A Secure and Efficient Privacy-Preserving Attribute Matchmaking Protocol for Mobile Social Networks

نویسندگان

  • K. Arthi
  • M. Chandra Mouli Reddy
چکیده

The advances in mobile and communication technologies lead to advancement of Mobile Social Networks (MSNs). MSN changed the way people communicate and exchange the private and sensitive information among the friend groups via mobile phones. Due to the involvement of private and sensitive information, MSN demands for efficient and privacy-preserving matchmaking protocols to prevent the unintended data (attribute) leakage. Many existing matchmaking protocols are based on user’s private and specific data. Malicious participants may opt their attribute set arbitrarily so as to discover more information about the attributes of an honest participant. Hence, there is great chance of information leakage to a dishonest participant. In this context, Sarpong et al. had proposed a first of its kind of an authenticated hybrid matchmaking protocol that will help match-pair initiators to find an appropriate pair which satisfies the pre-defined threshold number of common attributes. Sarpong et al. had claimed that their protocol restricts attribute leakage to unintended participants and proved to be secure. Unfortunately, in Sarpong et al. scheme, after thorough analysis, we demonstrate that, their scheme suffers from data (attribute) leakage, in which the initiator and the participant can compute or achieve all the attributes of each other. Also we show that Sarpong et al. scheme requires huge computation and communication cost. As a part of our contribution we will propose an efficient and secure match making protocol which is light weight and restricts attribute leakage to the participants.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy-preserving Attribute Matchmaking in Proximity-based Mobile Social Networks

The major impediments that mostly arise in matchmaking in mobile social networks are ensuring the privacy of users’ attributes, finding the intersection of attributes of the matched-pair without revealing any other information, and ensuring that the matchedpair get to know the intersection mutually. Also, in virtually all the existing protocols, the initiator of the matchmaking does not set a t...

متن کامل

PPAM: Privacy-preserving Attributes Matchmaking Protocol for Mobile Social Networks Secure against Malicious Users

People often associate with others who share their hopes, aspirations, beliefs and experiences. This sense of belonging influences people when making friends be it physically or on social networks. Most of the existing matchmaking protocols just match-pair people without regards to the number of attributes they have in common. In lieu of these, we are proposing a hybrid matchmaking protocol tha...

متن کامل

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

Privacy preserving distributed profile matching in mobile social network

In this document, a privacy-preserving distributed profile matching protocol is proposed in a particular network context called mobile social network. Such networks are often deployed in more or less hostile environments, requiring rigorous security mechanisms. In the same time, energy and computational resources are limited as these heterogeneous networks are frequently constituted by wireless...

متن کامل

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • I. J. Network Security

دوره 19  شماره 

صفحات  -

تاریخ انتشار 2017