Abstract
In this paper, we propose a fully decentralized approach for recommending new contacts in the social network of mobile phone users. With respect to existing solutions, our approach is characterized by some distinguishing features. In particular, the application we propose does not assume any centralized coordination: It transparently collects and processes user information that is accessible in any mobile phone, such as the log of calls, the list of contacts or the inbox/outbox of short messages and exchanges it with other users. This information is used to recommend new friendships to other users. Furthermore, the information needed to perform recommendation is collected and exchanged between users in a privacy preserving way. Finally, information necessary to implement the application is exchanged transparently and opportunistically, by using the residual space in standard short messages occasionally exchanged between users. As a consequence, we do not ask users to change their habits in using SMS.















Similar content being viewed by others
Notes
“If you look at instant messaging, e-mail or even social networking, they don’t have the ubiquity and the reach to replace messaging” - Bill Dudley, Sybase 365’s group director for product management.
Jyngle closed in August 2009.
An alternative solution is that A sends to B part of its sketch, compatibly with the available space in the SMS message body. This solution requires bookkeeping both at A and B, to keep track of the portions of \(sk(A)\) still missing at B. In fact, the former solution can be more easily implemented than the latter and it requires no additional data structures.
For more details, also see http://www.rsa.com/rsalabs/node.asp?id=2098.
The dataset is publicly available for research purposes at http://odysseas.calit2.uci.edu/doku.php/public:online_social_networks#facebook_social_graph.
Filtering contact list entries based on contact frequency should be done cautiously, since less frequent or rare contacts tend to provide more similarity information. This is also one of the main ideas behind the definition of Adamic–Adar similarity coefficient.
The threshold is represented as a label over each point in the scatterplot.
This is the reason why only one point of the 10 hash algorithm is represented on the scatterplot.
References
Adamic LA, Adar E (2003) Friends and neighbors on the web. Soc Netw 25(3):211–230
Aiello W, Chung F, Lu L (2000) A random graph model for massive graphs. In: Proceedings of the thirty-second annual ACM symposium on Theory of computing. ACM, pp 171–180
Aiello W, Chung F, Lu L (2001) Random evolution in massive graphs. In: Werner B (ed) Proceedings of the 42nd IEEE symposium on foundations of computer science, pp 510–521
Baglioni E, Becchetti L, Bergamini L, Colesanti U, Filipponi L, Vitaletti A, Persiano G (2010) A lightweight privacy preserving sms-based recommendation system for mobile users. In: Proceedings of the fourth ACM conference on recommender systems, RecSys ’10. ACM, New York, NY, USA, pp 191–198
Barni M, Bianchi T, Catalano D, Di Raimondo M, Donida Labati R, Failla P, Fiore D, Lazzeretti R, Piuri V, Scotti F, Piva A (2010) Privacy-preserving fingercode authentication. In: Proceedings of the 12th ACM workshop on multimedia and security, MM &Sec ’10. ACM, New York, NY, USA, pp 231–240
Bellare M, Namprempre C, Pointcheval D, Semanko M (2003) The one-more-rsa-inversion problems and the security of chaum’s blind signature scheme. J Cryptol 16(3):185–215
Blanton M, Gasti P (2011) Secure and efficient protocols for iris and fingerprint identification. In: Proceedings of the 16th European conference on research in computer security, ESORICS’11. Springer, Berlin, pp 190–209
Blundo C, Cristofaro ED, Gasti P (2011) Espresso: efficient privacy-preserving evaluation of sample set similarity. CoRR, abs/1111.5062
Bohman T, Cooper C, Frieze AM (2000) Min-wise independent linear permutations. Electr J Comb 7:R26. Accessed at: http://www.emis.ams.org/journals/EJC/volume-7/PDF/v7ilr26.pdf
Broder AZ, Charikar M, Frieze AM, Mitzenmacher M (1998) Min-wise independent permutations. In: ACM symposium on the theory of computing, New York, NY, USA
Broder AZ, Glassman SC, Manasse MS, Zweig G (1997) Syntactic clustering of the web. In: Proceedings of the world wide web Conference
Buhler J, Lenstra HW, Pomerance C (1993) Factoring integers with the number field sieve. In: Lenstra A, Lenstra J, Hendrik W (eds) The development of the number field sieve. Lecture Notes in Mathematics, vol 1554. Springer, Berlin, pp 50–94
