Skip to main content

A Blockchain-Based Privacy-Preserving Mechanism for Attribute Matching in Social Networks

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2020)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 12384))

Abstract

Online social network has become an indispensable part of people’s life, and people are willing to make friends in social network. However, semi-honest social network platforms may reveal users’ private information, which will cause great losses to users. Existing schemes either are based on Secure Multi-party Computation (SMC), which have a lot of resource consumption, or are based on vector dot product calculation, which are vulnerable to statistical attacks. In this paper, we propose an attribute matching scheme based on hierarchical blockchain and Ciphertext Policy Attribute-based Encryption (CP-ABE), which can realize attribute matching in semi-honest servers and offer fine-grained attributes selection for users to get more precise matching. Additionally, a novel blockchain architecture is proposed in our scheme, which reduces the storage consumption and improve running efficiency. Finally, we present the security analysis that the scheme can resist a variety of attacks, and the experiment results demonstrate the feasibility of the scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cui, W., Du, C., Chen, J.: CP-ABE based privacy-preserving user profile matching in mobile social networks. PLoS ONE 11(6), e0157933 (2016)

    Article  Google Scholar 

  2. Zheng, X., Cai, Z., Yu, J., Wang, C., Li, Y.: Follow but no track: privacy preserved profile publishing in cyber-physical social systems. IEEE Internet Things J. 4(6), 1868–1878 (2017)

    Article  Google Scholar 

  3. Oukemeni, S., Rifà-Pous, H., Puig, J.M.M.: Privacy analysis on microblogging online social networks: a survey. ACM Comput. Surv. (CSUR) 52(3), 1–36 (2019)

    Article  Google Scholar 

  4. Cai, Z., He, Z., Guan, X., Li, Y.: Collective data-sanitization for preventing sensitive information inference attacks in social networks. IEEE Trans. Dependable Secur. Comput. 15(4), 577–590 (2018)

    Google Scholar 

  5. Yi, X., Bertino, E., Rao, F.-Y., Bouguettaya, A.: Practical privacy-preserving user profile matching in social networks. In: 2016 IEEE 32nd International Conference on Data Engineering (ICDE), pp. 373–384. IEEE (2016)

    Google Scholar 

  6. He, Z., Cai, Z., Yu, J.: Latent-data privacy preserving with customized data utility for social network data. IEEE Trans. Veh. Technol. 67(1), 665–673 (2018)

    Article  Google Scholar 

  7. Chaudhary, P., Gupta, B.B.: A novel framework to alleviate dissemination of XSS worms in online social network (OSN) using view segregation. Neural Netw. World 27(1), 5 (2017)

    Article  Google Scholar 

  8. Li, M., Cao, N., Yu, S., Lou, W.: FindU: privacy-preserving personal profile matching in mobile social networks. In: 2011 Proceedings IEEE INFOCOM, pp. 2435–2443. IEEE (2011)

    Google Scholar 

  9. Yang, J., Ouyang, C., Pan, M., Yu, Y., ter Hofstede, A.H.M.: Finding the “Liberos”: discover organizational models with overlaps. In: Weske, M., Montali, M., Weber, I., vom Brocke, J. (eds.) BPM 2018. LNCS, vol. 11080, pp. 339–355. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-98648-7_20

    Chapter  Google Scholar 

  10. Luo, E., Liu, Q., Abawajy, J.H., Wang, G.: Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks. Future Gener. Comput. Syst. 68, 222–233 (2017)

    Article  Google Scholar 

  11. Gao, C., Cheng, Q., Li, X., Xia, S.: Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network. Cluster Comput. 22(1), 1655–1663 (2018). https://doi.org/10.1007/s10586-017-1649-y

    Article  Google Scholar 

  12. Li, R., et al.: Perturbation-based private profile matching in social networks. IEEE Access 5, 19720–19732 (2017)

    Article  Google Scholar 

  13. Luo, E., Liu, Q., Wang, G.: Hierarchical multi-authority and attribute-based encryption friend discovery scheme in mobile social networks. IEEE Commun. Lett. 20(9), 1772–1775 (2016)

    Article  Google Scholar 

  14. Qi, F., Chang, X., Tang, Z., Wang, W.: Searchable attribute-based encryption protocol with hidden keywords in cloud. In: Wang, G., Bhuiyan, M.Z.A., De Capitani di Vimercati, S., Ren, Y. (eds.) DependSys 2019. CCIS, vol. 1123, pp. 80–92. Springer, Singapore (2019). https://doi.org/10.1007/978-981-15-1304-6_7

    Chapter  Google Scholar 

  15. Chandrasekaran, B., Nogami, Y., Balakrishnan, R.: An efficient hierarchical multi-authority attribute based encryption scheme for profile matching using a fast ate pairing in cloud environment. J. Commun. Softw. Syst. 14(2), 151–156 (2018)

    Google Scholar 

  16. Jiang, L., Zhang, X.: BCOSN: a blockchain-based decentralized online social network. IEEE Trans. Comput. Soc. Syst. 6(6), 1454–1466 (2019)

    Article  Google Scholar 

  17. Ke, G., Wang, L., Jia, W.: Autonomous resource request transaction framework based on blockchain in social network. IEEE Access 7, 43666–43678 (2019)

    Article  Google Scholar 

  18. Bethencourt J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP 2007), pp. 321–334. IEEE (2007)

    Google Scholar 

  19. Crosby, M., Pattanayak, P., Verma, S., Kalyanaraman, V., et al.: Blockchain technology: beyond bitcoin. Appl. Innov. 2(6–10), 71 (2016)

    Google Scholar 

  20. Liu, C., Xiao, Y., Javangula, V., Qin, H., Wang, S., Cheng, X.: NormaChain: a blockchain-based normalized autonomous transaction settlement system for IoT-based e-commerce. IEEE Internet Things J. 6(3), 4680–4693 (2018)

    Article  Google Scholar 

Download references

Acknowledgments

This research was supported partially by the Fundamental Research Funds for the Central Universities (No. 2019CDQYRJ006), the National Natural Science Foundation of China (No. 61702062, No. 61932006), the Chongqing Research Program of Basic Research and Frontier Technology with Grant (No. cstc2018jcyjAX0334), Key Project of Technology Innovation and Application Development of Chongqing (cstc2019jscx-mbdxX0044), and Overseas Returnees Innovation and Entrepreneurship Support Program of Chongqing (cx2018015).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chunqiang Hu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yang, F., Pu, Y., Hu, C., Zhou, Y. (2020). A Blockchain-Based Privacy-Preserving Mechanism for Attribute Matching in Social Networks. In: Yu, D., Dressler, F., Yu, J. (eds) Wireless Algorithms, Systems, and Applications. WASA 2020. Lecture Notes in Computer Science(), vol 12384. Springer, Cham. https://doi.org/10.1007/978-3-030-59016-1_52

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-59016-1_52

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-59015-4

  • Online ISBN: 978-3-030-59016-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics