Message in a Sealed Bottle: Privacy Preserving Friending in Social

Total Page:16

File Type:pdf, Size:1020Kb

Message in a Sealed Bottle: Privacy Preserving Friending in Social Message in a Sealed Bottle: Privacy Preserving Friending in Social Networks Lan Zhang∗, Xiang-Yang Li,y, Yunhao Liu,∗z ∗ Department of Computer Science and Technology, School of Software, TNList, Tsinghua University y Department of Computer Science, Illinois Institute of Technology z Department of Computer Science and Engineering, HKUST Abstract—Many proximity-based mobile social networks are profiles to facilitate friending between proximate strangers and developed to facilitate connections between any two people, or to enable privacy preserving people searching to some extent. help a user to find people with a matched profile within a certain Observe that in practice the mobile Internet connection may distance. A challenging task in these applications is to protect the privacy of the participants’ profiles and personal interests. not always be available and it may incur high expense. Thus, in In this paper, we design novel mechanisms, when given a this work we focus on proximity-based decentralized mobile preference-profile submitted by a user, that search persons social networks (MSN) based on short-range wireless tech- with matching-profile in decentralized multi-hop mobile social nologies such as WiFi and Bluetooth. However the increasing networks. Our mechanisms also establish a secure communication privacy concern becomes a barrier for adopting MSN. People channel between the initiator and matching users at the time are unwilling to disclose personal profiles to arbitrary persons when the matching user is found. Our rigorous analysis shows that our mechanism is privacy-preserving (no participants’ pro- in physical proximity before deciding to interact with them. file and the submitted preference-profile are exposed), verifiable The insecure wireless communication channel and potentially (both the initiator and the unmatched user cannot cheat each untrusted service provider increase the risk of revealing private other to pretend to be matched), and efficient in both communi- information. cation and computation. Extensive evaluations using real social Friending based on private profile matching allows two network data, and actual system implementation on smart phones show that our mechanisms are significantly more efficient than users to match their personal profiles without disclosing them existing solutions. to each other. There are two mainstreams of approaches Index Terms—Private Profile Matching, Secure Communica- to solve this problem. The first category provides private tion, Decentralized Mobile Social Networks. attributes matching based on private set intersection (PSI) and private cardinality of set intersection (PCSI), [12], [20]. I. INTRODUCTION The second category measures the social proximity by private vector dot product [7], [9], [25]. They rely on public-key A boom in mobile hand-held devices greatly enriches the so- cryptosystem and homomorphic encryption, which results in cial networking applications. Many social networking services expensive computation cost and usually requires a trusted third are available on mobile phones (e.g., JuiceCaster, MocoSpace party. Multiple rounds of interactions are required to perform and WiFace [23]) and majority of them are location-aware the presetting (e.g. exchange public keys) and private match- (e.g., FourSquare, BrightKite and Loopt). However, most of ing between each pair of users. Moreover, most protocols them are designed for facilitating people connections based are unverifiable: there lack efficient methods to verify the on their real life social relationship [15], [19]. There is an result. Furthermore, in these approaches, matched users and increasing difficulty of befriending new people or commu- unmatched users all get involved in the expensive computation nicating with strangers while protecting the privacy of real and learn their matching results (e.g. profile intersection) with personal information. the initiator. These limitations hinder the adoption of the SMC- Friending and communication are two important basic func- related private matching methods in MSN. tions of social networks. When people join social networks, A secure communication channel is equally important in they usually begin by creating a profile, then interact with other MSN. Although the matching process is private, the following users. Profile matching is a common and helpful way to make chatting may still be disclosed to the adversary and more new friends with common interests or to search for experts privacy may be leaked. Most protocols assume that there is [22]. Some applications help a user automatically find users a secure communication channel established by using public- with similar profile within a certain distance. For example, in key cryptosystem. This involves a trusted third party and key the social network Color, people in close proximity (within management, which is difficult to manage in decentralized 50 meters) can share photos automatically based on their MSN. similarity. MagnetU [1] matches one with nearby people for Facing these challenges, we first formally define the privacy dating, friend-making. Small-talks [21] connects proximate preserving verifiable profile matching problem in decentralized users based on common interests. These applications use MSN (Section II). We then propose several protocols (Section III) to address the privacy preserving profile matching and participants, protecting their profiles is necessary and can secure communication channel establishment in decentralized reduce the barrier to participate in MSN. Note that, the social networks without any presetting or trusted third