A. Campagna and R. Pagh. Finding associations and computing similarity via biased pair sampling. Knowl Inf Syst 1–22. doi:10.1007/s10115-011-0428-y
Consulting G (2008) Gartner says mobile messages to surpass 2 trillion messages in major markets in 2008
Cristofaro ED, Gasti P, Tsudik G (2011) Fast and private computation of set intersection cardinality. IACR Cryptol ePrint Arch 2011:141
Cunningham P (2009) A taxonomy of similarity mechanisms for case-based reasoning. IEEE Trans Knowl Data Eng 21(11):1532–1543
Dunbar R (1998) Grooming, gossip, and the evolution of language. Harvard University Press, Cambridge
Eagle N, Pentland A (2006) Reality mining: sensing complex social systems. Pers Ubiquitous Comput 10(4):255–268
eMarketer forecasts online. http://technokitten.blogspot.com/2008/05/big-growth-predicted-for-mobile-soc
Erkin Z, Piva A, Katzenbeisser S, Lagendijk RL, Shokrollahi J, Neven G, Barni M (2007) Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing. EURASIP J Inf Secur 2007. doi:10.1155/2007/78943
Gjoka M, Kurant M, Butts CT, Markopoulou A (2001) Practical recommendations on crawling online social networks. IEEE J Sel Areas Commun 29(9):1872–1892
Indyk P (1999) A small approximately min-wise independent family of hash functions. In: SODA
Jyngle web site. http://www.jyngle.com/, 2008
Leroy V, Cambazoglu BB, Bonchi F (2010) Cold start link prediction. In: Proceedings of the 16th ACM SIGKDD international conference on knowledge discovery and data mining, KDD ’10. ACM, New York, NY, USA, pp 393–402
Liben-Nowell D, Kleinberg J (2007) The link-prediction problem for social networks. J Am Soc Inf Sci Technol 58(7):1019–1031
Liben-Nowell D, Kleinberg J (2003) The link prediction problem for social networks. In: Proceedings of the twelfth international conference on information and knowledge management, CIKM ’03. ACM, New York, NY, USA, pp 556–559
Lin Z, Lyu M, King I. Matchsim: a novel similarity measure based on maximum neighborhood matching. Knowl Inf Syst 1–26. doi:10.1007/s10115-011-0427-z
Market intelligence on messaging and marketing. http://www.lloydsmiu.com/pdf/Jun-2005/16/mma_sample_issue_june.pdf, 2009
Miller BN, Konstan JA, Riedl J (2004) Pocketlens: toward a personal recommender system. ACM Trans Inf Syst 22(3):437–476
Murugesan M, Jiang W, Clifton C, Si L, Vaidya J (2010) Efficient privacy-preserving similar document detection. VLDB J 19:457–475
Newman MEJ (2003) The structure and function of complex networks. SIAM Rev 45(2):167–256
Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: Stern J (ed) Advances in cryptology EUROCRYPT 99. Lecture Notes in Computer Science, vol 1592. Springer, Berlin, pp 223–238
Peekamo web site: http://peekamo.com/, 2008
Reality mining project. http://reality.media.mit.edu/
Sadeghi A-R, Schneider T, Wehrenberg I (2010) Efficient privacy-preserving face recognition. In: Proceedings of the 12th international conference on information security and cryptology, ICISC’09. Springer, Berlin, pp 229–244
Stutzbach D, Rejaie R, Duffield N, Sen S, Willinger W (2009) On unbiased sampling for unstructured peer-to-peer networks. IEEE/ACM Trans Netw 17:377–390
Stutzbach D, Rejaie R, Duffield N, Sen S, Willinger W (2006) Sampling techniques for large, dynamic graphs. In: INFOCOM 2006. 25th IEEE international conference on computer communications. Proceedings, pp 1–6, April 2006
Terveen L, McDonald DW (2005) Social matching: a framework and research agenda. ACM Trans Comput Hum Interact 12(3):401–434
W3c workshop on the future of social networking. http://planb.nicecupoftea.org/2009/01/14/w3c-workshop-on-the-future-of-socia
Zerfos P, Meng X, Wong SH, Samanta V, Lu S (2006) A study of short message service of a nationwide cellular network. In: IMC ’06: proceedings of the 6th ACM SIGCOMM conference on internet measurement. ACM NY, USA, pp 263–268
Author information
Authors and Affiliations
Corresponding author
Additional information
Partially supported by PRIN 2008 research project COGENT, funded by the Italian Ministry of University and Research.
Rights and permissions
About this article
Cite this article
Becchetti, L., Bergamini, L., Colesanti, U.M. et al. A lightweight privacy preserving SMS-based recommendation system for mobile users. Knowl Inf Syst 40, 49–77 (2014). https://doi.org/10.1007/s10115-013-0632-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10115-013-0632-z