How far removed are you? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL Marcin Nagy joint work with Thanh Bui, Emiliano De.

Slides:



Advertisements
Similar presentations
An Overview of Peer-to-Peer Sami Rollins
Advertisements

© 2013 Marcin Nagy & N. Asokan & Jörg Ott 1 PeerShare: A System for Secure Distribution of Sensitive Data among Social Contacts Marcin Nagy, N. Asokan,
1 Do I Know You? Efficient, Privacy-Preserving Protocols for Finding Common Friends Marcin Nagy, Aalto University (joint work with Emiliano De Cristofaro,
Peer-to-Peer Systems Chapter 25. What is Peer-to-Peer (P2P)? Napster? Gnutella? Most people think of P2P as music sharing.
Fabián E. Bustamante, 2007 Meridian: A lightweight network location service without virtual coordinates B. Wong, A. Slivkins and E. Gün Sirer SIGCOM 2005.
Identity Theft Protection in Structured Overlays Lakshmi Ganesh Ben Y. Zhao University of California, Santa Barbara NPSec 2005.
Practical Recommendations on Crawling Online Social Networks
Authors Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman Presented by: Jonathan di Costanzo & Muhammad Atif Qureshi 1.
1 An Overview of Gnutella. 2 History The Gnutella network is a fully distributed alternative to the centralized Napster. Initial popularity of the network.
1 Walking on a Graph with a Magnifying Glass Stratified Sampling via Weighted Random Walks Maciej Kurant Minas Gjoka, Carter T. Butts, Athina Markopoulou.
An Overview of Peer-to-Peer Networking CPSC 441 (with thanks to Sami Rollins, UCSB)
Slide 1 Many slides from Vitaly Shmatikov, UT Austin Public-Key Infrastructure CNS F2006.
Named Data Networking for Social Network Content delivery P. Truong, B. Mathieu (Orange Labs), K. Satzke (Alu) E. Stephan (Orange Labs) draft-truong-icnrg-ndn-osn-00.txt.
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
APPLAUS: A Privacy-Preserving Location Proof Updating System for Location-based Services Zhichao Zhu and Guohong Cao Department of Computer Science and.
Scalable Network Distance Browsing in Spatial Database Samet, H., Sankaranarayanan, J., and Alborzi H. Proceedings of the 2008 ACM SIGMOD international.
Minas Gjoka, UC IrvineWalking in Facebook 1 Walking in Facebook: A Case Study of Unbiased Sampling of OSNs Minas Gjoka, Maciej Kurant ‡, Carter Butts,
Abstract Shortest distance query is a fundamental operation in large-scale networks. Many existing methods in the literature take a landmark embedding.
Wide-area cooperative storage with CFS
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
A Social Help Engine for Online Social Network Mobile Users Tam Vu, Akash Baid WINLAB, Rutgers University May 21,
Computer Science Public Key Management Lecture 5.
Security Protocols in Automation Dwaine Clarke MIT Laboratory for Computer Science January 8, 2002 With help from: Matt Burnside, Todd.
Distributed Data Stores – Facebook Presented by Ben Gooding University of Arkansas – April 21, 2015.
Roger ZimmermannCOMPSAC 2004, September 30 Spatial Data Query Support in Peer-to-Peer Systems Roger Zimmermann, Wei-Shinn Ku, and Haojun Wang Computer.
Multigraph Sampling of Online Social Networks Minas Gjoka, Carter Butts, Maciej Kurant, Athina Markopoulou 1Multigraph sampling.
1 Link-Trace Sampling for Social Networks: Advances and Applications Maciej Kurant (UC Irvine) Join work with: Minas Gjoka (UC Irvine), Athina Markopoulou.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
ECE454/599 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2012.
PIC: Practical Internet Coordinates for Distance Estimation Manuel Costa joint work with Miguel Castro, Ant Rowstron, Peter Key Microsoft Research Cambridge.
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
Suggesting Friends using the Implicit Social Graph Maayan Roth et al. (Google, Inc., Israel R&D Center) KDD’10 Hyewon Lim 1 Oct 2014.
Research Interests Georgia Koloniari Computer Science Department University of Ioannina, Greece.
Data Analysis in YouTube. Introduction Social network + a video sharing media – Potential environment to propagate an influence. Friendship network and.
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
WALKING IN FACEBOOK: A CASE STUDY OF UNBIASED SAMPLING OF OSNS junction.
Understanding Cross-site Linking in Online Social Networks Yang Chen 1, Chenfan Zhuang 2, Qiang Cao 1, Pan Hui 3 1 Duke University 2 Tsinghua University.
Network Characterization via Random Walks B. Ribeiro, D. Towsley UMass-Amherst.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presenter: Chris Grier ECE 598nb Spring 2006.
Privacy-Aware Personalization for Mobile Advertising
Content-Based Music Information Retrieval in Wireless Ad-hoc Networks.
June 21, 2007 Minimum Interference Channel Assignment in Multi-Radio Wireless Mesh Networks Anand Prabhu Subramanian, Himanshu Gupta.
1 Efficient Search Ranking in Social Network ACM CIKM2007 Monique V. Vieira, Bruno M. Fonseca, Rodrigo Damazio, Paulo B. Golgher, Davi de Castro Reis,
SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG.
COM1721: Freshman Honors Seminar A Random Walk Through Computing Lecture 2: Structure of the Web October 1, 2002.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Peer Pressure: Distributed Recovery in Gnutella Pedram Keyani Brian Larson Muthukumar Senthil Computer Science Department Stanford University.
Personalized Social Recommendations – Accurate or Private? A. Machanavajjhala (Yahoo!), with A. Korolova (Stanford), A. Das Sarma (Google) 1.
The new protocol of freenet Taken from Ian Clarke and Oskar Sandberg (The Freenet Project)
Multiuser Receiver Aware Multicast in CDMA-based Multihop Wireless Ad-hoc Networks Parmesh Ramanathan Department of ECE University of Wisconsin-Madison.
Scalability of Geopriv LS GLI Project Toshiharu Kurisu Yasuhito Watanabe
SybilGuard: Defending Against Sybil Attacks via Social Networks.
Stefanos Antaris A Socio-Aware Decentralized Topology Construction Protocol Stefanos Antaris *, Despina Stasi *, Mikael Högqvist † George Pallis *, Marios.
Gerhard Haßlinger Search Methods in Dynamic Wireless Networks  Challenges for search in wireless networks  Random walks and flooding for search with.
Bloom Cookies: Web Search Personalization without User Tracking Authors: Nitesh Mor, Oriana Riva, Suman Nath, and John Kubiatowicz Presented by Ben Summers.
Location Privacy Protection for Location-based Services CS587x Lecture Department of Computer Science Iowa State University.
Stefanos Antaris Distributed Publish/Subscribe Notification System for Online Social Networks Stefanos Antaris *, Sarunas Girdzijauskas † George Pallis.
Large Scale Sharing Marco F. Duarte COMP 520: Distributed Systems September 19, 2004.
Privacy Preserving Outlier Detection using Locality Sensitive Hashing
GRAPH AND LINK MINING 1. Graphs - Basics 2 Undirected Graphs Undirected Graph: The edges are undirected pairs – they can be traversed in any direction.
Geographic Routing without Location Information. Assumption by Geographic Routing Each node knows its own location.  outdoor positioning device: GPS:
Presented by Edith Ngai MPhil Term 3 Presentation
Lecture 18: Uniformity Testing Monotonicity Testing
Department of Computer Science
OneSwarm: Privacy Preserving P2P
You Lu, Zhiyang Wang, Yu-Ting Yu, Mario Gerla
Department of Computer Science University of York
Presentation transcript:

