1Mobile Social Network Applications: I. Users can, not only surf the internet but also communicate with peers using shortrangewireless communications. II. Users may subscribe to a news-feed, a blog, or a service that monitors stock pric- es,traffic congestion etc. III. OSNs(Online Social Networks) allow their users to upload multimedia con- tent,communicate and share various informations. IV. mHealthcare social network(MHSN) provides a promising platform for the sen- iors who have the same symptom to exchange their experiences, give mutual sup- port and inspiration to each other, and help forwarding their health information wirelessly to a related mhealth center.
  • 21. TE Seminar Friend Matching protocol DYPCOE,Akurdi 21 Dept of Computer Engineering Fig.6.1 mobile network in city
  • 22. TE Seminar Friend Matching protocol DYPCOE,Akurdi 22 Dept of Computer Engineering 6.2. SECURE FRIEND DISCOVERY IN MOBILE SOCIAL NETWORKS Online social networks, such as Facebook andMyspace, have experienced an explosive growth recently. Mobile social networks, which bring social networking to mobile phones, represent a natural next step and have already generated a lot of excitement Mo- bile social networks extend social networks in the cyberspace into the real world by al- lowing mobile users to discover and interact with existing and potential friends who hap- pen to be in their physical vicinity. Despite their promise to enable many exciting applica- tions, serious security and privacy concerns have hindered wide adoption of these net- works. To address these concerns, a novel techniques and protocols to compute social proximity between two users to discover potential friends is introduce, which is an essential task for mobile social networks. three major contributions are made. First, identify a range of potential attacks against friend discovery by analyzing real trac- es. Second, develop a novel solution for secure proximity estimation, which allows users to identify potential friends by computing social proximity in a privacy-preserving man- ner. A distinctive feature of our solution is that it provides both privacy and verifiability, which are frequently at odds in secure multiparty computation. Third, todemonstrate the feasibility and effectiveness of our approaches using real implementation on smartphones.
  • 23. TE Seminar Friend Matching protocol DYPCOE,Akurdi 23 Dept of Computer Engineering CHAPTER 7. SUMMARY With increasing popularity of mobile social networks, it isimportant to develop secure and practical protocols to enable users to effectively interact with each other. In this re- port, A secure friend discovery protocol for mobile social networks is discover, and use both analysis and real implementation to demonstrate its feasibility and effectiveness. A matchmaking protocol that preserves users’ interest information from unnecessary leaks in mobile social networking concept is launched. The implementation and evaluation of the protocol show that the protocol is practical on current smartphones. In terms of future work, how to investigate how real people use our matchmaking protocol to learn more about the usefulness of mobile social networking applications in general.
  • 24. TE Seminar Friend Matching protocol DYPCOE,Akurdi 24 Dept of Computer Engineering REFERENCES 1] Facebook.Statistics.http://www.facebook.com/press/info.php?statistic. M. Li, N. Cao, S. Yu, and W. Lou, ``FindU: Privacy-preserving personal 2] prole matching in mobile social networks,'' in Proc. IEEE INFOCOM, 3] Shanghai, China, Apr. 2011, pp. 24352443. Accessed March 2011 4] MOCOM2020. 4.1 Billion Mobile Phone Subscribers Worldwide. http://www.mocom2020.com/2009/03/4.1-billion-mobile-phone-subscribers- worldwide/. Accessed March 2011. 5] Perfect-Match [Online]. Available: http://www.perfectmatch.com 6] M. Li, N. Cao, S. Yu, and W. Lou, ``FindU: Privacy-preserving personal profile matching in mobile social networks,'' in Proc. IEEE INFOCOM, Shanghai, China, Apr. 2011, pp. 2435-2443. 7] Nathan Eagle and Alex Pentland. Social Serendipity: Mobilizing Social Software. IEEE Pervasive Computing, 4(2):28–34, 2005. 8] H. Zhu, X. Lin, R. Lu, Y. Fan, and X. Shen,``SMART: A secure multilayer cred- it-Based incentive scheme for delay-tolerant networks,'' IEEE Trans.Veh. Tech- nol., vol. 58, no. 8, pp. 828836, Oct. 2009. 9] H. Zhu, X. Lin, R. Lu, P.-H. Ho, and X. Shen, ``SLAB: Secure localized authenti- cation and billing scheme for wireless mesh networks,'' IEEE Trans. Wireless Commun., vol. 17, no. 10, pp. 3858_3868, Oct. 2008. 10]N. Eagle and A. Pentland, ``Social serendipity: Mobilizing social software,'' IEEE Pervas. Comput., vol. 4, no. 2, pp. 2834, Apr. 2005. 11] doi.ieeecomputersociety.org 12]http://www.Academia.com