7-3-2018 Privacy Aware Seminar

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 20

PRISM: Privacy-Aware Interest Sharing and Matching in Mobile Social Networks

CHAPTER 1
INTRODUCTION
With the growth of mobile devices and online social networks (OSNs), people can
connect with each other ubiquitously anytime. Mobile Social Networks (MSNs) are the
emerging trend in mobile technology that combine wireless communication and social
networking. MSN inherits advantages of delay tolerant networks (DTNs) and
opportunistic networks (Opp-nets)[1]. The main purpose of this paradigm is to provide
users with services like location aware services, group texter services, matchmaking
services, media sharing services, social gaming, social courier (just to name a few)[1], One
of the popular applications of MSN is profile matchmaking. There are many beneficial
application of MSN, where matchmaking can help users to improve themselves, for
example in their social life, in finding people with common hobbies and even in health
issues. While this is a useful way of finding common interests, matchmaking needs to
address a few issues as well.

During the matchmaking, a user needs to show his/her interests to other users in
order to match their common interests. However, there are various scenarios in which a
user may not want to disclose all of his/her interests to other user unless there is the surety
that other user have the same interests. Consider a scenario where a patient in a hospital
wishes to find someone with the same disease or symptoms he/she is himself suffering
from. However, the patient does not want to reveal his disease to anyone else. This kind
of scenario makes matchmaking a tricky thing to perform among privacy conscious users.
By revealing their private information without a privacy preserving matching mechanism,
users put themselves at risk both offline (e.g. stalking) and online (e.g. identity theft).
Therefore, the concerns as mentioned in [2] and [3] should be considered when developing
a matchmaking application.

Department of IS&E, B.I.E.T, Davangere. 1


PRISM: Privacy-Aware Interest Sharing and Matching in Mobile Social Networks

CHAPTER 2
PROPOSED SYSTEM
In this application, we present a protocol named as PRISM (Privacy-aware Interest
Sharing and Matching) that securely matches the private information of two users. Our
objective is to improve the existing matchmaking protocols and help mobile users to
securely perform matchmaking without revealing unnecessary information. The main
contributions of our paper are as follows:

 PRISM provides a secure and privacy preserving mechanism in order to find


mutual interests of users.

 The project discusses unaddressed attacks on user privacy and provides effective
means to prevent these attacks. These include attacks during the interests
matching and interest revealing phases.

 We suggest a mechanism that aims to provide protection against Sybil attacks by


limiting a user to at most one device.

 Unlike existing approaches, the trust assumptions on trusted third party (TTP) are
significantly reduced by not revealing user interests to the TTP.

 The implementation of PRISM and subsequent comparison with existing


approaches show that PRISM provides better protection against various attacks
without any significant degradation in performance.

Department of IS&E, B.I.E.T, Davangere. 2


PRISM: Privacy-Aware Interest Sharing and Matching in Mobile Social Networks

CHAPTER 3
LIERATURE SURVEY
In this section, various existing profile matchmaking approaches have been
discussed. This literature discussed these approaches with two different perspectives.
Firstly, it categorizes the profile matchmaking approaches with an
architectural/deployment point of view. Secondly, it discusses various approaches with
respect to their implementation of matchmaking computation mechanism.

[1] A.-K. Pietiläinen, E. Oliver, J. LeBrun, G. Varghese, and C. Diot, ``Mobi-


Clique: Middleware for mobile social networking,'' in Proc. 2nd ACM Workshop
Online Social Netw. (WOSN), 2009, pp. 49-54.
Profile matchmaking approaches can be broadly divided into distributed,
centralized and hybrid approaches. In distributed approach, users broadcast their profile
information like in MobiClique[1], in which profile information is downloaded from
Facebook to user's device and then broadcasted to nearby Bluetooth devices. After that,
the profile matchmaking protocol is executed in order to find the common interests. The
drawback in this approach is that a user's information is at its risk and any malicious user
can get private information of the user. In centralized approach, a server acts as a trusted
third party (TTP) among participants.

[2] Looptmix, accessed on Feb. 25, 2016. [Online]. Available:


http://mashable.com/2009/10/19/loopt-mix-iphone
The server has interests of all the participants and performs the matchmaking. For
[2]
example, looptmix and Gatsby are two approaches in which a server tracks users'
locations, saves information into its database and then performs matchmaking. Social
serendipity also deploys a trusted server that contains users' profiles and user-defined
matchmaking preferences.

