Skip to main content
Erschienen in: Soft Computing 8/2018

07.02.2017 | Methodologies and Application

A privacy-preserving fuzzy interest matching protocol for friends finding in social networks

verfasst von: Xu An Wang, Fatos Xhafa, Xiaoshuang Luo, Shuaiwei Zhang, Yong Ding

Erschienen in: Soft Computing | Ausgabe 8/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Nowadays, it is very popular to make friends, share photographs, and exchange news throughout social networks. Social networks widely expand the area of people’s social connections and make communication much smoother than ever before. In a social network, there are many social groups established based on common interests among persons, such as learning group, family group, and reading group. People often describe their profiles when registering as a user in a social network. Then social networks can organize these users into groups of friends according to their profiles. However, an important issue must be considered, namely many users’ sensitive profiles could have been leaked out during this process. Therefore, it is reasonable to design a privacy-preserving friends-finding protocol in social network. Toward this goal, we design a fuzzy interest matching protocol based on private set intersection. Concretely, two candidate users can first organize their profiles into sets, then use Bloom filters to generate new data structures, and finally find the intersection sets to decide whether being friends or not in the social network. The protocol is shown to be secure in the malicious model and can be useful for practical purposes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Bloom B (1970) Space/time trade-offs in hash coding with allowable errors. Commun ACM 13(7):422–426CrossRefMATH Bloom B (1970) Space/time trade-offs in hash coding with allowable errors. Commun ACM 13(7):422–426CrossRefMATH
Zurück zum Zitat Bose P, Guo H, Kranakis E, Maheshwari A, Morin P, Morrison J, Smid MHM, Tang Y (2008) On the false-positive rate of bloom filters. Inf Process Lett 108(4):210–213MathSciNetCrossRefMATH Bose P, Guo H, Kranakis E, Maheshwari A, Morin P, Morrison J, Smid MHM, Tang Y (2008) On the false-positive rate of bloom filters. Inf Process Lett 108(4):210–213MathSciNetCrossRefMATH
Zurück zum Zitat Camenisch J, Zaverucha GM (2009) Private intersection of certified sets. In: Dingledine R, Golle P (eds) FC 2009. LNCS, vol 5628. Springer, Berlin, pp 108–127 Camenisch J, Zaverucha GM (2009) Private intersection of certified sets. In: Dingledine R, Golle P (eds) FC 2009. LNCS, vol 5628. Springer, Berlin, pp 108–127
Zurück zum Zitat Cheielewski L, Hoepman J (2008) Fuzzy private matching (extended abstract). In: Third international conference on IEEE availability, reliability and security Cheielewski L, Hoepman J (2008) Fuzzy private matching (extended abstract). In: Third international conference on IEEE availability, reliability and security
Zurück zum Zitat Chen C, Pai P, Hung W (2013) A new decision making process for selecting project leader based on social network and knowledge map. Int J Fuzzy Syst 15(1):36–46MathSciNet Chen C, Pai P, Hung W (2013) A new decision making process for selecting project leader based on social network and knowledge map. Int J Fuzzy Syst 15(1):36–46MathSciNet
Zurück zum Zitat Cristina D, Elena A, Catalin L, Valentin C (2014) A solution for the management of multimedia sessions in hybrid clouds. Int J Space-Based Situated Comput 4(2):77–87CrossRef Cristina D, Elena A, Catalin L, Valentin C (2014) A solution for the management of multimedia sessions in hybrid clouds. Int J Space-Based Situated Comput 4(2):77–87CrossRef
Zurück zum Zitat Dachman-Soled D, Malkin T, Raykova M, Yung M (2009) Efficient robust private set intersection. In: Abdalla M, Pointcheval D, Fouque PA, Vergnaud D (eds) ACNS 09. LNCS, vol 5536. Springer, Berlin, pp 125–142 Dachman-Soled D, Malkin T, Raykova M, Yung M (2009) Efficient robust private set intersection. In: Abdalla M, Pointcheval D, Fouque PA, Vergnaud D (eds) ACNS 09. LNCS, vol 5536. Springer, Berlin, pp 125–142
