Skip to main content
Log in

Two-hop privacy-preserving nearest friend searches

  • Regular Paper
  • Published:
Knowledge and Information Systems Aims and scope Submit manuscript

Abstract

Nowadays, social networks are a part of everyday life. Almost everyone possessing a computing device, even a mobile one, such as a smartphone or tablet, has access to these networks. Interacting with them often requires sharing information both with the other users of the social network and with the social network itself. One of the cases that information has to be exchanged is by using services such as Facebook’s “Nearby Friends,” where a user has to share her location in order to locate her nearby friends, an action that undermines the user’s privacy. Current privacy preservation mechanisms only consider range nearest neighbor queries for nearest friend searches, limiting private friend discovery within a user’s predefined range. In this paper, we take private friend searches a step further, by presenting Two-Hop Privacy, a novel method for discovering a user’s nearest friends within arbitrary distance, not being constrained by range boundaries, in sublinear time, preserving, at the same time, the location privacy of all involved users. This is achieved by exploiting positional information of publicly available datasets of points of interest together with a randomized selection algorithm. Two-Hop Privacy is fast, requiring less than 9 ms to locate the 64 nearest neighbors between 5000 interconnected users, and capable of achieving accuracy up to 100%.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Notes

  1. http://www.bbc.com/news/topics/c81zyn0888lt/facebook-cambridge-analytica-data-scandal.

  2. Implementation and dataset available at https://www.cs.ucy.ac.cy/~akarak02/twohop/.

  3. Available at https://github.com/kpatsakis/Factoring_based_PET.

  4. Available at https://www.openstreetmap.org.

  5. Available at http://toblerity.org/rtree/index.html.

References

  1. Andrés ME, Bordenabe NE, Chatzikokolakis K, Palamidessi C (2013) Geo-indistinguishability: differential privacy for location-based systems. In: ACM SIGSAC

  2. Choi Sunoh, Ghinita Gabriel, Bertino Elisa (2014) Secure mutual proximity zone enclosure evaluation. In: ACM SIGSPATIAL

  3. Chow C-Y (2008) Cloaking algorithms. In: Encyclopedia of GIS, pp 92–92

  4. Chow C-Y, Mokbel MF, Liu X (2011) Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. Geoinformatica 15(2):351–380

    Article  Google Scholar 

  5. Dunbar RIM (2016) Do online social media cut through the constraints that limit the size of offline social networks? Open Sci 3(1):150292

    MathSciNet  Google Scholar 

  6. Ghinita G, Kalnis P, Kantarcioglu M, Bertino E (2011) Approximate and exact hybrid algorithms for private nearest-neighbor queries with database protection. Geoinformatica 15(4):699–726

    Article  Google Scholar 

  7. Ghinita G, Kalnis P, Shgozaran A, Shahabi C, Tan K-L (2008) Private queries in location based services: anonymizers are not necessary. In: ACM SIGMOD

  8. Hoh B, Gruteser M, Xiong H, Alrabady A (2007) Preserving privacy in GPS traces via uncertainty-aware path cloaking. In: Proceedings of the 14th ACM conference on computer and communications security, CCS, ACM, pp 161–171

  9. Huang C, Lu R, Zhu H, Shao J, Alamer A, Lin X (2016) Eppd: efficient and privacy-preserving proximity testing with differential privacy techniques. In: IEEE ICC

  10. Karakasidis A, Verykios VS (2012) A sorted neighborhood approach to multidimensional privacy preserving blocking. In: IEEE ICDM workshops, pp 937–944

  11. Khoshgozaran A, Shahabi C (2007) Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: SSTD

  12. Kotzanikolaou P, Patsakis C, Magkos E, Korakakis M (2016) Lightweight private proximity testing for geospatial social networks. Comput Commun 73(PB):263–270

    Article  Google Scholar 

  13. Magkos E, Kotzanikolaou P, Magioladitis M, Sioutas S, Verykios VS (2014) Towards secure and practical location privacy through private equality testing. In: PSD

  14. Papadopoulos S, Bakiras S, Papadias D (2010) Nearest neighbor search with strong location privacy. Proc VLDB Endow 3(1–2):619–629

    Article  Google Scholar 

  15. Šikšnys L, Thomsen JR, Šaltenis S, Yiu ML (2010) Private and flexible proximity detection in mobile social networks. In: IEEE MDM

  16. Sun X, Wang H, Li J, Pei J (2011) Publishing anonymous survey rating data. Data Min Knowl Discov 23(3):379–406

    Article  MathSciNet  MATH  Google Scholar 

  17. Ye A, Chen Q, Xu L, Wu W (2016) The flexible and privacy-preserving proximity detection in mobile social network. Future Gener Comput Syst

  18. Yiu ML, Jensen CS, Huang X, Lu H (2008) Spacetwist: managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: IEEE ICDE

Download references

Acknowledgements

We thank anonymous reviewers for their very useful comments and suggestions. This work was done while Alexandros Karakasidis was performing research in University of Cyprus. This work was funded by the iSocial EU Marie Curie ITN project (FP7-PEOPLE-2012-ITN).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alexandros Karakasidis.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Karakasidis, A., Pallis, G. & Dikaiakos, M.D. Two-hop privacy-preserving nearest friend searches. Knowl Inf Syst 61, 85–105 (2019). https://doi.org/10.1007/s10115-018-1313-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10115-018-1313-8

Keywords

Navigation