[3] L. P. Cox, A. Dalton, and V. Marupadi, ``SmokeScreen: Flexible privacy controls


for presence-sharing,'' in Proc. ACM 6th Int. Conf. Mobile Syst., Appl. Services
(MobiSys), 2007, pp. 233245.
[3]
Smokescreen and SMILE use encounter information but matchmaking is done
on centralized server. PeopleTones and Just-For-Us are proximity based friend finding

Department of IS&E, B.I.E.T, Davangere. 3


PRISM: Privacy-Aware Interest Sharing and Matching in Mobile Social Networks

schemes that rely on central server. Centralized architectures are easy to deploy but are
considered a potential candidate for a single point of failure.

[4] M. J. Freedman, K. Nissim, and B. Pinkas, ``Efcient private matching and set
intersection,'' in Advances in CryptologyEUROCRYPT. Berlin, Germany: Springer,
2004, pp. 119.
Matchmaking protocols can also be described as a private set intersection (PSI)
[5]
problem or a private cardinality of set intersection (PCSI) problem . Private set
intersection (PSI) deals with finding common objects blindly. The term emerged from set
theory where intersection operation is used to find common elements in two sets. Private
cardinality of set intersection (PCSI) only provides the number of matched elements.
Commutative encryption based protocols have been used to solve PSI and PCSI
problems.

[5] R. Agrawal, A. Evmievski, and R. Srikant, ``Information sharing across private


databases,'' in Proc. ACM Int. Conf. Manage. Data (SIGMOD), 2003, pp. 8697.
[6]
In , authors use a commutative encryption function for private set intersection
problems. Authors suggest a power function fe(x) D xemodp, as an example of a
commutative function. The security of their protocol is based on the Decisional Diffie-
Hellman Hypothesis (DDH). However, this approach lacks in providing protection
against a malicious user who may cheat by reordering the results that are necessary to
identify which interests have been matched. Authors proposed protocols that attempt to
overcome these issues. These protocols utilize trusted servers for the identity and interest
verification of a user.

[6] Q. Xie and U. Hengartner, ``Privacy-preserving matchmaking for mobile social


networking secure against malicious users,'' in Proc. IEEE 9th Int. Conf. Privacy,
Secur. Trust (PST), Jul. 2011, pp. 252259
Moreover, because the trusted server has users' locations and personal
information, in case of a compromise, whole system may suffer. In hybrid approaches
TTP server is used only for verification and information management but it does not take
part in the matchmaking phase. The matchmaking is performed through protocols running
on a user's device. The benefit of using hybrid approach is that a verification authority is
responsible to authenticate legitimate users and preventing them from a malicious user.

Department of IS&E, B.I.E.T, Davangere. 4


PRISM: Privacy-Aware Interest Sharing and Matching in Mobile Social Networks

However, to prevent the system becoming a single point of failure, as well as reducing the
burden of calculations, most of the matchmaking protocol execution is done on user's
device. Another aspect to classify profile matchmaking protocol is the way matchmaking
is performed, authors use expensive Diffie-Hellman key exchange at the end of protocol
to exchange matched interests in order to detect any cheating in previous steps. Also, they
do not provide security against attacks where a malicious party sends garbage values
instead of the commutative encryption of interests. In this case, the cheating party will
know the number of matched interests while the honest party will know nothing, authors
extends the work by attempting to overcome the issues in previous approach. They also
find the best match and combine the identity and interest verification server into a single
server. However, their criterion of a best match only depends upon the number of
matches. A candidate with most matches is considered to be the best match. In reality, a
user may wish to know the matched interests in order to decide the best match. For
example, Alice is more interested in football and less interested in movies and reading. If
Bob has one match (football) with Alice and Charlie has two matches (movies and
reading) then Bob is more likely a best match for Alice. Moreover, also suffers with
similar issues. For example at the end of the protocol, in order to detect any cheating,
Alice and Bob exchange their interests encrypted in each others' public key. Bob can
easily learn Alice's interests by decrypting the message first, re-encrypting and sending
the contents back in Alice's key and therefore pretending to Alice that they have same
interests. Our proposed PRISM is an improved and efficient protocol that uses same
building blocks of commutative encryption.

