Fine-grained Private Matching for Proximity-based Mobile Social Networking INFOCOM 2012 Rui Zhang, Yanchao Zhang Jinyuan (Stella) Sun Arizona State University.

Slides:



Advertisements
Similar presentations
Introduction to Information Retrieval Introduction to Information Retrieval Lecture 7: Scoring and results assembly.
Advertisements

Quantum t-designs: t-wise independence in the quantum world Andris Ambainis, Joseph Emerson IQC, University of Waterloo.
On the Amortized Complexity of Zero-Knowledge Proofs Ronald Cramer, CWI Ivan Damgård, Århus University.
Variational Methods for Graphical Models Micheal I. Jordan Zoubin Ghahramani Tommi S. Jaakkola Lawrence K. Saul Presented by: Afsaneh Shirazi.
Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Presenter: Qin Liu a,b Joint work with Chiu C. Tan b, Jie Wu b,
ITIS 6200/ Secure multiparty computation – Alice has x, Bob has y, we want to calculate f(x, y) without disclosing the values – We can only do.
Rational Oblivious Transfer KARTIK NAYAK, XIONG FAN.
Exciting experience in participating EDM forum commissioned projects Protect Patient Privacy When Sharing Data for CER 12/01/11 – 6/01/12 Write a commissioned.
Issues of Security and Privacy in Networking in the CBA Karen Sollins Laboratory for Computer Science July 17, 2002.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Chapter 18. IP: Internet Protocol Addresses
Yuan Yao Joint work with Hanghang Tong, Xifeng Yan, Feng Xu, and Jian Lu MATRI: A Multi-Aspect and Transitive Trust Inference Model 1 May 13-17, WWW 2013.
Session 4 Asymmetric ciphers.
Interactive Generation of Integrated Schemas Laura Chiticariu et al. Presented by: Meher Talat Shaikh.
Privacy-MaxEnt: Integrating Background Knowledge in Privacy Quantification Wenliang (Kevin) Du, Zhouxuan Teng, and Zutao Zhu. Department of Electrical.
Proactive Secure Mobile Digital Signatures Work in progress. Ivan Damgård and Gert Læssøe Mikkelsen University of Aarhus.
10/25/20061 Threshold Paillier Encryption Web Service A Master’s Project Proposal by Brett Wilson.
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2002 Tuesday, 26 November Number-Theoretic Algorithms Chapter 31.
Privacy-Preserving Cross-Domain Network Reachability Quantification
Computing Trust in Social Networks
On The Cryptographic Applications of Random Functions Oded Goldreich Shafi Goldwasser Silvio Micali Advances in Cryptology-CRYPTO ‘ 84 報告人 : 陳昱升.
Privacy Preserving K-means Clustering on Vertically Partitioned Data Presented by: Jaideep Vaidya Joint work: Prof. Chris Clifton.
Privacy and Integrity Preserving in Distributed Systems Presented for Ph.D. Qualifying Examination Fei Chen Michigan State University August 25 th, 2009.
RFID Cardinality Estimation with Blocker Tags
Structure based Data De-anonymization of Social Networks and Mobility Traces Shouling Ji, Weiqing Li, and Raheem Beyah Georgia Institute of Technology.
Slide 1 Justin Brickell Donald E. Porter Vitaly Shmatikov Emmett Witchel The University of Texas at Austin Secure Remote Diagnostics.
A Privacy Preserving Efficient Protocol for Semantic Similarity Join Using Long String Attributes Bilal Hawashin, Farshad Fotouhi Traian Marius Truta Department.
Credit-Based Incentive Data Dissemination in Mobile Social Networks Guoliang Liu, Shouling Ji, Zhipeng Cai Georgia State University Georgia Institute of.
Privacy Preserving Query Processing in Cloud Computing Wen Jie
An Efficient Identity-based Cryptosystem for
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
Privacy-Preserving Data Quality Assessment for High-Fidelity Data Sharing Julien Freudiger, Shantanu Rane, Alex Brito, and Ersin Uzun PARC.
Wei Gao1 and Qinghua Li2 1The University of Tennessee, Knoxville
Phoenix: A Weight-Based Network Coordinate System Using Matrix Factorization Yang Chen Department of Computer Science Duke University
Exploring Online Social Activities for Adaptive Search Personalization CIKM’10 Advisor : Jia Ling, Koh Speaker : SHENG HONG, CHUNG.
Towards Robust Indexing for Ranked Queries Dong Xin, Chen Chen, Jiawei Han Department of Computer Science University of Illinois at Urbana-Champaign VLDB.
Secure two-party computation: a visual way by Paolo D’Arco and Roberto De Prisco.
Approximate XML Joins Huang-Chun Yu Li Xu. Introduction XML is widely used to integrate data from different sources. Perform join operation for XML documents:
How far removed are you? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL Marcin Nagy joint work with Thanh Bui, Emiliano De.
National Chi Nan University Study of Network Performance Measurement Based on SNMP The 8 th International Conference on Computer Supported Cooperative.
Personalized Social Recommendations – Accurate or Private? A. Machanavajjhala (Yahoo!), with A. Korolova (Stanford), A. Das Sarma (Google) 1.
Privacy-Preserving Credit Checking Keith Frikken, Mikhail Atallah, and Chen Zhang Purdue University June 7, 2005.
On the Communication Complexity of SFE with Long Output Daniel Wichs (Northeastern) joint work with Pavel Hubáček.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
BEHAVIORAL TARGETING IN ON-LINE ADVERTISING: AN EMPIRICAL STUDY AUTHORS: JOANNA JAWORSKA MARCIN SYDOW IN DEFENSE: XILING SUN & ARINDAM PAUL.
Lei Liu, Department of Computer Science, George Mason University Guanhua Yan, Information Sciences Group, Los Alamos National Laboratory Xinwen Zhang,
Query Sensitive Embeddings Vassilis Athitsos, Marios Hadjieleftheriou, George Kollios, Stan Sclaroff.
Intelligent Database Systems Lab N.Y.U.S.T. I. M. Externally growing self-organizing maps and its application to database visualization and exploration.
Privacy Preserving Payments in Credit Networks By: Moreno-Sanchez et al from Saarland University Presented By: Cody Watson Some Slides Borrowed From NDSS’15.
A Hybrid Technique for Private Location-Based Queries with Database Protection Gabriel Ghinita 1 Panos Kalnis 2 Murat Kantarcioglu 3 Elisa Bertino 1 1.
1 Longest Common Subsequence as Private Search Payman Mohassel and Mark Gondree U of CalgaryNPS.
Stefanos Antaris A Socio-Aware Decentralized Topology Construction Protocol Stefanos Antaris *, Despina Stasi *, Mikael Högqvist † George Pallis *, Marios.
Practical Asynchronous Neighbor Discovery and Rendezvous for Mobile Sensing Applications Prabal Dutta and David Culler Computer Science Division University.
Anonymity and Privacy Issues --- re-identification
Efficient Processing of Updates in Dynamic XML Data Changqing Li, Tok Wang Ling, Min Hu.
Homework #2 J. H. Wang Oct. 31, 2012.
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
Privacy Preserving Outlier Detection using Locality Sensitive Hashing
Efficient Montgomery Modular Multiplication Algorithm Using Complement and Partition Techniques Speaker: Te-Jen Chang.
Presented by Edith Ngai MPhil Term 3 Presentation
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Privacy-Preserving Clustering
Topic 14: Random Oracle Model, Hashing Applications
Efficient CRT-Based RSA Cryptosystems
Kunxiao Zhou and Xiaohua Jia City University of Hong Kong
WSExpress: A QoS-Aware Search Engine for Web Services
Presentation transcript:

