Fully
Anonymous Profile Matching In
Mobile Social Networks
ABSTRACT
In this paper, we study user profile matching with
privacy-preservation in mobile social networks (MSNs) and introduce a family of
novel profile matching protocols. We first propose an explicit Comparison-based
Profile Matching protocol (eCPM) which runs between two parties, an initiator
and a responder. The eCPM enables the initiator to obtain the comparison-based
matching result about a specified attribute in their profiles, while preventing
their attribute values from disclosure. We then propose an implicit
Comparison-based Profile Matching protocol (iCPM) which allows the initiator to
directly obtain some messages instead of the comparison result from the
responder. The messages unrelated to user profile can be divided into multiple
categories by the responder. The initiator implicitly chooses the interested
category which is unknown to the responder. Two messages in each category are
prepared by the responder, and only one message can be obtained by the
initiator according to the comparison result on a single attribute. We further
generalize the iCPM to an implicit Predicate-based Profile Matching protocol
(iPPM) which allows complex comparison criteria spanning multiple attributes.
The anonymity analysis shows all these protocols achieve the confidentiality of
user profiles. In addition, the eCPM reveals the comparison result to the
initiator and provides only conditional anonymity; the iCPM and the iPPM do not
reveal the result at all and provide full anonymity. We analyze the
communication overhead and the anonymity strength of the protocols.
EXISTING SYSTEM:
Privacy preservation is a significant research issue in
social networking. The social networking platforms are extended into the mobile
environment, users require more extensive privacy-preservation because they are
unfamiliar with the neighbors in close vicinity who may store, and correlate
their personal information at different time periods and locations. Once the
personal information is correlated to the location information, the behavior of
users will be completely disclosed to the public. The content-sharing
applications, all of which provide no feedback or control mechanisms to users
and may cause inappropriate location and identity information disclosure. To
overcome the privacy violation in MSNs, many privacy enhancing techniques have
been adopted into the MSN applications.
PROPOSED SYSTEM:
We first propose an explicit Comparison-based Profile
Matching protocol (eCPM) which runs between two parties, an initiator and a
responder. The eCPM enables the initiator to obtain the comparison-based
matching result about a specified attribute in their profiles, while preventing
their attribute values from
Disclosure.We then propose an implicit Comparison-based
Profile Matching protocol (iCPM) which allows the initiator to directly obtain
some messages instead of the comparison result from the responder. The messages
unrelated to user profile can be divided into multiple categories by the
responder. The initiator implicitly chooses the interested category which is
unknown to the responder. Two messages in each category are prepared by the
responder, and only one message can be obtained by the initiator according to
the comparison result on a single attribute. We further generalize the iCPM to
an implicit Predicate-based Profile Matching protocol (iPPM) which allows
complex comparison criteria spanning multiple attributes. The anonymity
analysis shows all these protocols achieve the confidentiality of user
profiles. In addition, the eCPM reveals the comparison result to the initiator
and provides only conditional anonymity; the iCPM and the iPPM do not reveal
the result at all and provide full anonymity. We analyze the communication
overhead and the anonymity strength of the protocols.
MODULE DESCRIPTION:
Number of Modules
After careful analysis the system has been
identified to have the following modules:
1.
Mobile Social Networking Module.
2.
Explicit Comparison-based Profile
Matching (eCPM) Module.
3.
Implicit Comparison-based Profile
Matching (iCPM) Module.
4.
Privacy Preserving Module.
1. Mobile Social Networking Module:
The MSNs support many promising and novel applications. In
the MSNs, users are able to not only surf the Internet but also communicate
with peers in close vicinity using short-range wireless communications
Realizing the potential benefits brought by the MSNs, recent research efforts have
been put on how to improve the effectiveness and efficiency of the
communications among the MSN users. They developed specialized data routing and
forwarding protocols associated with the social features exhibited from the
behavior of users, such as, social friendship, social selfishness, and social
morality.
2. Explicit Comparison-based
Profile Matching (eCPM) Module:
Attribute, the eCPM allows the initiator to know the
comparison result, i.e., whether it has a larger, equal, or smaller value than
the responder on the attribute. Due to the exposure of the comparison result,
user profile will be leaked and linked in some conditions. We provide a
numerical analysis on the conditional anonymity of the eCPM. We study the
anonymity risk level in relation to the pseudonym change for the consecutive
eCPM runs.
3.Implicit Comparison-based
Profile Matching (iCPM) Module:
We propose the iCPM, in this protocol, the responder
prepares multiple categories of messages where two messages are generated for
each category. The initiator can obtain only one message related to one
category for each run. During the protocol, the responder is unable to know the
category of the initiator’s interest. To receive which message in the category
is dependent on the comparison result on a specified attribute. The responder
does not know which message the initiator receives, while the initiator cannot
derive the comparison result from the received message. We provide an analysis
of the effectiveness of the iCPM, and show that the iCPM achieves full
anonymity.
4.
Privacy Preserving Module:
Privacy preservation is a significant research issue in
social networking. Since more personalized information is shared with the
public, violating the privacy of a target user become much easier. We propose
three different protocols with different anonymity levels. For the eCPM with
conditional anonymity, we provide detailed anonymity analysis and show the
relation between pseudonym change and anonymity variation. For the iCPM and the
iPPM with full anonymity, we show that the use of these protocols does not
affect user anonymity level and users are able to completely preserve their
privacy.
SOFTWARE REQUIREMENTS:
Operating System : Windows
Technology : Java and J2EE
Web Technologies : Html, JavaScript, CSS
IDE : My Eclipse
Web Server : Tomcat
Tool kit : Android Phone
Database : My SQL
Java Version :
J2SDK1.5
HARDWARE REQUIREMENTS:
Hardware : Pentium
Speed : 1.1
GHz
RAM : 1GB
Hard Disk : 20 GB
Floppy Drive : 1.44 MB
Key Board : Standard Windows Keyboard
Mouse : Two or Three Button Mouse
Monitor : SVGA
Flow Diagram:
No comments:
Post a Comment