Department of IS&E, B.I.E.T, Davangere. 5


PRISM: Privacy-Aware Interest Sharing and Matching in Mobile Social Networks

CHAPTER 4
TECHNOLOGIES USED
a) HTML
HTML stands for Hypertext Markup Language, and it is the most widely used
language to write Web Pages. Hypertext refers to the way in which Web pages (HTML
documents) are linked together. Thus, the link available on a webpage is called Hypertext.
As its name suggests, HTML is a Markup Language which means you use HTML to
simply "mark-up" a text document with tags that tell a Web browser how to structure it to
display.

Originally, HTML was developed with the intent of defining the structure of
documents like headings, paragraphs, lists, and so forth to facilitate the sharing of
scientific information between researchers. Now, HTML is being widely used to format
web pages with the help of different tags available in HTML language.

In this project HTML, combined with CSS is made use to design front end of the
application.

b) CSS
CSS stands for Cascading Style Sheets. It describes how HTML elements are to
be displayed on screen, paper, or in other media. CSS was invented by Håkon Wium Lie
on October 10, 1994 and maintained through a group of people within the W3C called the
CSS Working Group. It can control the layout of multiple web pages all at once.

CSS is used to define styles for your web pages, including the design, layout and
variations in display for different devices and screen sizes. HTML was NEVER intended
to contain tags for formatting a web page. To solve this problem, the World Wide Web
Consortium (W3C) created CSS. CSS removed the style formatting from the HTML
page. The style definitions are normally saved in external. CSS files. With an external
stylesheet file, you can change the look of an entire website by changing just one file.

Department of IS&E, B.I.E.T, Davangere. 6


PRISM: Privacy-Aware Interest Sharing and Matching in Mobile Social Networks

Advantages of CSS
 CSS saves time - You can write CSS once and then reuse same sheet in multiple
HTML pages. You can define a style for each HTML element and apply it to as many
Web pages as you want.
 Pages load faster - If you are using CSS, you do not need to write HTML tag
attributes every time. Just write one CSS rule of a tag and apply it to all the
occurrences of that tag. So less code means faster download times.
 Easy maintenance - To make a global change, simply change the style, and all
elements in all the web pages will be updated automatically.
 Superior styles to HTML - CSS has a much wider array of attributes than HTML, so
you can give a far better look to your HTML page in comparison to HTML attributes.
 Multiple Device Compatibility - Style sheets allow content to be optimized for more
than one type of device. By using the same HTML document, different versions of a
website can be presented for handheld devices such as PDAs and cell phones or for
printing.
 Global web standards - Now HTML attributes are being deprecated and it is being
recommended to use CSS. So its a good idea to start using CSS in all the HTML
pages to make them compatible to future browsers.
 Offline Browsing - CSS can store web applications locally with the help of an offline
cache. Using of this, we can view offline websites. The cache also ensures faster
loading and better overall performance of the website.
 Platform Independence - The Script offer consistent platform independence and can
support latest browsers as well.

c) JavaScript
JavaScript (JS) is an interpreted computer programming language. It was
originally implemented as part of web browsers so that client-side scripts could interact
with the user, control the browser, communicate asynchronously, and alter the document
content that was displayed. It is used as a scripting language to define functions to carry
out particular functionalities.

Department of IS&E, B.I.E.T, Davangere. 7


PRISM: Privacy-Aware Interest Sharing and Matching in Mobile Social Networks

d) JSP
Java Server Pages (JSP) is a technology for developing Webpages that supports
dynamic content. This helps developers insert java code in HTML pages by making use
of special JSP tags, most of which start with <% and end with %>.

A Java Server Pages component is a type of Java servlet that is designed to fulfill
the role of a user interface for a Java web application. Web developers write JSPs as text
files that combine HTML or XHTML code, XML elements, and embedded JSP actions
and commands. Using JSP, you can collect input from users through Webpage forms,
present records from a database or another source, and create Web pages dynamically.

JSP tags can be used for a variety of purposes, such as retrieving information from
a database or registering user preferences, accessing JavaBeans components, passing
control between pages, and sharing information between requests, pages etc.

