Skip to main content

A Trustless Broker Based Protocol to Discover Friends in Proximity-Based Mobile Social Networks

  • Conference paper
  • First Online:
Information Security Applications (WISA 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8909))

Included in the following conference series:

Abstract

Due to the rapid growth of online social networking and mobile devices, proximity based mobile social networks (PMSN) are gaining increasing popularity. PMSN refers to the social interaction among physically proximate mobile users where they directly communicate through Bluetooth/Wi-Fi. In PMSN, while making friends, users match their profiles in accordance with their interests. In this regard, preserving a user’s privacy is crucial during profile matching. Users use their profiles for matching. An attacker in user’s near proximity can learn these profiles’ values. This poses significant threat to a user’s privacy. In this regard, we propose a protocol to preserve user’s sensitive information. During discovery of friends in our protocol we use a broker that is an intermediate entity between interacting mobile users. Our protocol does not require trustworthy broker and hence no valuable information is given to broker that can cause a privacy threat. For secure computations paillier encryption has been used in our protocol. Furthermore, we implement and analyze our protocol to show its acceptable computational and communication cost.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Beach, A., Gartrell, M., Han, R.: Solutions to security and privacy issues in mobile social networking. In: IEEE International Conference on Computational Science and Engineering, pp. 1036–1042 (2009)

    Google Scholar 

  2. Kayastha, N., Niyato, D., Wang, P., Hossain, E.: Applications, architectures, and protocol design issues for mobile social networks: a survey. Proc. IEEE 99, 2130–2158 (2011)

    Article  Google Scholar 

  3. Eagle, N., Pentland, A.: Social serendipity: mobilizing social software. IEEE J. Pervasive Comput. 4, 28–34 (2005)

    Article  Google Scholar 

  4. Cox, L.P., Dalton, A., Marupadi, V.: SmokeScreen: flexible privacy control for presence-sharing. In: ACM 5th International Conference on Mobile Systems, Applications and Services, pp. 233–245 (2007)

    Google Scholar 

  5. Pietilainen, A.K., Oliver, E., LeBrun, J., Varghese, G., Diot, C.: Mobiclique: middleware for mobile social networking. In: 2nd ACM Workshop on Online Social Networks (WOSN), pp. 49–54 (2009)

    Google Scholar 

  6. Looptmix. http://www.looptmix.com

  7. Gatsby. http://meetgatsby.com

  8. Yang, Z., Zhang, B., Dai, J., Champion, A., Xaun, D., Li, D.: E-SmallTalker: a distributed mobile system for social networking in physical proximity. In: IEEE International Conference on Distributed Computer System, pp. 468–477 (2010)

    Google Scholar 

  9. Freedman, M.J., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1–19. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  10. Agrawal, R., Evfimievski, A., Srikant, R.: Information sharing across private databases. In: ACM International Conference on Management of Data (SIGMOD), pp. 86–97 (2003)

    Google Scholar 

  11. Xie, Q., Hengartner, U.: Privacy-preserving matchmaking for mobile social networking secure against malicious users. In: IEEE 9th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 252–259 (2011)

    Google Scholar 

  12. Wang, Y., Zhang, T., Li, H., Peng, J.: Efficient privacy preserving matchmaking for mobile social networking against malicious users. In: IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 610–615 (2012)

    Google Scholar 

  13. Zhang, L., Li, X.Y., Liu, Y.: Message in a sealed bottle: privacy preserving friending in social networks. In: IEEE 33rd International Conference on Distributed Computing Systems (ICDCS), pp. 327–336 (2013)

    Google Scholar 

  14. Zhang, R., Zhang, Y., Sun, J., Yan, G.: Fine-grained private matching for proximity-based mobile social networking. In: IEEE INFOCOM, pp. 1969–1977 (2012)

    Google Scholar 

  15. Zhang, R., Zhang, Y., Sun, J., Yan, G.: Privacy-preserving profile matching for proximity-based mobile social networking. IEEE J. Sel. Areas Commun. 31, 656–668 (2013)

    Article  Google Scholar 

  16. Fizza, A., Rasheed, H., Junggab, S., Heekuck, O.: Privacy preserving cloud-based computing platform (PPCCP) for using location based services. In: 6th IEEE/ACM International Conference on Utility and Cloud Computing (UCC), pp. 60–66 (2013)

    Google Scholar 

  17. Torproject. https://www.torproject.org/docs/android.html.en

  18. Zhang, F., Zhao, G., Xing, T.: Privacy-preserving distributed k-nearest neighbor mining on horizontally partitioned multi-party data. In: Huang, R., Yang, Q., Pei, J., Gama, J., Meng, X., Li, X. (eds.) ADMA 2009. LNCS, vol. 5678, pp. 755–762. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Heekuck Oh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Abbas, F., Rajput, U., Hussain, R., Eun, H., Oh, H. (2015). A Trustless Broker Based Protocol to Discover Friends in Proximity-Based Mobile Social Networks. In: Rhee, KH., Yi, J. (eds) Information Security Applications. WISA 2014. Lecture Notes in Computer Science(), vol 8909. Springer, Cham. https://doi.org/10.1007/978-3-319-15087-1_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-15087-1_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-15086-4

  • Online ISBN: 978-3-319-15087-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics