A Secure and Efficient Privacy-Preserving Attribute Matchmaking Protocol for Mobile Social Networks
نویسندگان
چکیده
The advances in mobile and communication technologies lead to advancement of Mobile Social Networks (MSNs). MSN changed the way people communicate and exchange the private and sensitive information among the friend groups via mobile phones. Due to the involvement of private and sensitive information, MSN demands for efficient and privacy-preserving matchmaking protocols to prevent the unintended data (attribute) leakage. Many existing matchmaking protocols are based on user’s private and specific data. Malicious participants may opt their attribute set arbitrarily so as to discover more information about the attributes of an honest participant. Hence, there is great chance of information leakage to a dishonest participant. In this context, Sarpong et al. had proposed a first of its kind of an authenticated hybrid matchmaking protocol that will help match-pair initiators to find an appropriate pair which satisfies the pre-defined threshold number of common attributes. Sarpong et al. had claimed that their protocol restricts attribute leakage to unintended participants and proved to be secure. Unfortunately, in Sarpong et al. scheme, after thorough analysis, we demonstrate that, their scheme suffers from data (attribute) leakage, in which the initiator and the participant can compute or achieve all the attributes of each other. Also we show that Sarpong et al. scheme requires huge computation and communication cost. As a part of our contribution we will propose an efficient and secure match making protocol which is light weight and restricts attribute leakage to the participants.
منابع مشابه
Privacy-preserving Attribute Matchmaking in Proximity-based Mobile Social Networks
The major impediments that mostly arise in matchmaking in mobile social networks are ensuring the privacy of users’ attributes, finding the intersection of attributes of the matched-pair without revealing any other information, and ensuring that the matchedpair get to know the intersection mutually. Also, in virtually all the existing protocols, the initiator of the matchmaking does not set a t...
متن کاملPPAM: Privacy-preserving Attributes Matchmaking Protocol for Mobile Social Networks Secure against Malicious Users
People often associate with others who share their hopes, aspirations, beliefs and experiences. This sense of belonging influences people when making friends be it physically or on social networks. Most of the existing matchmaking protocols just match-pair people without regards to the number of attributes they have in common. In lieu of these, we are proposing a hybrid matchmaking protocol tha...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملPrivacy preserving distributed profile matching in mobile social network
In this document, a privacy-preserving distributed profile matching protocol is proposed in a particular network context called mobile social network. Such networks are often deployed in more or less hostile environments, requiring rigorous security mechanisms. In the same time, energy and computational resources are limited as these heterogeneous networks are frequently constituted by wireless...
متن کاملAttribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- I. J. Network Security
دوره 19 شماره
صفحات -
تاریخ انتشار 2017