Java Server Pages are built on top of the Java Servlets API, so like Servlets, JSP
also has access to all the powerful Enterprise Java APIs, including JDBC, JNDI, EJB,
JAXP, etc. JSP pages can be used in combination with servlets that handle the business
logic, the model supported by Java servlet template engines. Finally, JSP is an integral
part of Java EE, a complete platform for enterprise class applications. This means that
JSP can play a part in the simplest applications to the most complex and demanding.
Here, in this application JSP is used as server side scripting language to collect input from
users through front end and to display the data stored in the backend database upon user’s
request.

e) MySQL

MySQL is a fast, easy-to-use RDBMS being used for many small and big
businesses. It is developed, marketed and supported by MySQL AB, which is a Swedish
company. MySQL is becoming so popular because of many good reasons and few of
them are,

 MySQL is released under an open-source license. So you have nothing to pay to use
it.
 MySQL is a very powerful program in its own right. It handles a large subset of the
functionality of the most expensive and powerful database packages.
Department of IS&E, B.I.E.T, Davangere. 8
PRISM: Privacy-Aware Interest Sharing and Matching in Mobile Social Networks

 MySQL uses a standard form of the well-known SQL data language.


 MySQL works on many operating systems and with many languages including PHP,
PERL, C, C++, JAVA, etc.
 MySQL works very quickly and works well even with large data sets.
 MySQL is very friendly to PHP, the most appreciated language for web development.
 MySQL supports large databases, up to 50 million rows or more in a table. The
default file size limit for a table is 4GB, but you can increase this (if your operating
system can handle it) to a theoretical limit of 8 million terabytes (TB).
 MySQL is customizable. The open-source GPL license allows programmers to
modify the MySQL software to fit their own specific environments.
 MySQL is used as a database to the drop application to store the information about
the users. And their activities are recorded in the database.

f) Net Beans IDE

Net Beans is an open-source project dedicated to providing rock solid software


development products (the Net Beans IDE and the Net Beans Platform) that address the
needs of developers, users and the businesses who rely on Net Beans as a basis for their
products; particularly, to enable them to develop these products quickly, efficiently and
easily by leveraging the strengths of the Java platform and other relevant industry
standards. The Net Beans IDE provides support for several languages (PHP,C/C++,
JavaScript, etc.) and frameworks.

In June 2000, Net Beans was made open source by Sun Microsystems, which
remained the project sponsor until January 2010 when Sun Microsystems became a
subsidiary of Oracle. Please see our History section for more information. The two base
products, the Net Beans IDE and Net Beans Platform, are free for commercial and non-
commercial use. The source code to both is available to anyone to reuse as they see fit,
within the terms of use. The legal section contains information regarding licensing,
copyright issues, privacy policy and terms of use. Net Beans is used as a platform to
design this application.

Department of IS&E, B.I.E.T, Davangere. 9


PRISM: Privacy-Aware Interest Sharing and Matching in Mobile Social Networks

CHAPTER 5
DESIGN / ARCHITECTURE

5.1 ATTACK MODEL


PRISM considers both the active and passive attacks. A passive attack can be
described as the eavesdropping by an intruder that does not involve message
modification. An active attack is launched by an attacker with more capabilities that
include modifying, replaying or re-transmitting of messages. Active attacks also include
impersonation and man-in-the-middle attacks. We also consider the semi-honest users
also termed as honest-but-curious users. These users follow the protocol but are curious to
learn more information than allowed such as key information or encrypted interests.
While the two parties are running a matchmaking protocol, one of them could try to learn
more information about the other party while showing only a subset of interests.
Therefore, in our protocol both initiator and respond an assure the role of an attacker with
above mentioned capabilities.

5.2 SYSTEM MODEL


There are three participants in our system model as described below:
 Identity verifier (IdV): verifies a legitimate user's identification as well as upper limit
of his number of interests. It also initializes the system parameters and in case of a
complaint, acts as a dispute resolver and takes necessary action to revoke the
malicious user.
 Initiator: initiates the protocol by sending interests to other users.
 Responder: is the user who replies initiator's request by sending his interests for
matchmaking. Initiator and responder exchange information with each other and with
IdV. For simplicity, we call initiator as Alice and responding user as Bob.

5.3 ASSUMPTIONS
PRISM is based on following assumptions.
 IdV is honest-but-curious and can be trusted keeping a user's identity safe. However,
we do not consider the complaint against a malicious activity as a normal scenario.
Therefore in order to investigate, the IdV may ask the participants of the protocol for
their credentials.

