Skip to main content
Log in

A lightweight privacy preserving SMS-based recommendation system for mobile users

  • Regular Paper
  • Published:
Knowledge and Information Systems Aims and scope Submit manuscript

Abstract

In this paper, we propose a fully decentralized approach for recommending new contacts in the social network of mobile phone users. With respect to existing solutions, our approach is characterized by some distinguishing features. In particular, the application we propose does not assume any centralized coordination: It transparently collects and processes user information that is accessible in any mobile phone, such as the log of calls, the list of contacts or the inbox/outbox of short messages and exchanges it with other users. This information is used to recommend new friendships to other users. Furthermore, the information needed to perform recommendation is collected and exchanged between users in a privacy preserving way. Finally, information necessary to implement the application is exchanged transparently and opportunistically, by using the residual space in standard short messages occasionally exchanged between users. As a consequence, we do not ask users to change their habits in using SMS.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

Notes

  1. “If you look at instant messaging, e-mail or even social networking, they don’t have the ubiquity and the reach to replace messaging” - Bill Dudley, Sybase 365’s group director for product management.

  2. Jyngle closed in August 2009.

  3. An alternative solution is that A sends to B part of its sketch, compatibly with the available space in the SMS message body. This solution requires bookkeeping both at A and B, to keep track of the portions of \(sk(A)\) still missing at B. In fact, the former solution can be more easily implemented than the latter and it requires no additional data structures.

  4. For more details, also see http://www.rsa.com/rsalabs/node.asp?id=2098.

  5. The dataset is publicly available for research purposes at http://odysseas.calit2.uci.edu/doku.php/public:online_social_networks#facebook_social_graph.

  6. Filtering contact list entries based on contact frequency should be done cautiously, since less frequent or rare contacts tend to provide more similarity information. This is also one of the main ideas behind the definition of Adamic–Adar similarity coefficient.

  7. The threshold is represented as a label over each point in the scatterplot.

  8. This is the reason why only one point of the 10 hash algorithm is represented on the scatterplot.

References

  1. Adamic LA, Adar E (2003) Friends and neighbors on the web. Soc Netw 25(3):211–230

    Article  Google Scholar 

  2. Aiello W, Chung F, Lu L (2000) A random graph model for massive graphs. In: Proceedings of the thirty-second annual ACM symposium on Theory of computing. ACM, pp 171–180

  3. Aiello W, Chung F, Lu L (2001) Random evolution in massive graphs. In: Werner B (ed) Proceedings of the 42nd IEEE symposium on foundations of computer science, pp 510–521

  4. Baglioni E, Becchetti L, Bergamini L, Colesanti U, Filipponi L, Vitaletti A, Persiano G (2010) A lightweight privacy preserving sms-based recommendation system for mobile users. In: Proceedings of the fourth ACM conference on recommender systems, RecSys ’10. ACM, New York, NY, USA, pp 191–198

  5. Barni M, Bianchi T, Catalano D, Di Raimondo M, Donida Labati R, Failla P, Fiore D, Lazzeretti R, Piuri V, Scotti F, Piva A (2010) Privacy-preserving fingercode authentication. In: Proceedings of the 12th ACM workshop on multimedia and security, MM &Sec ’10. ACM, New York, NY, USA, pp 231–240

  6. Bellare M, Namprempre C, Pointcheval D, Semanko M (2003) The one-more-rsa-inversion problems and the security of chaum’s blind signature scheme. J Cryptol 16(3):185–215

    Google Scholar 

  7. Blanton M, Gasti P (2011) Secure and efficient protocols for iris and fingerprint identification. In: Proceedings of the 16th European conference on research in computer security, ESORICS’11. Springer, Berlin, pp 190–209

  8. Blundo C, Cristofaro ED, Gasti P (2011) Espresso: efficient privacy-preserving evaluation of sample set similarity. CoRR, abs/1111.5062

  9. Bohman T, Cooper C, Frieze AM (2000) Min-wise independent linear permutations. Electr J Comb 7:R26. Accessed at: http://www.emis.ams.org/journals/EJC/volume-7/PDF/v7ilr26.pdf

  10. Broder AZ, Charikar M, Frieze AM, Mitzenmacher M (1998) Min-wise independent permutations. In: ACM symposium on the theory of computing, New York, NY, USA

  11. Broder AZ, Glassman SC, Manasse MS, Zweig G (1997) Syntactic clustering of the web. In: Proceedings of the world wide web Conference

  12. Buhler J, Lenstra HW, Pomerance C (1993) Factoring integers with the number field sieve. In: Lenstra A, Lenstra J, Hendrik W (eds) The development of the number field sieve. Lecture Notes in Mathematics, vol 1554. Springer, Berlin, pp 50–94

  13. A. Campagna and R. Pagh. Finding associations and computing similarity via biased pair sampling. Knowl Inf Syst 1–22. doi:10.1007/s10115-011-0428-y

