Slide 1

advertisement
1
Fine-grained Private Matching for
Proximity-based Mobile Social
Networking
Rui Zhang, Yanchao Zhang
Arizona State University
Jinyuan (Stella) Sun
University of Tennessee
Guanhua Yan
Los Alamos National Laboratory
INFOCOM 2012
Proximity-based Mobile Social Networking
(PMSN)
2

Social interaction
 Among
physically proximate users
 Using mobile devices, e.g., smartphone or tablet
 Directly through the Bluetooth/WiFi interfaces

Valuable complement to web-based online social
networking
Chat, file sharing, …
Private (Profile) Matching
3


The process of two users comparing their profiles
without disclosing any information beyond the
comparison result
An indispensible part of PMSN because
 People
prefer to socialize with others having similar
interests or background
 Privacy concern
Existing Private Matching Schemes
4

User profile comprises a list of attributes chosen
from an underlying attribute set
 Ex:
interests [Li et al.’11], friends [Arb et al.’08],
disease symptoms [Lu et al.’10]
Existing Private Matching Schemes
5

Map private matching into the problem of
 Private
set intersection (PSI), e.g., [Kissner&Song’05],
[Ye et al.’08]
 Private set intersection cardinality (PSI-CA), e.g.,
[Freedman et al.’04], [Cristofaro& Tsudik’10]
or
Limitations
6

Cannot differentiate users with the same attribute
 Ex:
suppose that Alice, Bob, and Mario all like movie
?
Watch movie
twice a week
Twice a week
Twice a
month
Fine-grained Personal Profile
7
Movie
5
Movie
5
Sports
3
Sports
3
Cooking
0
Cooking
0
Movie
3
Sports
3
Cooking
0
Fine-grained Private Matching
8

Two users evaluate the similarity/distance
between their personal profiles in a privacypreserving fashion
 Finer
differentiation
 Personalized profile matching

Cannot be solved by PSI or PSI-CA
Outline
9


System model, problem formulation and
cryptographic tool
Fine-grained private matching protocols
 Protocol
1
 Protocol 2
 Protocol 3
 Protocol 4


Performance evaluation
Conclusion
System Model
10


Each user carries a mobile device, e.g.,
smartphone, with the same PMSN application
installed
Fine-grained profile
 Consists
of attributes, e.g., interests
 User assigns an integer in
to each
attribute, e.g., to indicate the level of interest
 Each personal profile can be represented as a dimensional vector
System Model (cont’)
11


Take Alice and Bob as two exemplary users
A PMSN session consists of three phases
Alice
Neighbor discovery
Profile matching
Social interaction
Bob
Problem Formulation
12

A set of candidate matching metrics


Each
is a function over two vectors measuring
the distance between two personal profiles
Alice chooses
and runs a private matching
protocol with Bob to compute
Privacy Levels
13

Privacy-level 1 (PL-1)
 When

protocols ends, Alice learns
Privacy-level 2 (PL-2)
 When
protocols ends, Alice learns
nothing

; Bob learns
; Bob learns
Privacy-level 3 (PL-3)
 When
protocols ends, Alice learns if
for
some threshold of her choice; Bob learns nothing
Cryptographic Tools: Paillier Cryptosystem
[Paillier’99]
14

Encryption

Homomorphic property

Self-blinding property
Private Matching Protocol 1 (PL-1)
15

A non-trivial adaption of [Rane et al. 2010]

Matching metric: distance
Protocol Intuition
16

For
where
We have
Ex:
, define a function
Protocol Intuition (cont’)
17

Define
We have
Protocol Intuition (cont’)
18

We further have
Known by Alice Dot
product
Known by Bob
Detailed Protocol
19
Can be precomputed
Private Matching Protocol 2 (PL-2)
20

Matching metric
 Any
additively separable functions that can be written
as
, for some functions
 Ex:
( distance)
(Dot product)
(Weighted
distance)
Protocol Intuition
21


Convert any additive separable function into dot
product computation
For
and , define functions and
The th element is
The th bit is1
Protocol Intuition (cont’)
22

Let
We have
Detailed Protocol
23
Can be precomputed
Private Matching Protocol 3 (PL-3)
24

Matching metric
 Any

additive separable function
When protocol ends, Alice learns if
learns nothing
, Bob
Protocol Intuition
25
Let
be three arbitrary positive integers, such
that
We have
 Assume that
and are both integers
 The following inequalities are equivalent

Detailed Protocol
26
Can be precomputed
Detailed Protocol (cont’)
27
Private Matching Protocol 4 (PL-3)
28

Matching metric
 Protocols

1~3 cannot be directly applied
Basic idea
 Transform
into an additive function
Protocol Intuition: Similarity Matching
29
Protocol Intuition (cont’)
30

Three properties of similarity score
 Additive
separable
 Directly affected by the value of
 Related to
according to the following theorem
Protocol 4 can be realized as a special case of Protocol 3
by choosing the similarity score as matching metric
Performance Evaluation
31

Compare Protocols 1~3 with RSV [Rane et al. 2010]
Offline Comp.
Online Comp.
Comm. (bit)
RSV
Protocol 1
Protocol 2
Protocol 3
1024-bit exponentiation
1024-bit multiplication
2048-bit exponentiation
2048-bit multiplication
Simulation Results
32
Simulation Results
33
Conclusion
34


We motivated the problem of fine-grained private
matching for PMSN
We presented a set of novel private matching
protocols supporting different matching metrics
and privacy levels
35
Thank you
Q&A
Download