Department of IS&E, B.I.E.T, Davangere. 10


PRISM: Privacy-Aware Interest Sharing and Matching in Mobile Social Networks

 The matchmaking protocol, once started, terminates only after its completion.
 Users keep their security parameters safe during the protocol.
 We do not assume any collusion among the IdV and the users.

5.4 NOTATIONS
The notations used in PRISM are mentioned in Table 1.

5.5 COMMUTATIVE ENCRYPTION


Commutative encryption states that Ek1 (Ek2 (m)) D Ek2 (Ek1 (m)). It implies
that if m is encrypted with a secret key and the resultant cipher text is encrypted again by
another secret key then changing the order of the decryption keys will not have any effect
on the result. Therefore, Ek1 (Ek2 (m)) D Ek2 (Ek1 (m0)) iff m D m0.

Department of IS&E, B.I.E.T, Davangere. 11


PRISM: Privacy-Aware Interest Sharing and Matching in Mobile Social Networks

CHAPTER 5
IMPLEMENTATION

GENERATION OF USER IDENTITIES


In previous protocols, it is possible to create many identities using any social
network site. Although these sites attempt to restrict a user to have a single identity
associated by some unique credentials such as an email or phone number, but in real life
it is very hard to detect a violation. We suggest the idea of restricting a user to have at
most one identity on a device. We argue that a Sybil attack with as many devices as
number of identities is very hard to prevent. A realistic approach can be to restrict a user
to use only one identity on a single device.

In this regard, PRISM proposes the use of either the unique international mobile
station equipment identity (IMEI) number of a device, which can be retrieved during
implementation of protocol through getDeviceId() in android or ANDROID_ID in
Android SDK. However, many operating systems such as Apple iOS 7 and Windows
have stopped giving IMEI information to application vendors for privacy concerns. In this
case we suggest to use identifierForVendor in iOS 7 or later (an application specific
unique identifier) and DeviceUniqueID for Windows (which is a unique value per device
and per application). Instead of using email identity or social network based identities,
PRISM uses above mentioned application and device specific identities. The identity
verifier (IdV ) will take this value from the user, hash it, digitally sign it with its private
key and sends this back to the user as his unique identity. For simplicity we will refer the
device identity as UID in= the rest of the paper. The memory size for this light weight
identity will be 20 bytes hash of UID, 4 bytes timestamps and 64 bytes of signature (we
are supporting an ECC key of IdV ), i.e. 88 bytes in total.

PRISM consists of the phases (1) initial setup phase, (2) matchmaking phase
Following are the details of these phases.

Department of IS&E, B.I.E.T, Davangere. 12


PRISM: Privacy-Aware Interest Sharing and Matching in Mobile Social Networks

1) INITIAL SETUP PHASE


First of all, the IdV generates and publishes system parameters. In commutative
encryption such as RSA cryptosystem, all the users should have these parameters. The
IdV chooses two large prime integers p and q at random and computes modulus n = p * q
,as well as ⌽(n) = (p – 1) * (q – 1). IdV does not store the values of p and q due to
security reasons. After getting the system parameters, Alice generates a public private key
pair and sends her public key to IdV along with identity UID and maximum number of
interests maxAlice that are intended to be used in matchmaking. IdV computes the hash of
UID and digitally signs it along with a timestamp T as user's unique identity.T is the
expiration time of this identity and provides a second line of defense against a cheating
user. The value of T describes the length of the time after which a user needs to renew its
user ID. In PRISM, we propose that a user keeps a small database of user IDs against
which the user has performed matchmaking. With a moderate value of T for example a
day or may be a week, the user will only require to store the entries in the database for a
small period of time, for example one month. If we consider that a user runs the
matchmaking protocol with 100 users a day on average, then he/she needs to store 3000
users identities in a month. With the memory consumptions of 88 bytes for one user
identity, the user roughly requires a mere 260 kilobytes (KB) for device storage. After
generating Alice's unique identity, IdV also signs public key of Alice as well as maxAlice
(if it is in acceptable range) and sends these values back to Alice along with her unique
identity as shown in Fig.

. Figure: Initial Setup Phase

For the remaining of the paper, we will denote (h(UIDAlice)jjT)SKIdV and


(maxAlice)SKIdV as the signed identity and signed number of interests of Alice
respectively. Furthermore, IdV maintains a database of each user's identity along with
corresponding max and the public key as shown in Table 2.