party. exact location information is also a part of the user’s We take advantage of the common attributes between matching profile privacy. users, and use it to encrypt a message with a secret channel 2) Communication Security: The messages between a key in it. In our mechanisms, only a matching user can decrypt pair of users should be transmitted through a secure the message. A privacy-preserving profile matching and secure communication channel. We emphasize that the secure channel construction are completed simultaneously with one communication channel establishment has been ignored round communication. The secure channel construction resists in most previous works which address the private profile the Man-in-the-Middle attack. Both precise and fuzzy match- matching in decentralized MSN. In practice, after profile ing/search in a flexible form are supported. The initiator can matching, more privacy, even profile information, may be define a similarity threshold, the participant whose similarity exposed via communication through an insecure channel. is below the threshold learns nothing. A sequence of well- In this paper, we address the verifiable privacy preserving designed schemes make our protocols practical, flexible and profile matching and secure communication channel estab- lightweight, e.g., a remainder vector is designed to signifi- lishment in decentralized MSN without any presetting or cantly reduce the computation and communication overhead trusted third party. Formally, each user vk in a social network of unmatched users. Our profile matching mechanisms are has a profile set Ak consisting of mk attributes, Ak = also verifiable which thwart cheating about matching result. fa1 ; a2 ; :::; amk g. The number of attributes is not necessary We also design a mechanism for location privacy preserved k k k the same for different users. An initiator vi represents his/her vicinity search based on our basic scheme. Compared to desired user by a request profile with mt attributes as At = most existing works (Section VI) relying on the asymmetric f 1 2 mt g at ; at ; :::; at . Our mechanism allows the initiator to search cryptosystem and trusted third party, our protocols require no a matching user in a flexible way by constructing the request presetting and much less computation. To the best of our profile in the form of At = (Nt;Ot). Here knowledge, these are the first privacy-preserving verifiable • profile matching protocols based on symmetric cryptosystem. Nt consists of α necessary attributes. All of them are required to be owned by a matching user; We rigorously analyze the security and performance of • O consists of the rest m −α optional attributes. At least our mechanisms (Section IV). We then conduct extensive t t β of them should be owned by a matching user. evaluations on the performances of our mechanisms using large scale social network data, Tencent Weibo. Our results The acceptable similarity threshold of a matching user is θ = α+β . Let γ = mt − α − β. When γ = 0, a perfect match is (Section V) show that our mechanisms outperform existing mt solutions significantly. We also implement our protocols on required. A matching user vm with a profile Am must satisfy laptop and mobile phone and measure the computation and that communication cost in real systems. In our mobile-phone Nt ⊂ Am and jOt \ Amj > β: (1) implementation, a user only needs about 1.3ms to generate a friending request. On average, it only takes a non-candidate When At ⊂ Am, vm is a perfect matching user. In a user about 0.63ms and a candidate user 7ms to process this decentralized MSN, a request will be spread by relays until request. hitting a matching user or meeting a stop condition, e.g. expiration time. Then the initiator vi and the matching user II. SYSTEM MODEL AND PROBLEM DEFINITION vm decide whether to connect each other. A. System Model B. Adversary Model A user in a mobile ad hoc social networking system usually has
Recommended publications
  • The Notube Beancounter: Aggregating User Data for Television Programme Recommendation
    The NoTube BeanCounter: Aggregating User Data for Television Programme Recommendation Chris van Aart1, Lora Aroyo1, Dan Brickley13, Vicky Buser2, Libby Miller2, Michele Minno3, Michele Mostarda3, Davide Palmisano3, Yves Raimond2, Guus Schreiber1, and Ronald Siebes1 1 VU University Amsterdam, the Netherlands 2 BBC - Future Media & Technology, London, UK 3 Asemantics Srl, Rome Italy Abstract. In this paper we present our current experience of aggregat- ing user data from various Social Web applications and outline several key challenges in this area. The work is based on a concrete use case: reusing activity streams to determine a viewer's interests and generating television programme recommendations from these interests. Three sys- tem components are used to realise this goal: (1) an intelligent remote control: iZapper for capturing viewer activities in a cross-context televi- sion environment; (2) a backend: BeanCounter for aggregation of viewer activities from the iZapper and from different social web applications; and (3) a recommendation engine: iTube for recommending relevant tele- vision programmes . The focus of the paper is the BeanCounter as the first step to apply Social Web data for viewer and context modelling on the Web. This is work in progress of the NoTube project4. 1 Introduction: Television Meets the Social Web Television watching has always been a social activity, but as channels and deliv- ery mechanisms multiply, the enablers of social watching - simultaneous broad- cast times for everyone and limited choice - are decreasing[7]. There is a trend towards watching television or using television-related services[1] such as Elec- tronic Programme Guides (EPGs) on PC, handheld or other networked device.