Fine-grained Private Matching for Proximity-based Mobile Social Networking INFOCOM 2012 Rui Zhang, Yanchao Zhang Jinyuan (Stella) Sun Arizona State University University of Tennessee Guanhua Yan Los Alamos National Laboratory 1

Proximity-based Mobile Social Networking (PMSN)  Social interaction  Among physically proximate users  Using mobile devices, e.g., smartphone or tablet  Directly through the Bluetooth/WiFi interfaces  Valuable complement to web-based online social networking 2 Chat, file sharing, …

Private (Profile) Matching  The process of two users comparing their profiles without disclosing any information beyond the comparison result  An indispensible part of PMSN because  People prefer to socialize with others having similar interests or background  Privacy concern 3

Existing Private Matching Schemes 4  User profile comprises a list of attributes chosen from an underlying attribute set  Ex: interests [Li et al.’11], friends [Arb et al.’08], disease symptoms [Lu et al.’10]

Existing Private Matching Schemes 5  Map private matching into the problem of  Private set intersection (PSI), e.g., [Kissner&Song’05], [Ye et al.’08]  Private set intersection cardinality (PSI-CA), e.g., [Freedman et al.’04], [Cristofaro& Tsudik’10] or

Limitations 6  Cannot differentiate users with the same attribute  Ex: suppose that Alice, Bob, and Mario all like movie Watch movie twice a week Twice a week Twice a month ?