Department of IS&E, B.I.E.T, Davangere. 13


PRISM: Privacy-Aware Interest Sharing and Matching in Mobile Social Networks

If a user is found guilty of a wrong doing, the IdV will block that user. It should be
noted that in case Alice needs to change the value of maxAlice at a later time, she will
request the new value maxAlice to the IdV Finally, Alice generates a 1024 bits random
secret exponent a chosen from modulus n, and subsequently encrypts each of her interests
by exponentiating with a. Similarly, Bob or any other participant performs the above
mentioned steps before matchmaking.
After the initialization phase, Alice and Bob become eligible to start the matchmaking
protocol. Alice sends her interests to the responder in order to find the matched interests.

2) MATCHMAKING PHASE
This paper proposes the novel idea to use k known dummy interests. These
dummy interests are suggested by the initiator and need to be included in the interest set
of both parties.
At the start of matchmaking, Alice chooses k dummy interest values. It is
worth mentioning that these values are not necessary to be meaningful. Alice also
encrypts these values by exponentiating them with her secret value a and includes these
values in her interests set Ai at random indices. Following are the steps of our
matchmaking protocol that are also shown in Fig. 2.
Step 1: Alice prepares a matchmaking request that includes her exponentiated interests
set Aia, k dummy interests in plaintext, her identity (h (UIDAlice )|||T )SKIdV , her signed
public key (PKAlice )SKIdV and (maxAlice)SKIdV. Alice then signs the entire message her
secret key and sends this to Bob.
• (∀i ∈ (0, m + k ] : Aia | |dk | |(PKAlice )SKIdV

Department of IS&E, B.I.E.T, Davangere. 14


PRISM: Privacy-Aware Interest Sharing and Matching in Mobile Social Networks

| | (maxAlice )SKIdV | | h(UIDAlice||T )SKIdV )SKAlice


Step 2: Bob verifies Alice signature, exponentiates same k dummy interests with his
secret b and includes these values in his exponentiated interests set Bib. Bob then prepares
the message that includes Bib, (h(UIDBob)||T )SKIdV, his signed public key (PKBob )SKIdV
and (maxBob )SKIdV , signs it with his secret key SKBob and sends to Alice.

 (∀i ∈ ( 0, n + K] : Bib ||( PKBob )SKIdV ||h( UIDBob ||T )SKIdV)SKBob


Step 3: After exchanging these messages, both parties verify each other’s signatures. In the
next step, Alice and Bob exponentiate each other’s interests commutatively with their
secret values a, b respectively.
a
 Alice computes ∀i ∈ (0, n + k ](Bbi)
b
 Bob computes ∀i ∈ (0, m + k ](Aai)
Step 4: Alice pairs together each of Bob’s encrypted interest values and the corresponding
commutative encryption. She then takes the hash of these values, signs it and sends to
Bob as her commitment.
 (h(∀i ∈ (0,n + K] : (Bib , (Bib)a))SKAlice
Step 5: Bob pairs together each of Alice’s encrypted interest value and the corresponding
commutative encryption, signs it and sends to Alice.
 ∀i ∈ (0,m+K] : (Aai ,(Aia)b))SKBob
Step 6: After receiving this message, Alice sends Bob the actual values of commitment.
 (∀i ∈ (0,n+K] : (Bib,(Bib)a))SKAlice
Step 7: Both Alice and Bob compare the intersection respectively in order to find the
number of matches.
 Alice computes ∀i ∈ (0,m + K](Aia)b ∩ (Bib )a
 Bob computes ∀i ∈ (0,n + K](Bib)a ∩ (Aia)b

Alice’s interests by repeatedly taking hash of all possible interests, n2 serves the same
purpose for Bob.
• ∀i ∈ (0, q] (h(Ai ) ⊕ n2 )
Step 8: Similarly Bob generates n2 , computes (h(Bi ) ⊕ n2 ) and sends this to Alice.
• ∀i ∈ (0, q] (h(Bi ) ⊕ n2 )

Step 9: Next both parties exchange n1 and n2 and find h(Ai ), h(Bi ) respectively.