How far removed are you? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL Marcin Nagy joint work with Thanh Bui, Emiliano De Cristofaro, N. Asokan, Jörg Ott, Ahmad-Reza Sadeghi

2 Problem statement How can you find your social graph “distance” to someone (nearby)? … in a privacy-preserving way John BobCarolThomasSteve

3 Applications  Intuitive means for specifying access control  Ride sharing  Tethering Internet access ...  Information  Friend radar  Routing in “dense” ad-hoc environment  Place familiarity estimation

4 Nagy et al (ACSAC 2013) How can you find if you have common friends with someone (nearby)? … in a privacy-preserving way John BobCarolThomas Steve

5 Requirements  privacy:  no more info. to participants than about common friends  no additional info. to anybody else (e.g., “trusted server”)  authenticity:  no false claims of friendship  efficiency:  applicable for mobile usage  minimize expensive crypto operations

6 Current approach: Using a trusted server  FourSquare, Tencent, … UserLocation Alice(x,y) Bob(x,y)... Any friends nearby? “Alice” Privacy  Authenticity  Efficiency  AliceBob

7 Alternative: Private Set Intersection Protocols PSI Input set S I IR Input set S R S I  S R PSI-CA Input set S I IR Input set S R |S I  S R | Secure in the honest-but-curious model O(|S I |+|S R |) modular exponentiations [De Cristofaro et al, FC’10, Asiacrypt ’10, CANS’12]FC’10Asiacrypt ’10CANS’12 Initiator Responder Privacy? Authenticity  Efficiency 

8 Our approach Bootstrap from popular online social networks –user authentication, social graph But don’t cede more information to them

9 Finding Common Friends using PSI with capabilities 1. Distribute (short-lived) bearer capability to friends 2. Private Set Intersection on capability sets to find common friends UserCapability Carol Tom... Privacy  Authenticity  Efficiency  Social Network App Server “Common Friends”: Nagy et al, ACSAC 2013 Bloom Filter based PSI PSI Privacy  Authenticity  Efficiency 

