Improved Privacy Preserving Profile Matching in Online Social Networks

Nageswara Rao Yarlagadda, B Naresh

Abstract


Social networking  became popular because of its digital  communication technologies  tools  for  extending  the  social  circle  of  people.  Privacy preservation became a significant  issue  in  social  networking. This work discussed user profile matching  with  privacy preservation and introduced a group of   profile  matching  protocols. Online social network with a mixture of public and private user profiles to predict the private attributes of users. We map this problem to a relational classification problem and we propose practical models that use friendship and group membership information (which is often not hidden) to infer sensitive attributes. The key novel idea is that in addition to friendship links, groups can be carriers of significant information. To the best of our knowledge, this is the first work that uses operation-based and group-based classification to study privacy implications in social networks with mixed public and private user profiles.


Keywords


Mobile social network, profile matching, privacy preservation, homomorphic encryption, oblivious transfer.

References


“Comscore,”http://www.comscoredatamine.com/.

A. G. Miklas, K. K. Gollu, K. K. W. Chan, S. Saroiu, P. K. Gummadi, and E. de Lara, “Exploiting social interactions in mobile systems,” in Ubicomp, 2007, pp. 409–428.

S. Ioannidis, A. Chaintreau, and L. Massouli´ e, “Optimal and scalable distribution of content updates over a mobile social network,” in Proc. IEEE INFOCOM, 2009, pp. 1422–1430.

R. Lu, X. Lin, and X. Shen, “Spring: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks,” in Proc. IEEE INFOCOM, 2010, pp. 632–640.

W. He, Y. Huang, K. Nahrstedt, and B. Wu, “Message propagation in adhoc-based proximity mobile social networks,” in PERCOM workshops, 2010, pp. 141–146.

D. Niyato, P. Wang, W. Saad, and A. Hjørungnes, “Controlled coalitional games for cooperative mobile social networks,” IEEE Transactions onVehicular Technology, vol. 60, no. 4, pp. 1812–1824, 2011.

M. Motani, V. Srinivasan, and P. Nuggehalli, “Peoplenet: engineering a wireless virtual social network,” in MobiCom, 2005, pp. 243–257.

M. Brereton, P. Roe, M. Foth, J. M. Bunker, and L. Buys, “Designing participation in agile ridesharing with mobile social software,” in OZCHI, 2009, pp. 257–260.

E.Bulut and B.Szymanski, “Exploiting friendship relations for efficient routing in delay tolerant mobile social networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 12, pp. 2254–2265, 2012.

Z. Yang, B. Zhang, J. Dai, A. C. Champion, D. Xuan, and D. Li, “E-smalltalker: A distributed mobile system for social networking in physical proximity,” in ICDCS, 2010, pp. 468–477.

Q. Li, S. Zhu, and G. Cao, “Routing in socially selfish delay tolerant networks,” in Proc. IEEE INFOCOM, 2010, pp. 857–865.

X. Liang, X. Li, T. H. Luan, R. Lu, X. Lin, and X. Shen, “Moralitydriven data forwarding with privacy preservation in mobile social networks,” IEEE Transactions on Vehicular Technology, vol. 7, no. 61, pp. 3209–3222, 2012


Full Text: PDF[FULL TEXT]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.