Skip to main content

A Randomized Approach for Structural and Message Based Private Friend Recommendation in Online Social Networks

Part of the Lecture Notes in Social Networks book series (LNSN)

Abstract

The emerging growth of online social networks have opened new doors for various business applications such as promoting a new product across its customers. Besides this, friend recommendation is an important tool for recommending potential candidates as friends to users in order to enhance the development of the entire network structure. Existing friend recommendation methods utilize social network structure and/or user profile information. However, these techniques can no longer be applicable if the privacy of users is taken into consideration. In this chapter, we first propose a two-phase private friend recommendation protocol for recommending friends to a given target user based on the network structure as well as utilizing the real message interaction between users. Our protocol computes the recommendation scores of all users who are within a radius of h from the target user in a privacy-preserving manner. We then address some implementation details and point out an inherent security issue in the current online social networks due to the message flow information. To mitigate this issue or to provide better security, we propose an extended version of the proposed protocol using randomization technique. In addition, we show the practical applicability of our approach through empirical analysis based on different parameters.

Keywords

  • Friend Recommendation
  • Current Online Social Networks
  • Recommendation Score
  • Inherent Security Issues
  • Entire Network Structure

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-319-05912-9_1
  • Chapter length: 34 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   89.00
Price excludes VAT (USA)
  • ISBN: 978-3-319-05912-9
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   119.00
Price excludes VAT (USA)
Hardcover Book
USD   119.99
Price excludes VAT (USA)
Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Notes

  1. 1.

    Note that \(h\) should always be greater than 1. Because, when \(h =1\), we have \(l=1\) which implies potential candidates who are 1-hop away from \(A\) who are already friends of \(A\).

References

  1. Agrawal R, Srikant R (2000) Privacy preserving data mining. ACM SIGMOD 29:439–450

    CrossRef  Google Scholar 

  2. Baden R, Bender A, Spring N, Bhattacharjee B, Starin D (2009) Persona: an online social network with user-defined privacy. ACM SIGCOMM Comput Commun Rev 39(4):135–146

    CrossRef  Google Scholar 

  3. Bonchi F, Castillo C, Gionis A, Jaimes A (2011) Social network analysis and mining for business applications. ACM Trans Intell Syst Technol 2:22:1–22:37

    Google Scholar 

  4. Boyd D, Ellison NB (2008) Social network sites: definition, history, and scholarship. J Comput-Mediated Commun 13(1):210–230

    Google Scholar 

  5. Chen J, Geyer W, Dugan C, Muller M, Guy I (2009) Make new friends, but keep the old: recommending people on social networking sites. In: Proceedings of the 27th international conference on Human factors in computing systems, pp 201–210

    Google Scholar 

  6. Clarkson MR, Chong S, Myers A (2008) Civitas: toward a secure voting system. In: IEEE symposium on security and privacy, pp 354–368, May 2008

    Google Scholar 

  7. Cristofaro ED, Soriente C, Tsudik G, Williams A (2012) Hummingbird: privacy at the time of twitter. In: IEEE symposium on security and privacy, pp 285–299

    Google Scholar 

  8. Cutillo LA, Molva R, Onen M (2011) Analysis of privacy in online social networks from the graph theory perspective. In: Proceedings of the global telecommunications conference (GLOBECOM 2011). IEEE, Houston, Texas, USA, pp 1–5, Dec 2011

    Google Scholar 

  9. Dai B-R, Lee C-Y, Chung C-H (2011) A framework of recommendation system based on both network structure and messages. In: International conference on advances in social networks analysis and mining (ASONAM’ 11), pp 709–714, July 2011

    Google Scholar 

  10. Delgado J, Rodríguez E, Llorente S (2010) User’s privacy in applications provided through social networks. In: Proceedings of second ACM SIGMM workshop on social, media, pp 39–44

    Google Scholar 

  11. Dong W, Dave V, Qiu L, Zhang Y (2011) Secure friend discovery in mobile social networks. In: Proceedings of IEEE INFOCOM, pp 1647–1655, Apr 2011

    Google Scholar 

  12. Dwork C (2006) Differential privacy. In: ICALP, Lecture Notes in Computer Science, Springer, pp 1–12

    Google Scholar 

  13. Dwork C (2008) Differential privacy: a survey of results. In: Proceedings of the 5th international conference on theory and applications of models of computation, TAMC’08. Springer-Verlag, Berlin, Heidelberg, pp 1–19

    Google Scholar 

  14. Feldman AJ, Blankstein A, Freedman MJ, Felten EW (2012) Social networking with frientegrity: privacy and integrity with an untrusted provider. In: Proceedings of the 21st USENIX conference on security symposium, Security’12. Berkeley, CA, USA, pp 31–31. USENIX Association

    Google Scholar 

  15. Fontaine C, Galand F (2007) A survey of homomorphic encryption for nonspecialists. EURASIP J Inf Secur 2007:15:1–15:15

    Google Scholar 

  16. Gao H, Hu J, Huang T, Wang J, Chen Y (2011) Security issues in online social networks. IEEE Internet Comput 15(4):56–63

    CrossRef  Google Scholar 

  17. Goldreich O (2004) The foundations of cryptography, vol 2. In: General Cryptographic Protocols. Cambridge University Press, Cambridge

    Google Scholar 

  18. Goldreich O (2004) The foundations of cryptography, vol 2. In: Encryption Schemes. Cambridge University Press, Cambridge

    Google Scholar 

  19. Goldwasser S, Micali S, Rackoff C (1989) The knowledge complexity of interactive proof systems. SIAM J Comput 18:186–208