Department of IS&E, B.I.E.T, Davangere. 15


PRISM: Privacy-Aware Interest Sharing and Matching in Mobile Social Networks

Step 10: Both parties check whether h(Ai ) == h(Bi ).


If yes, the matchmaking is successful, else the victim sends the protocol recordings to
a b
IdV . IdV asks the involved participants for a, b, (Ai ) and (Bi ) and compares these values
a b
with the recordings. After that, IdV erases a, b, (Ai) and (Bi) from its temporary
storage in order to keep the privacy of the honest party. Due to the fact that a cheating
attempt will be detected immediately, user devices will not be needed to keep the
recordings of protocol for long.

Figure2: Matchmaking and interest revealing phase.

Department of IS&E, B.I.E.T, Davangere. 16


PRISM: Privacy-Aware Interest Sharing and Matching in Mobile Social Networks

CHAPTER 7
ADVANTAGES
Our design goals are as follows:
 The initiator along with each of the candidates should only know the intersection set
between them mutually. Any information other than the matched interests should not
be known to any other party.
 Trust assumption should be kept to a minimum. Therefore, a TTP server should only
verify the number of interests and knows nothing about the actual interests.
 There should be an upper bound for the number of interests that are verified by an
identity verifier. A user should not use more interests than a threshold.
 During matchmaking, none of the user should get any unfair advantage over the other.
This includes attacks where a user may place gibberish values to be matched in order
to get an unfair advantage.
 On a positive match, both the parties should reveal only their matched interests to
each other in such a way that neither of them should be able to get an advantage. The
protocol should be able to prevent this kind of attack.
 The protocol should also provide prevention from Sybil attacks. That is, a malicious
user should not be able to run the protocol multiple times against a user in order to
find the interests set.

Department of IS&E, B.I.E.T, Davangere. 17


PRISM: Privacy-Aware Interest Sharing and Matching in Mobile Social Networks

CHAPTER 8
APPLICATIONS
 Face book communication.
 Flip cart online item purchasing applications.
 Online business transaction.

Department of IS&E, B.I.E.T, Davangere. 18


PRISM: Privacy-Aware Interest Sharing and Matching in Mobile Social Networks

CHAPTER 9
CONCLUSION
We have presented an efficient privacy protection and interest sharing protocol in
mobile social networks. We have provided novel attacks scenarios and their efficient
solution. Unlike existing approaches, PRISM does not require a user to reveal interests to a
trusted third party and only uses it as an identity verifier and conflict resolver. The proposed
use of unique identity for a user helps prevent Sybil attacks. With the help of implementation
we show the feasibility of PRISM. Moreover, with a comprehensive security and complexity
analyses, we show the robustness of PRISM against various attacks as well as its efficiency.

Department of IS&E, B.I.E.T, Davangere. 19


PRISM: Privacy-Aware Interest Sharing and Matching in Mobile Social Networks

REFERENCES

[1] A.-K. Pietiläinen, E. Oliver, J. LeBrun, G. Varghese, and C. Diot, ``Mobi- Clique:
Middleware for mobile social networking,'' in Proc. 2nd ACM Workshop Online Social
Netw. (WOSN), 2009, pp. 49-54.

[2] Looptmix, accessed on Feb. 25, 2016. [Online]. Available:


http://mashable.com/2009/10/19/loopt-mix-iphone

[3] L. P. Cox, A. Dalton, and V. Marupadi, ``SmokeScreen: Flexible privacy controls for
presence-sharing,'' in Proc. ACM 6th Int. Conf. Mobile Syst., Appl. Services (MobiSys),
2007, pp. 233245.

[4] M. J. Freedman, K. Nissim, and B. Pinkas, ``Efcient private matching and set
intersection,'' in Advances in CryptologyEUROCRYPT. Berlin, Germany: Springer,
2004, pp. 119.

[5] R. Agrawal, A. Evmievski, and R. Srikant, ``Information sharing across private


databases,'' in Proc. ACM Int. Conf. Manage. Data (SIGMOD), 2003, pp. 8697.

[6] Q. Xie and U. Hengartner, ``Privacy-preserving matchmaking for mobile social


networking secure against malicious users,'' in Proc. IEEE 9th Int. Conf. Privacy, Secur.
Trust (PST), Jul. 2011, pp. 252259

Department of IS&E, B.I.E.T, Davangere. 20

You might also like