Zurück zum Zitat De Cristofaro E, Kim J, Tsudik G (2010) Linear-complexity private set intersection protocols secure in malicious model. In: Abe M (ed) ASIACRYPT 2010. LNCS, vol 6477. Springer, Berlin, pp 213–231 (2010) De Cristofaro E, Kim J, Tsudik G (2010) Linear-complexity private set intersection protocols secure in malicious model. In: Abe M (ed) ASIACRYPT 2010. LNCS, vol 6477. Springer, Berlin, pp 213–231 (2010)
Zurück zum Zitat De Cristofaro E, Tsudik G (2010) Practical private set intersection protocols with linear complexity. In: Sion R (ed) FC 2010. LNCS, vol 6052. Springer, Berlin, pp 143–159 De Cristofaro E, Tsudik G (2010) Practical private set intersection protocols with linear complexity. In: Sion R (ed) FC 2010. LNCS, vol 6052. Springer, Berlin, pp 143–159
Zurück zum Zitat Debnath SK, Dutta R (2015) Secure and efficient private set intersection cardinality using bloom filter. In: ISC 2015. LNCS, Springer, Berlin, pp 209–226 Debnath SK, Dutta R (2015) Secure and efficient private set intersection cardinality using bloom filter. In: ISC 2015. LNCS, Springer, Berlin, pp 209–226
Zurück zum Zitat Dong C, Chen L, Wen Z (2013) When private set intersection meets big data: an efficient and scalable protocol. In: Sadeghi AR, Gligor VD, Yung M (eds) ACM CCS 13. ACM Press, pp 789–800 Dong C, Chen L, Wen Z (2013) When private set intersection meets big data: an efficient and scalable protocol. In: Sadeghi AR, Gligor VD, Yung M (eds) ACM CCS 13. ACM Press, pp 789–800
Zurück zum Zitat Freedman MJ, Nissim K, Pinkas B (2004) Efficient private matching and set intersection. In: Cachin C, Camenisch J (eds) EUROCRYPT 2004. LNCS, vol 3027. Springer, Berlin, pp 1–19 Freedman MJ, Nissim K, Pinkas B (2004) Efficient private matching and set intersection. In: Cachin C, Camenisch J (eds) EUROCRYPT 2004. LNCS, vol 3027. Springer, Berlin, pp 1–19
Zurück zum Zitat Fu Z, Ren K, Shu J, Sun X, Huang F (2015) Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans Parallel Distrib Syst. doi:10.1109/TPDS.2015.2506573 Fu Z, Ren K, Shu J, Sun X, Huang F (2015) Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans Parallel Distrib Syst. doi:10.​1109/​TPDS.​2015.​2506573
Zurück zum Zitat Fu Z, Wu X, Guan C, Sun X, Ren K (2016) Towards efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans Inf Forensics Secur. doi:10.1109/TIFS.2016.2596138 Fu Z, Wu X, Guan C, Sun X, Ren K (2016) Towards efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans Inf Forensics Secur. doi:10.​1109/​TIFS.​2016.​2596138
Zurück zum Zitat Guo S, Xu H (2015) A secure delegation scheme of large polynomial computation in multi-party cloud. Int J Grid Util Comput 6(2):1–7 Guo S, Xu H (2015) A secure delegation scheme of large polynomial computation in multi-party cloud. Int J Grid Util Comput 6(2):1–7
Zurück zum Zitat Hazay C, Lindell Y (2008) Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. In: Canetti R (ed) TCC 2008. LNCS, vol 4948. Springer, Berlin, pp 155–175 Hazay C, Lindell Y (2008) Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. In: Canetti R (ed) TCC 2008. LNCS, vol 4948. Springer, Berlin, pp 155–175
Zurück zum Zitat Hazay C, Nissim K (2010) Efficient set operations in the presence of malicious adversaries. In: Nguyen PQ, Pointcheval D (eds) PKC 2010. LNCS, vol 6056. Springer, Berlin, pp 312–331 Hazay C, Nissim K (2010) Efficient set operations in the presence of malicious adversaries. In: Nguyen PQ, Pointcheval D (eds) PKC 2010. LNCS, vol 6056. Springer, Berlin, pp 312–331
Zurück zum Zitat Hu J, Hu Y, Bein H (2011) Constructing a corporate social responsibility fund using fuzzy multiple criteria decision making. Int J Fuzzy Syst 13(3):195–205 Hu J, Hu Y, Bein H (2011) Constructing a corporate social responsibility fund using fuzzy multiple criteria decision making. Int J Fuzzy Syst 13(3):195–205
