Font Size: a A A

The Search Of Privacy-preserving Matchmaking For Mobile Social Networking

Posted on:2014-08-05Degree:MasterType:Thesis
Country:ChinaCandidate:T T ZhangFull Text:PDF
GTID:2268330401465736Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
Recently, the technology of mobile networking is developing rapidly, attractingmore and more intelligent terminal (such as mobile, PAD) to access it. Matchmakingapplications enable users to discover and interact with existing and potential friends inboth the cyberspace and in the real world. In the network, driven by the enormouseconomic profit, cybercrimes are developing in this field too. How to protect the users’privacy during the matchmaking process is a critical problem. In the applications ofmatchmaking, users want to discover the friends; on the other hand, they don’t willingto public their personal information. This is a challenge for the service provider.Aiming at this problem, we study the applications of matchmaking in MSN, makea deep analysis in principle of technology of the privacy preserving and propose ourmatchmaking schemes. The main contents are as following:1. The system architectures are designed.According to the characteristic of the mobile networking, we proposed a privacypreserving matchmaking scheme.2. The matchmaking protocols and friend recommendation algorithm are proposed.In this paper, the matchmaking protocols which support privacy preserving areproposed. The initiator can find his matching candidates, where the best-matches withrespect to the size of common attributes are found and their common attributes are thenexchanged. However, users not in the best-matches only know the size of the commonattributes with the initiator and nothing beyond this.We discuss the arbitration mechanisms for the protocol to detect malicious userswho are cheating the others. Friend recommendation algorithm is also discussed.3. The correctness and security analysis against malicious attacks are presented.The theoretical analysis is performed to prove the correctness and security of theprotocol.4. The simulations are performed.The simulation results indicate that our scheme has a good performance andscalability. According to the theoretical analysis and simulations, our matchmaking protocolsare verified to be more secure and better performance.
Keywords/Search Tags:mobile social network, privacy preserving, matchmaking protocol, privateset intersection problem, homomorphic encryption
PDF Full Text Request
Related items