International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II

Research Article

Are You Really My Friend? Exactly Spatiotemporal Matching Scheme in Privacy-Aware Mobile Social Networks

Download
202 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-23802-9_5,
        author={Ben Niu and Xiuguang Li and Xiaoyan Zhu and Xiaoqing Li and Hui Li},
        title={Are You Really My Friend? Exactly Spatiotemporal Matching Scheme in Privacy-Aware Mobile Social Networks},
        proceedings={International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II},
        proceedings_a={SECURECOMM},
        year={2015},
        month={12},
        keywords={Mobile social networks Private matching Spatiotemporal},
        doi={10.1007/978-3-319-23802-9_5}
    }
    
  • Ben Niu
    Xiuguang Li
    Xiaoyan Zhu
    Xiaoqing Li
    Hui Li
    Year: 2015
    Are You Really My Friend? Exactly Spatiotemporal Matching Scheme in Privacy-Aware Mobile Social Networks
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-319-23802-9_5
Ben Niu1,*, Xiuguang Li,*, Xiaoyan Zhu1,*, Xiaoqing Li1,*, Hui Li1,*
  • 1: Xidian University
*Contact email: xd.niuben@gmail.com, lixiuguang00@126.com, xyzhu@mail.xidian.edu.cn, xqli@mail.xidian.edu.cn, lihui@mail.xidian.edu.cn

Abstract

We propose an exactly spatiotemporal matching scheme for privacy-aware users in MSNs. Based on the carefully designed spatiotemporal profile, our scheme employs a weight-aware pre-matching module to filter out the users with less similarity and some potential adversaries, thus guarantees that no useful information is revealed before determining the best matches. Further, we propose a privacy-preserving exchanging module against Honest-But-Curious users. Finally, the similarity computing module computes the exact matching result to each candidate to determine the best match. Thorough security analysis and evaluation results indicate the effectiveness and efficiency.