Mobile Social Networks For Flattering Unsigned Profile Matching
Mobile Social Networks For Flattering Unsigned Profile Matching
Mobile Social Networks For Flattering Unsigned Profile Matching
ANUSHA.V, 2 K.SUMALATHA
M.Tech Research Scholar, Priyadarshini Institute of Technology and Science for Women
2
Assistant Professor, Priyadarshini Institute of Technology and Science for Women
Abstract: Social networking makes digital communication technologies sharpening tools for extending the social circle of
people. Privacy preservation is a significant research issue in social networking. Here user Profile matching with privacy
preservation in mobile social networks (MSNs) is studied and a family of Profile matching protocols is introduced. An explicit
Comparison-based Profile matching protocol (eCPM) which runs between two parties, an initiator and a responder is
proposed which enables the initiator to obtain the comparison-based matching result about a specified attribute in their
Profiles, while preventing their attribute values from disclosure. An implicit Comparison-based Profile matching protocol
(iCPM) is then proposed which allows the initiator to directly obtain some messages instead of the comparison result from
the responder. The messages unrelated to user Profile can be divided into multiple categories by the responder. The initiator
implicitly chooses the interested category which is unknown to the responder. Two messages in each category are prepared
by the responder, and only one message can be obtained by the initiator according to the comparison result on a single
attribute. iCPM is further generalized into an implicit Predicate-based Profile matching protocol (iPPM) which allows complex
comparison criteria spanning multiple attributes.
Keywords: Mobile social network, Profile matching, privacy preservation, Homomorphic encryption, oblivious transfer
I. INTRODUCTION
technologies.
IJCERT2014
www.ijcert.org
384
2. RELATED WORK
called
each other.
E-Small
Talker,
which
facilitates
profile
social
IJCERT2014
www.ijcert.org
385
user.
show that the use of these protocols does not affect user
anonymity level and users are able to completely
preserve their privacy.
3. PROFILE MATCHING:
growing
privacy
concerns
about
disclosing
their
Components
exchange
of
information
Assignment:
Comparing
two
prohibit
Function
and
Site/User Objective:
Depending on the site and on the user objectives, the
same attribute can be filled up with two different values.
For instance, the email attribute in face book is
commonly filled with a personal email while LinkedIn
IJCERT2014
www.ijcert.org
386
TCA
outputs
certpidi
as
tuple
(pki,
proposed
by
adopting
the
oblivious
transfer
A. Protocol Steps
A. Bootstrapping
The protocol has a fundamental bootstrapping phase,
where the TCA generates all system parameters, user
pseudonyms, and keying materials. Specifically, the
TCA runs G to generate p, q,R,Rq,Rp, for initiating
Fig 1. ICPM flow
6. PERFORMANCE ANALYSIS
public keys (pki) for users (ui). For every pidi and pki of
A. Communication Overhead
IJCERT2014
www.ijcert.org
387
extensive
comparison
is implemented.
simulations
of
an
using
attribute
real-trace
while
the
data.
Two
iPPM
is
REFERENCES
[1]Comscore, http://www.comscoredatamine.com/.
B. Anonymity
409428.
other users.
7. CONCLUSION
Mobile
been
pp. 141146.
reveals
initiator.
the
Social
Networks
comparison
result
(MSNs)
to
the
has
IJCERT2014
www.ijcert.org
388
Peoplenet:
engineering
wireless
virtual
social
pp. 119.
handshake
2443.
selsh
delay
tolerant
networks,
in
Proc.
IEEE
scheme
with
symptoms-matching
for
19691977.
preservation
in
mobile
social
networks,
IEEE
32093222, 2012.
337.
strategy
86 96, 2011.
Starclique:
guaranteeing
user
privacy
in
social
for
location
privacy
pp. 146162.
mobilizing
IJCERT2014
soft-
junctions,
IEEE
encryption
social
dis-
vanets,
www.ijcert.org
supporting
in
ware,
IEEE
polynomial
Pervasive
389
Jarecki
and X.
Liu,
Efcient
oblivious
and
covert
adversaries,
Journal
of
Goethals,
S.
Laur,
H.
Lipmaa,
and T.
IJCERT2014
www.ijcert.org
390