Friday, May 9, 2014

Fully Anonymous Profile Matching In Mobile Social Networks

   Fully Anonymous Profile Matching In
             Mobile Social Networks

ABSTRACT

In this paper, we study user profile matching with privacy-preservation in mobile social networks (MSNs) and introduce a family of novel profile matching protocols. We first propose an explicit Comparison-based Profile Matching protocol (eCPM) which runs between two parties, an initiator and a responder. The eCPM enables the initiator to obtain the comparison-based matching result about a specified attribute in their profiles, while preventing their attribute values from disclosure. We then propose an implicit Comparison-based Profile Matching protocol (iCPM) which allows the initiator to directly obtain some messages instead of the comparison result from the responder. The messages unrelated to user profile can be divided into multiple categories by the responder. The initiator implicitly chooses the interested category which is unknown to the responder. Two messages in each category are prepared by the responder, and only one message can be obtained by the initiator according to the comparison result on a single attribute. We further generalize the iCPM to an implicit Predicate-based Profile Matching protocol (iPPM) which allows complex comparison criteria spanning multiple attributes. The anonymity analysis shows all these protocols achieve the confidentiality of user profiles. In addition, the eCPM reveals the comparison result to the initiator and provides only conditional anonymity; the iCPM and the iPPM do not reveal the result at all and provide full anonymity. We analyze the communication overhead and the anonymity strength of the protocols.




EXISTING SYSTEM:

Privacy preservation is a significant research issue in social networking. The social networking platforms are extended into the mobile environment, users require more extensive privacy-preservation because they are unfamiliar with the neighbors in close vicinity who may store, and correlate their personal information at different time periods and locations. Once the personal information is correlated to the location information, the behavior of users will be completely disclosed to the public. The content-sharing applications, all of which provide no feedback or control mechanisms to users and may cause inappropriate location and identity information disclosure. To overcome the privacy violation in MSNs, many privacy enhancing techniques have been adopted into the MSN applications.

PROPOSED SYSTEM:

We first propose an explicit Comparison-based Profile Matching protocol (eCPM) which runs between two parties, an initiator and a responder. The eCPM enables the initiator to obtain the comparison-based matching result about a specified attribute in their profiles, while preventing their attribute values from
Disclosure.We then propose an implicit Comparison-based Profile Matching protocol (iCPM) which allows the initiator to directly obtain some messages instead of the comparison result from the responder. The messages unrelated to user profile can be divided into multiple categories by the responder. The initiator implicitly chooses the interested category which is unknown to the responder. Two messages in each category are prepared by the responder, and only one message can be obtained by the initiator according to the comparison result on a single attribute. We further generalize the iCPM to an implicit Predicate-based Profile Matching protocol (iPPM) which allows complex comparison criteria spanning multiple attributes. The anonymity analysis shows all these protocols achieve the confidentiality of user profiles. In addition, the eCPM reveals the comparison result to the initiator and provides only conditional anonymity; the iCPM and the iPPM do not reveal the result at all and provide full anonymity. We analyze the communication overhead and the anonymity strength of the protocols.


MODULE DESCRIPTION:

 

Number of Modules

After careful analysis the system has been identified to have the following modules:

1.     Mobile Social Networking Module.
2.     Explicit Comparison-based Profile Matching (eCPM) Module.
3.     Implicit Comparison-based Profile Matching (iCPM) Module.
4.     Privacy Preserving Module.    

1.  Mobile Social Networking Module:
The MSNs support many promising and novel applications. In the MSNs, users are able to not only surf the Internet but also communicate with peers in close vicinity using short-range wireless communications Realizing the potential benefits brought by the MSNs, recent research efforts have been put on how to improve the effectiveness and efficiency of the communications among the MSN users. They developed specialized data routing and forwarding protocols associated with the social features exhibited from the behavior of users, such as, social friendship, social selfishness, and social morality.

2. Explicit Comparison-based Profile Matching (eCPM)  Module:
Attribute, the eCPM allows the initiator to know the comparison result, i.e., whether it has a larger, equal, or smaller value than the responder on the attribute. Due to the exposure of the comparison result, user profile will be leaked and linked in some conditions. We provide a numerical analysis on the conditional anonymity of the eCPM. We study the anonymity risk level in relation to the pseudonym change for the consecutive eCPM runs.

3.Implicit Comparison-based Profile Matching (iCPM) Module:
We propose the iCPM, in this protocol, the responder prepares multiple categories of messages where two messages are generated for each category. The initiator can obtain only one message related to one category for each run. During the protocol, the responder is unable to know the category of the initiator’s interest. To receive which message in the category is dependent on the comparison result on a specified attribute. The responder does not know which message the initiator receives, while the initiator cannot derive the comparison result from the received message. We provide an analysis of the effectiveness of the iCPM, and show that the iCPM achieves full anonymity.

4. Privacy Preserving Module:
Privacy preservation is a significant research issue in social networking. Since more personalized information is shared with the public, violating the privacy of a target user become much easier. We propose three different protocols with different anonymity levels. For the eCPM with conditional anonymity, we provide detailed anonymity analysis and show the relation between pseudonym change and anonymity variation. For the iCPM and the iPPM with full anonymity, we show that the use of these protocols does not affect user anonymity level and users are able to completely preserve their privacy.


SOFTWARE REQUIREMENTS:

          Operating System                     : Windows
          Technology                               : Java and J2EE
          Web Technologies                     : Html, JavaScript, CSS
           IDE                                          : My Eclipse
           Web Server                              : Tomcat
           Tool kit                                    : Android Phone
           Database                                  : My SQL
           Java Version                             : J2SDK1.5                 
                


HARDWARE REQUIREMENTS:

         Hardware                             :     Pentium
         Speed                                   :     1.1 GHz
         RAM                                   :    1GB
         Hard Disk                           :    20 GB
         Floppy Drive                       :    1.44 MB
         Key Board                          :    Standard Windows Keyboard
         Mouse                                 :    Two or Three Button Mouse
         Monitor                               :    SVGA

Flow Diagram:


No comments:

Post a Comment