    [Show full text]
  • Twitter – a Personal Perspective
    Twitter – a personal perspective Catriona Fisher Customer Services Manager University of Glasgow Library Email: catriona.fisher@glasgow. ac.uk twitter: @catrionafisher I joined Twitter in March 2009, but like most people I spent the first few months wondering what on earth this strange new world was all about. As a devoted user of Multiply, then Bebo and later Facebook, I was no stranger to social net- working, but Twitter was quite obviously some- thing different. I quickly realised the following: • you need your tweets to be public • the best way to get followers is to follow other people • hashtags are a must if you want your voice to be heard amongst the millions of tweets. I started out tweeting solely about work and had intended to have two accounts, one for work and a personal account (as I do with Facebook), but I quickly realised that many professionals on Twit- ter were tweeting about their work lives and their personal lives from the same account. This takes a bit of getting used to, but is very much the norm on Twitter. I now tweet from my own account @catrionafisher and also on behalf of the University of Glasgow Library @uofglibrary, along with a group of staff from Library Services. We’ve found Twitter to be a really powerful way of reaching out to students and other library users and it is now one of our primary channels of communication when we need to share informa- tion quickly. For example, we are using it to keep students up to date with any disruption during the work to re-clad the library building.
    [Show full text]
  • Linkedin Tax Administration Dialogue Via Social Media
    LinkedIn Tax Administration Dialogue via Social Media 2018 FTA Technology Conference Kansas City, Missouri August 2018 Clickwww.revenue.pa.gov to add footer text > Inform AGENDA • Social Media and Tax Administration • Topics and Highlights • Results/Lessons Learned…So Far • Discussion and Questions Clickwww.revenue.pa.gov to add footer text > Inform DISCLAIMER The Executive Office of the Pennsylvania Department of Revenue has been supportive and in many cases engaged in my activities in the LinkedIn community. However, the ideas and opinions expressed by me there are my own and not necessarily those of my employer. Clickwww.revenue.pa.gov to add footer text > Inform DIRECTION I am intentional about providing information and expressing my opinions on LinkedIn while accepting and encouraging the contributions of ideas and opinions of other tax administration professionals. This is the SaLT social media community I want, that I believe we need. To those of you who engage on LinkedIn regarding best practices for tax administration and collection, a very special thanks for this ongoing dialogue. For those of you who have not, please take this as my personal invitation to join us there. Clickwww.revenue.pa.gov to add footer text > Inform Social Media And Tax Administration Clickwww.revenue.pa.gov to add footer text > Inform SOCIAL MEDIA – TAX ADMINISTRATION • Why LinkedIn? Why now? • Customer/stakeholder segmentation • Characteristics of (my) SaLT online community • Branding • Benefits from the conversation Clickwww.revenue.pa.gov to add footer text > Inform SOCIAL MEDIA – TAX ADMINISTRATION Why LinkedIn? Why now? • A PRESENCE: we need to be on LinkedIn. • CONNECT. We are disconnected.