10 Going from Common Friends to “graph” distances Two challenges: Bootstrapping is a problem Going beyond social paths of length 2

11 Bootstrapping the system BFPSI Only participating users upload capabilities Friend ID John Carol Friend ID John The system can only find common friends who are participating in the system AliceBob

12 Fixing bootstrapping: Ersatz nodes Assumption: 1.App server may query Social Network for list of friends of a participating user Have App server create replacements for missing users 1.Identify friends of participating users 2.Create/maintain capabilities for those missing Ersatz node = Social Network identity + server generated capability

13 Fixing bootstrapping: Ersatz nodes App Server Social Network UserCapability Carol Bob (Bob, ) Friends(Bob) = {Carol, John} (1)Bob uploads capability (2) Server retrieves Bob’s friends (3) Server generates ersatz nodes for missing users (Carol, ) (John, ) (4) Bob downloads capabilities Bob John

14 Fixing bootstrapping: Ersatz nodes Friend ID Carol John Friend ID John BF-PSI App Server UserCapability Carol John Bob Alice With ersatz nodes all common friends are always discovered AliceBob

15 Beyond paths of length 2: Social Path Length minimum number of hops in social graph between two users Social PaL application calculating social path length between two users

16 Additional requirements  Privacy:  Two users can’t learn more than by gathering information using standard social network interfaces available to them  Functional:  Maximize number of paths discovered between two users  Determine exact path length between two users

17 Capabilities as path length proofs Intuition: 1.Capability distributed to friends used as friendship proof 2.Use hash chains to generate higher order capabilities From capability c generate i th order capability: 1.Distribute c i to contacts i+1 hops away 2.Recipient includes c i, c i+1, …, c n in input to PSI i+1

18 Social PaL graph building Social PaL only learns friend lists of actual users –users explicitly authorize Social PaL

19 Social PaL capability distribution App Server Bob Carol John: Anon: 1.Friends’ capabilities returned with identities 2.Higher order capabilities returned w/o identities John BobAliceCarolThomasSteve

20 Social PaL path length discovery Friend ID Carol Anon John Friend ID Thomas Anon John BobAliceCarolThomasSteve Friend ID Alice Steve Anon Friend ID Carol Anon John = = = 4 Bloom Filter based PSI D(Bob, Thomas)=3 BobThomas Bloom Filter based PSI Bob Alice = D(Bob, Alice)=4

21 Dataset for estimating coverage Social Filter dataset –By Sirivanos et al –Derived from dataset by Gjoka et al (UC Irvine) – users; 30 connections on average –sampling did not preserve node degree Metropolis Hastings Random Walk (MHRW) dataset – “sampled users”, 175 connections on average –72.2 million “outside users” –among sampled users: 3 connections on average Breadth First Search (BFS) dataset –Sampled using breadth-first search –2.2 million sampled users, 310 connections on average –93.8 million “outside users” –among sampled users: 53 connections on average

22 Coverage: Social Filter dataset

23 Coverage: MHRW dataset (random walk) X-axis shows fraction of sampled users Sampled users: Outside users: 72.2 million

24 Coverage: Breadth-first search dataset X-axis shows fraction of sampled users Sampled users: 2,2 million Total users: 93,8 million

25 Coverage analysis summary Use of ersatz nodes significantly increases coverage –Always 100 % coverage for 2-hop paths (detects all) –Only 20% users with Social PaL: coverage > 40% –80% users with Social PaL: coverage > 80%, always Coverage is better in datasets with higher connectivity –BFS dataset ~ Social Network in regions with high penetration 4-hop paths more readily discovered than 3-hop paths!

26 System architecture OSN servers Mobile users Internet SoPaL server

27 Example App: nearbyPeople nearbyPeople Marcin Nagy

28 Example App: SpotShare SpotShare (Google Play)

29 Summary Privacy-preserving, scalable protocols for finding –common friends –lengths of social paths Used in two applications (available for download) –Easy-to-use tethering (“SpotShare”) –Friend radar (“nearbyPeople”) Source code available for research use More info at

30 Social PaL server architecture

31 Social PaL client architecture

32 Simulation for estimating coverage 1.Test set: randomly choose x% of “sampled users” –x = 20, 40, 60, 80 (represents fraction using Social Pal) 2.Pick 50k pairs randomly from “test set” w/ k-hop path –k = 2, 3, 4 3.Compute fraction for which Social PaL discovers path Repeat steps 1-3 ten times; average results

33 Simulation for estimating coverage 1.Test set: randomly choose x% of users –x = 20, 40, 60, 80 (represents fraction using Social Pal) 2.Pick 50k pairs randomly from “test set” w/ k-hop path –k = 2, 3, 4 3.Compute fraction for which Social PaL discovers path Repeat steps 1-3 ten times; average results