  14. Consulting G (2008) Gartner says mobile messages to surpass 2 trillion messages in major markets in 2008

  15. Cristofaro ED, Gasti P, Tsudik G (2011) Fast and private computation of set intersection cardinality. IACR Cryptol ePrint Arch 2011:141

    Google Scholar 

  16. Cunningham P (2009) A taxonomy of similarity mechanisms for case-based reasoning. IEEE Trans Knowl Data Eng 21(11):1532–1543

    Article  Google Scholar 

  17. Dunbar R (1998) Grooming, gossip, and the evolution of language. Harvard University Press, Cambridge

    Google Scholar 

  18. Eagle N, Pentland A (2006) Reality mining: sensing complex social systems. Pers Ubiquitous Comput 10(4):255–268

    Article  Google Scholar 

  19. eMarketer forecasts online. http://technokitten.blogspot.com/2008/05/big-growth-predicted-for-mobile-soc

  20. Erkin Z, Piva A, Katzenbeisser S, Lagendijk RL, Shokrollahi J, Neven G, Barni M (2007) Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing. EURASIP J Inf Secur 2007. doi:10.1155/2007/78943

  21. Gjoka M, Kurant M, Butts CT, Markopoulou A (2001) Practical recommendations on crawling online social networks. IEEE J Sel Areas Commun 29(9):1872–1892

    Article  Google Scholar 

  22. Indyk P (1999) A small approximately min-wise independent family of hash functions. In: SODA

  23. Jyngle web site. http://www.jyngle.com/, 2008

  24. Leroy V, Cambazoglu BB, Bonchi F (2010) Cold start link prediction. In: Proceedings of the 16th ACM SIGKDD international conference on knowledge discovery and data mining, KDD ’10. ACM, New York, NY, USA, pp 393–402

  25. Liben-Nowell D, Kleinberg J (2007) The link-prediction problem for social networks. J Am Soc Inf Sci Technol 58(7):1019–1031

    Article  Google Scholar 

  26. Liben-Nowell D, Kleinberg J (2003) The link prediction problem for social networks. In: Proceedings of the twelfth international conference on information and knowledge management, CIKM ’03. ACM, New York, NY, USA, pp 556–559

  27. Lin Z, Lyu M, King I. Matchsim: a novel similarity measure based on maximum neighborhood matching. Knowl Inf Syst 1–26. doi:10.1007/s10115-011-0427-z

  28. Market intelligence on messaging and marketing. http://www.lloydsmiu.com/pdf/Jun-2005/16/mma_sample_issue_june.pdf, 2009

  29. Miller BN, Konstan JA, Riedl J (2004) Pocketlens: toward a personal recommender system. ACM Trans Inf Syst 22(3):437–476

    Article  Google Scholar 

  30. Murugesan M, Jiang W, Clifton C, Si L, Vaidya J (2010) Efficient privacy-preserving similar document detection. VLDB J 19:457–475

    Article  Google Scholar 

  31. Newman MEJ (2003) The structure and function of complex networks. SIAM Rev 45(2):167–256

    Article  MATH  MathSciNet  Google Scholar 

  32. Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: Stern J (ed) Advances in cryptology EUROCRYPT 99. Lecture Notes in Computer Science, vol 1592. Springer, Berlin, pp 223–238

  33. Peekamo web site: http://peekamo.com/, 2008

  34. Reality mining project. http://reality.media.mit.edu/

  35. Sadeghi A-R, Schneider T, Wehrenberg I (2010) Efficient privacy-preserving face recognition. In: Proceedings of the 12th international conference on information security and cryptology, ICISC’09. Springer, Berlin, pp 229–244

  36. Stutzbach D, Rejaie R, Duffield N, Sen S, Willinger W (2009) On unbiased sampling for unstructured peer-to-peer networks. IEEE/ACM Trans Netw 17:377–390

    Article  Google Scholar 

  37. Stutzbach D, Rejaie R, Duffield N, Sen S, Willinger W (2006) Sampling techniques for large, dynamic graphs. In: INFOCOM 2006. 25th IEEE international conference on computer communications. Proceedings, pp 1–6, April 2006

  38. Terveen L, McDonald DW (2005) Social matching: a framework and research agenda. ACM Trans Comput Hum Interact 12(3):401–434

    Article  Google Scholar 

  39. W3c workshop on the future of social networking. http://planb.nicecupoftea.org/2009/01/14/w3c-workshop-on-the-future-of-socia

  40. Zerfos P, Meng X, Wong SH, Samanta V, Lu S (2006) A study of short message service of a nationwide cellular network. In: IMC ’06: proceedings of the 6th ACM SIGCOMM conference on internet measurement. ACM NY, USA, pp 263–268

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to L. Becchetti.

Additional information

Partially supported by PRIN 2008 research project COGENT, funded by the Italian Ministry of University and Research.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Becchetti, L., Bergamini, L., Colesanti, U.M. et al. A lightweight privacy preserving SMS-based recommendation system for mobile users. Knowl Inf Syst 40, 49–77 (2014). https://doi.org/10.1007/s10115-013-0632-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10115-013-0632-z

Keywords

Navigation