Fairness-Aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks

被引:32
作者
Zhu, Haojin [1 ]
Du, Suguo [2 ]
Li, Muyuan [1 ]
Gao, Zhaoyu [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci, Shanghai 200030, Peoples R China
[2] Shanghai Jiao Tong Univ, Antai Coll Econ & Management, Shanghai 200030, Peoples R China
基金
国家教育部博士点专项基金资助; 中国国家自然科学基金;
关键词
Privacy preserving; friend discovery; mobile social networks;
D O I
10.1109/TETC.2013.2279541
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile social networks represent a promising cyber-physical system, which connects mobile nodes within a local physical proximity using mobile smart phones as well as wireless communication. In mobile social networks, the mobile users may, however, face the risk of leaking their personal information and location privacy. In this paper, we first model the secure friend discovery process as a generalized privacy preserving interest and profile matching problem. We identify a new security threat arising from existing secure friend discovery protocols, coined as runaway attack, which can introduce a serious unfairness issue. To thwart this new threat, we introduce a novel blind vector transformation technique, which could hide the correlation between the original vector and transformed results. Based on this, we propose our privacy preserving and fairness-aware interest and profile matching protocol, which allows one party to match its interest with the profile of another, without revealing its real interest and profile and vice versa. The detailed security analysis as well as real-world implementations demonstrate the effectiveness and efficiency of the proposed protocol.
引用
收藏
页码:192 / 200
页数:9
相关论文
共 18 条
[1]  
[Anonymous], 2012, P 2012 ACM C COMP CO, DOI DOI 10.1145/2382196.2382261
[2]  
De Cristofaro E., 2010, LECT NOTES COMPUTER, V6052, P143, DOI DOI 10.1007/978-3-642-14577-3
[3]  
Dong W, 2011, IEEE INFOCOM SER, P1647, DOI 10.1109/INFCOM.2011.5934958
[4]   Social serendipity: Mobilizing social software [J].
Eagle, N ;
Pentland, A .
IEEE PERVASIVE COMPUTING, 2005, 4 (02) :28-34
[5]  
Freedman MJ, 2004, LECT NOTES COMPUT SC, V3027, P1
[6]  
Kissner L, 2005, LECT NOTES COMPUT SC, V3621, P241
[7]  
Knuth D. E., ART COMPUTER PROGRAM, V2
[8]  
Li M, 2011, IEEE INFOCOM SER, P2435, DOI 10.1109/INFCOM.2011.5935065
[9]   A Secure Handshake Scheme with Symptoms-Matching for mHealthcare Social Network [J].
Lu, Rongxing ;
Lin, Xiaodong ;
Liang, Xiaohui ;
Shen, Xuemin .
MOBILE NETWORKS & APPLICATIONS, 2011, 16 (06) :683-694
[10]  
Paillier P, 1999, LECT NOTES COMPUT SC, V1592, P223