Zurück zum Zitat Jarecki S, Liu X (2009) Efficient oblivious pseudorandom function with applications to adaptive OT and secure computation of set intersection. In: Reingold O (ed) TCC 2009. LNCS, vol 5444. Springer, Berlin, pp 577–594 Jarecki S, Liu X (2009) Efficient oblivious pseudorandom function with applications to adaptive OT and secure computation of set intersection. In: Reingold O (ed) TCC 2009. LNCS, vol 5444. Springer, Berlin, pp 577–594
Zurück zum Zitat Jarecki S, Liu X (2010) Fast secure computation of set intersection. In: Garay JA, Prisco RD (eds) SCN 10. LNCS, vol 6280. Springer, Berlin, pp 418–435 Jarecki S, Liu X (2010) Fast secure computation of set intersection. In: Garay JA, Prisco RD (eds) SCN 10. LNCS, vol 6280. Springer, Berlin, pp 418–435
Zurück zum Zitat Kerschbaum F (2012) Outsourced private set intersection using homomorphic encryption. In: Youm HY, Won Y (eds) ASIACCS 12. ACM Press, pp 85–86 Kerschbaum F (2012) Outsourced private set intersection using homomorphic encryption. In: Youm HY, Won Y (eds) ASIACCS 12. ACM Press, pp 85–86
Zurück zum Zitat Kissner L, Song DX (2005) Privacy-preserving set operations. In: Shoup V (ed) CRYPTO 2005. LNCS, vol 3621. Springer, Berlin, pp 241–257 Kissner L, Song DX (2005) Privacy-preserving set operations. In: Shoup V (ed) CRYPTO 2005. LNCS, vol 3621. Springer, Berlin, pp 241–257
Zurück zum Zitat Liu X, Deng R, Ding W, Lu R, Qin B (2016) Privacy-preserving outsourced calculation of floating point numbers. IEEE Trans Inf Forensics Secur 11(11):2513–2527CrossRef Liu X, Deng R, Ding W, Lu R, Qin B (2016) Privacy-preserving outsourced calculation of floating point numbers. IEEE Trans Inf Forensics Secur 11(11):2513–2527CrossRef
Zurück zum Zitat Many D, Burkhart M, Dimitropoulos X (2012) Fast private set operations with sepia. Technical Report 345 Many D, Burkhart M, Dimitropoulos X (2012) Fast private set operations with sepia. Technical Report 345
Zurück zum Zitat Meriem T, Mahmoud B, Fabrice K (2014) An approach for developing an interoperability mechanism between cloud providers. Int J Space-Based Situated Comput 4(2):88–99CrossRef Meriem T, Mahmoud B, Fabrice K (2014) An approach for developing an interoperability mechanism between cloud providers. Int J Space-Based Situated Comput 4(2):88–99CrossRef
Zurück zum Zitat Oded G (2009) The foundations of cryptography-vol 2, basic applications. Cambridge University Press, Cambridge Oded G (2009) The foundations of cryptography-vol 2, basic applications. Cambridge University Press, Cambridge
Zurück zum Zitat Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: Stern J (ed) EUROCRYPT’99. LNCS, vol 1592. Springer, Berlin, pp 223–238 Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: Stern J (ed) EUROCRYPT’99. LNCS, vol 1592. Springer, Berlin, pp 223–238
Zurück zum Zitat Wang Y, Du J, Cheng X, Liu Z, Lin K (2016) Degradation and encryption for outsourced png images in cloud storage. Int J Grid Util Comput 7(1):22–28CrossRef Wang Y, Du J, Cheng X, Liu Z, Lin K (2016) Degradation and encryption for outsourced png images in cloud storage. Int J Grid Util Comput 7(1):22–28CrossRef
Zurück zum Zitat Xia Z, Wang X, Sun X, Wang Q (2015) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352CrossRef Xia Z, Wang X, Sun X, Wang Q (2015) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352CrossRef
Zurück zum Zitat Zhu S, Yang X (2015) Protecting data in cloud environment with attribute-based encryption. Int J Grid Util Comput 6(2):91–97CrossRef Zhu S, Yang X (2015) Protecting data in cloud environment with attribute-based encryption. Int J Grid Util Comput 6(2):91–97CrossRef
Metadaten
Titel
A privacy-preserving fuzzy interest matching protocol for friends finding in social networks
verfasst von
Xu An Wang
Fatos Xhafa
Xiaoshuang Luo
Shuaiwei Zhang
Yong Ding
Publikationsdatum
07.02.2017
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 8/2018
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-017-2506-x

Weitere Artikel der Ausgabe 8/2018

Soft Computing 8/2018 Zur Ausgabe

Methodologies and Application

Particle state change algorithm