Abstract
Due to the rapid growth of online social networking and mobile devices, proximity based mobile social networks (PMSN) are gaining increasing popularity. PMSN refers to the social interaction among physically proximate mobile users where they directly communicate through Bluetooth/Wi-Fi. In PMSN, while making friends, users match their profiles in accordance with their interests. In this regard, preserving a user’s privacy is crucial during profile matching. Users use their profiles for matching. An attacker in user’s near proximity can learn these profiles’ values. This poses significant threat to a user’s privacy. In this regard, we propose a protocol to preserve user’s sensitive information. During discovery of friends in our protocol we use a broker that is an intermediate entity between interacting mobile users. Our protocol does not require trustworthy broker and hence no valuable information is given to broker that can cause a privacy threat. For secure computations paillier encryption has been used in our protocol. Furthermore, we implement and analyze our protocol to show its acceptable computational and communication cost.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Beach, A., Gartrell, M., Han, R.: Solutions to security and privacy issues in mobile social networking. In: IEEE International Conference on Computational Science and Engineering, pp. 1036–1042 (2009)
Kayastha, N., Niyato, D., Wang, P., Hossain, E.: Applications, architectures, and protocol design issues for mobile social networks: a survey. Proc. IEEE 99, 2130–2158 (2011)
Eagle, N., Pentland, A.: Social serendipity: mobilizing social software. IEEE J. Pervasive Comput. 4, 28–34 (2005)
Cox, L.P., Dalton, A., Marupadi, V.: SmokeScreen: flexible privacy control for presence-sharing. In: ACM 5th International Conference on Mobile Systems, Applications and Services, pp. 233–245 (2007)
Pietilainen, A.K., Oliver, E., LeBrun, J., Varghese, G., Diot, C.: Mobiclique: middleware for mobile social networking. In: 2nd ACM Workshop on Online Social Networks (WOSN), pp. 49–54 (2009)
Looptmix. http://www.looptmix.com
Gatsby. http://meetgatsby.com
Yang, Z., Zhang, B., Dai, J., Champion, A., Xaun, D., Li, D.: E-SmallTalker: a distributed mobile system for social networking in physical proximity. In: IEEE International Conference on Distributed Computer System, pp. 468–477 (2010)
Freedman, M.J., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1–19. Springer, Heidelberg (2004)
Agrawal, R., Evfimievski, A., Srikant, R.: Information sharing across private databases. In: ACM International Conference on Management of Data (SIGMOD), pp. 86–97 (2003)
Xie, Q., Hengartner, U.: Privacy-preserving matchmaking for mobile social networking secure against malicious users. In: IEEE 9th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 252–259 (2011)
Wang, Y., Zhang, T., Li, H., Peng, J.: Efficient privacy preserving matchmaking for mobile social networking against malicious users. In: IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 610–615 (2012)
Zhang, L., Li, X.Y., Liu, Y.: Message in a sealed bottle: privacy preserving friending in social networks. In: IEEE 33rd International Conference on Distributed Computing Systems (ICDCS), pp. 327–336 (2013)
Zhang, R., Zhang, Y., Sun, J., Yan, G.: Fine-grained private matching for proximity-based mobile social networking. In: IEEE INFOCOM, pp. 1969–1977 (2012)
Zhang, R., Zhang, Y., Sun, J., Yan, G.: Privacy-preserving profile matching for proximity-based mobile social networking. IEEE J. Sel. Areas Commun. 31, 656–668 (2013)
Fizza, A., Rasheed, H., Junggab, S., Heekuck, O.: Privacy preserving cloud-based computing platform (PPCCP) for using location based services. In: 6th IEEE/ACM International Conference on Utility and Cloud Computing (UCC), pp. 60–66 (2013)
Torproject. https://www.torproject.org/docs/android.html.en
Zhang, F., Zhao, G., Xing, T.: Privacy-preserving distributed k-nearest neighbor mining on horizontally partitioned multi-party data. In: Huang, R., Yang, Q., Pei, J., Gama, J., Meng, X., Li, X. (eds.) ADMA 2009. LNCS, vol. 5678, pp. 755–762. Springer, Heidelberg (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Abbas, F., Rajput, U., Hussain, R., Eun, H., Oh, H. (2015). A Trustless Broker Based Protocol to Discover Friends in Proximity-Based Mobile Social Networks. In: Rhee, KH., Yi, J. (eds) Information Security Applications. WISA 2014. Lecture Notes in Computer Science(), vol 8909. Springer, Cham. https://doi.org/10.1007/978-3-319-15087-1_17
Download citation
DOI: https://doi.org/10.1007/978-3-319-15087-1_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-15086-4
Online ISBN: 978-3-319-15087-1
eBook Packages: Computer ScienceComputer Science (R0)