Fine-grained Personal Profile 7 Movie 5 Sports 3 Cooking 0 Movie 5 Sports 3 Cooking 0 Movie 3 Sports 3 Cooking 0

Fine-grained Private Matching 8  Two users evaluate the similarity/distance between their personal profiles in a privacy- preserving fashion  Finer differentiation  Personalized profile matching  Cannot be solved by PSI or PSI-CA

Outline 9  System model, problem formulation and cryptographic tool  Fine-grained private matching protocols  Protocol 1  Protocol 2  Protocol 3  Protocol 4  Performance evaluation  Conclusion

System Model 10  Each user carries a mobile device, e.g., smartphone, with the same PMSN application installed  Fine-grained profile  Consists of attributes, e.g., interests  User assigns an integer in to each attribute, e.g., to indicate the level of interest  Each personal profile can be represented as a - dimensional vector

System Model (cont’) 11  Take Alice and Bob as two exemplary users  A PMSN session consists of three phases Neighbor discovery Profile matching Social interaction Bob Alice

Problem Formulation 12  A set of candidate matching metrics  Each is a function over two vectors measuring the distance between two personal profiles  Alice chooses and runs a private matching protocol with Bob to compute

Privacy Levels 13  Privacy-level 1 (PL-1)  When protocols ends, Alice learns ; Bob learns  Privacy-level 2 (PL-2)  When protocols ends, Alice learns ; Bob learns nothing  Privacy-level 3 (PL-3)  When protocols ends, Alice learns if for some threshold of her choice; Bob learns nothing

Cryptographic Tools: Paillier Cryptosystem [Paillier’99] 14  Encryption  Homomorphic property  Self-blinding property

Private Matching Protocol 1 (PL-1) 15  A non-trivial adaption of [Rane et al. 2010]  Matching metric: distance

Protocol Intuition 16  For, define a function where Ex: We have

Protocol Intuition (cont’) 17  Define We have

Protocol Intuition (cont’) 18  We further have Known by AliceKnown by BobDot product

Detailed Protocol 19 Can be precomputed

Private Matching Protocol 2 (PL-2) 20  Matching metric  Any additively separable functions that can be written as, for some functions  Ex: (Weighted distance) ( distance) (Dot product)

Protocol Intuition 21  Convert any additive separable function into dot product computation  For and, define functions and The th bit is1The th element is

Protocol Intuition (cont’) 22  Let We have

Detailed Protocol 23 Can be precomputed

Private Matching Protocol 3 (PL-3) 24  Matching metric  Any additive separable function  When protocol ends, Alice learns if, Bob learns nothing

Protocol Intuition 25  Let be three arbitrary positive integers, such that We have  Assume that and are both integers  The following inequalities are equivalent

Detailed Protocol 26 Can be precomputed

Detailed Protocol (cont’) 27

Private Matching Protocol 4 (PL-3) 28  Matching metric  Protocols 1~3 cannot be directly applied  Basic idea  Transform into an additive function

Protocol Intuition: Similarity Matching 29

Protocol Intuition (cont’) 30  Three properties of similarity score  Additive separable  Directly affected by the value of  Related to according to the following theorem Protocol 4 can be realized as a special case of Protocol 3 by choosing the similarity score as matching metric

Performance Evaluation  Compare Protocols 1~3 with RSV [Rane et al. 2010] 31 Offline Comp.Online Comp.Comm. (bit) RSV Protocol 1 Protocol 2 Protocol bit exponentiation 2048-bit exponentiation 1024-bit multiplication 2048-bit multiplication

Simulation Results 32

Simulation Results 33

Conclusion  We motivated the problem of fine-grained private matching for PMSN  We presented a set of novel private matching protocols supporting different matching metrics and privacy levels 34

Thank you Q&A 35