    CrossRef  MATH  MathSciNet  Google Scholar 

  20. Gou L, You F, Guo J, Wu L, Zhang XL (2011) Sfviz: interest-based friends exploration and recommendation in social networks. In: Proceedings of visual information communication-international symposium (VINCI ’11), ACM, pp 1–10

    Google Scholar 

  21. Krishnamurthy B, Wills CE (2010) On the leakage of personally identifiable information via online social networks. SIGCOMM Comput Commun Rev 40(1):112–117

    CrossRef  Google Scholar 

  22. Kumar R, Novak J, Tomkins A (2006) Structure and evolution of online social networks. In: The 12th ACM SIGKDD international conference on Knowledge discovery and data mining, pp 611–617

    Google Scholar 

  23. Liben-Nowell D, Kleinberg J (2007) The link-prediction problem for social networks. J Am Soc Inf Sci Technol 58:1019–1031

    CrossRef  Google Scholar 

  24. Lindell Y, Pinkas B (2002) Privacy preserving data mining. J Cryptol 15:177–206

    CrossRef  MATH  MathSciNet  Google Scholar 

  25. Lo S, Lin C (2006) Wmr-a graph-based algorithm for friend recommendation. In: Proceedings of the 2006 IEEE/WIC/ACM international conference on web intelligence (WI ’06), IEEE Computer Society, pp 121–128

    Google Scholar 

  26. Lucas MM, Borisov N (2008) Flybynight: mitigating the privacy risks of social networking. In: Proceedings of the 7th ACM workshop on privacy in the electronic society, WPES ’08. ACM, New York, NY, USA, pp 1–8

    Google Scholar 

  27. Machanavajjhala A, Korolova A, Sarma AD (2011) Personalized social recommendations: accurate or private. Proc VLDB Endowment 4:440–450

    Google Scholar 

  28. Milgram S (1967) The small world problem. Psychol Today 2:60–67

    Google Scholar 

  29. Mislove A, Marcon M, Gummadi KP, Druschel P, Bhattacharjee B (2007) Measurement and analysis of online social networks. In: Proceedings of the 7th ACM SIGCOMM conference on internet measurement (IMC ’07), pp 29–42

    Google Scholar 

  30. Naruchitparames J, Giine M, Louis S (2011) Friend recommendations in social networks using genetic algorithms and network topology. In: IEEE congress on evolutionary computation (CEC), pp 2207–2214, June 2011

    Google Scholar 

  31. NIST. Advanced encryption standard. Technical Report NIST Special Publication FIPS-197, National Institute of Standards and Technology, 2001

    Google Scholar 

  32. Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of the 17th international conference on theory and application of cryptographic techniques, Springer-Verlag, pp 223–238

    Google Scholar 

  33. Rivest RL, Adleman L, Dertouzos ML (1978) On data banks and privacy homomorphisms. In: Foundation of secure computations, Academic Press, pp 169–177

    Google Scholar 

  34. Silva N, Tsang I-R, Cavalcanti G, Tsang I-J (2010) A graph-based friend recommendation system using genetic algorithm. In: IEEE congress on evolutionary computation (CEC), pp 1–7, July 2010

    Google Scholar 

  35. Srivastava J, Ahmad MA, Pathak N, Hsu DKW (2008) Data mining based social network analysis from online behavior. In: Tutorial at the 8th SIAM international conference on data mining (SDM’ 08)

    Google Scholar 

  36. Sun J, Zhu X, Fang Y (2010) A privacy-preserving scheme for online social networks with efficient revocation. In: Proceedings of the 29th conference on information communications, INFOCOM’10. IEEE Press, Piscataway, NJ, USA, pp 2516–2524

    Google Scholar 

  37. Tootoonchian A, Saroiu S, Ganjali Y, Wolman A (2009) Lockr: better privacy for social networks. In: Proceedings of the 5th international conference on emerging networking experiments and technologies, CoNEXT ’09. ACM, New York, NY, USA, pp 169–180

    Google Scholar 

  38. Wasserman S, Faust K (1994) Social network analysis: methods and applications. Cambridge University Press, Cambridge

    CrossRef  Google Scholar 

  39. Xie X (2010) Potential friend recommendation in online social network. In: IEEE/ACM international conference on cyber, physical and social computing (CPSCom), pp 831–835, Dec 2010

    Google Scholar 

  40. Yang Y, Lutes J, Li F, Luo B, Liu P (2012) Stalking online: on user privacy in social networks. In: Proceedings of the second ACM conference on data and application security and privacy (CODASPY ’12), ACM, pp 37–48

    Google Scholar 

  41. Yao AC (1982) Protocols for secure computations. In: Proceedings of the 23rd annual symposium on foundations of computer science, IEEE Computer Society, pp 160–164

    Google Scholar 

  42. Yao AC (1986) How to generate and exchange secrets. In: Proceedings of the 27th symposium on foundations of computer science, IEEE Computer Society, pp 162–167

    Google Scholar 

Download references

Acknowledgments

This material is based upon work supported by the Office of Naval Research under Award No. N000141110256 and NSF under award No. CNS-1011984.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bharath K. Samanthula .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Samanthula, B.K., Jiang, W. (2014). A Randomized Approach for Structural and Message Based Private Friend Recommendation in Online Social Networks. In: Can, F., Özyer, T., Polat, F. (eds) State of the Art Applications of Social Network Analysis. Lecture Notes in Social Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-05912-9_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-05912-9_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-05911-2

  • Online ISBN: 978-3-319-05912-9

  • eBook Packages: Computer ScienceComputer Science (R0)