350 likes | 513 Views
Secure Friend Discovery in Mobile Social Networks. å¼ å±•é¹. Authors. Wei Dong. Vacha Dave. Lili Qiu. Yin Zhang. ( å¾·å…‹è¨æ–¯å¤§å¦å¥¥æ–¯æ±€åˆ†æ ¡ ). Abstract. Outline. Problem definition. Potential attacks. Implementation &Evaluation. Approach. Problem definition. Why we need security?
E N D
Authors Wei Dong Vacha Dave Lili Qiu Yin Zhang (德克萨斯大学奥斯汀分校)
Outline Problem definition Potential attacks Implementation &Evaluation Approach
Problem definition • Why we need security? • Reluctant to reveal their presence and personal profile(privacy) • Unwise to blindly trust information received from an arbitrary person(trust) www.pptcn.com
Problem definition • Why not central servers? • The need of direct access to the internet. • Privacy of location and personal data. • The problem of bottleneck. www.pptcn.com
Problem definition A B • What is “trust” exactly? • Proximity measure www.pptcn.com
Problem definition Martrix multiplication Dot product How to calculate proximity? P(i,j) : the proximity from users i to j Node i is associated with a pair of vectors U[i,r] and V[i,r]. P(i,j) ≈ U[i,r] . V[j,r] www.pptcn.com
Problem definition Estimate proximity from social coordinates’ dot product “social coordinates” ie., U[i,r], user’s attributes vector www.pptcn.com
Problem definition %^&* *&^% www.pptcn.com
Protential attacks breach a user's location privacy based on her social coordinate
Protential attacks breach a user's location privacy based on her social coordinate
Protential attacks Percentage of unique dot products as a function of precision.
Protential attacks Percentage of unique dot products as a function of precision.
Protential attacks Other attacks ie., DoS,forgery,tracking users
Apporach Gogals Preserving the privacy of social coordinates. Perserving the privacy of social proximity. Preventing user tracking. Providing authentication and verification. Efficient filtering.
Apporach 3 major components authentication without long-term linability to a trusted server Proximity Pre-fitering Proximity compuation(Private and Verifiable)
Apporach authentication without long-term linability to a trusted server virtual ID( time-bound) expiration time encrypted social coordinates server's digital signature
Apporach Proximity Pre-fitering
Apporach Proximity Pre-fitering start Q.X, c’,g a,h β Bob,u Alice, v
Apporach Proximity Pre-fitering start Q.X, c’,g a,h YES/NO Bob,u Alice, v
Apporach Proximity compuation(Private and Verifiable) Homomorphic encryption(同态加密) 5*B=? EA(5) EA(5*B) F(EA(5),EA(B)) = EA(5*B) Bob Alice
Apporach Proximity compuation(Private and Verifiable)
Apporach Proximity compuation(Private and Verifiable) protocol 0 w’ Bob Alice
Apporach Proximity compuation(Private and Verifiable) protocol 1 Bob Alice
Apporach Proximity compuation(Private and Verifiable) protocol 2 Bob Alice
Apporach Proximity Pre-fitering start Q.X, c’,g a,h β Bob,u Alice, v
Implementation HP IPAQ MOTO Droid PC Windows mobile Android Windows Vista
Implementation 2.Proximity Pre-fitering
Implementation 3.Proximity compuation(Private and Verifiable)
Implementation 3.Proximity compuation(Private and Verifiable)
Conclusion 2 existing protocols & modification