    [Show full text]
  • Social Networking for the SMB: an Offer You Can’T Refuse?
    now. Issue 8 Technology Spotlight Social networking For The SMB: An Offer You Can’t Refuse? With the unheralded arrival of the Facebook posse and Twitter mob into the back-alleys of traditional business marketing territory, Small- and Medium-Businesses (SMBs) can no longer ignore the lure of new business opportunities – or the accompanying challenges lurking within the shadows of the social networking underworld. PLAYING THE TECH ROULETTE Here we are in 2010. We are no longer in the slumps, with various components of the economy on the upward trajectory to help alleviate our wounds suffered during the recent downturn. Over the past quarters, SMBs have been held ransom by the same cost-cutting chains which threatened to rupture them further under the simultaneous strains of escalating competition. However, with economic rejuvenation now on the cards, “cautious optimism” is the secret code being whispered around along with a new willingness to spend, as excited SMB owners have their fingers ready on the trigger lest that opportune moment they’ve all been waiting for – finally arrives. However, all hell is not about to break loose, as the SMB owners have been biting on the recession bullet long enough to know the importance of maintaining a vigilant eye over their shoulders. As history has shown, the technology roulette is certainly not for the faint-hearted, as we have witnessed the quick demise of many a “next big things” as they failed to perform up to first impressions, before being relegated down the ranks to nothing but another famous four-letter word –“hype”.
    [Show full text]
  • Optimize Your Linkedin Profile
    Contents Introduction 3 The Basics 4 Name 4 URL 4 Photo 4 Background Photo 4 Headline 4 Location 5 Industry 5 Contact Information 5 Experience/Position Description 5 Publications 5 Summary 6 Additional Profile Sections 8 Skills 8 Education 8 Honors & Awards 8 Volunteer Experience & Causes 8 Connecting With Others 9 Connections 9 Groups 9 Status Updates 9 Find a Job 9 Staying Visible 9 Conclusion 10 2 Introduction You probably already know that LinkedIn is the single most powerful online platform for finding your next job. Yet, it comes with a caveat: since there are more than 394 million professionals who use the social network,1 you need to complete your LinkedIn profile (only 50% of people complete their LinkedIn profile according to LinkedIn’s only stats) AND you need to put your best foot forward with your digital brand so that you stand out, and in a good way. Most professionals know that they need to distinguish themselves from other potential hires. It should be easy – you’re a unique individual with a specific set of strengths, talents, and experience that inherently sets you apart from the sea of others, right? While that may be so, there’s no guarantee that hiring managers and other professionals from potential employers will notice these aspects of your profile – unless you present them in the right way. It goes without saying that we’re all short on time these days. So, your goal on LinkedIn is not just to make a powerful impression, but to do so as efficiently as possible so that executives, hiring managers, other recruiters, and any other potential connections will notice you right away.
    [Show full text]
  • Social Networking: a Guide to Strengthening Civil Society Through Social Media
    Social Networking: A Guide to Strengthening Civil Society Through Social Media DISCLAIMER: The author’s views expressed in this publication do not necessarily reflect the views of the United States Agency for International Development or the United States Government. Counterpart International would like to acknowledge and thank all who were involved in the creation of Social Networking: A Guide to Strengthening Civil Society through Social Media. This guide is a result of collaboration and input from a great team and group of advisors. Our deepest appreciation to Tina Yesayan, primary author of the guide; and Kulsoom Rizvi, who created a dynamic visual layout. Alex Sardar and Ray Short provided guidance and sound technical expertise, for which we’re grateful. The Civil Society and Media Team at the U.S. Agency for International Development (USAID) was the ideal partner in the process of co-creating this guide, which benefited immensely from that team’s insights and thoughtful contributions. The case studies in the annexes of this guide speak to the capacity and vision of the featured civil society organizations and their leaders, whose work and commitment is inspiring. This guide was produced with funding under the Global Civil Society Leader with Associates Award, a Cooperative Agreement funded by USAID for the implementation of civil society, media development and program design and learning activities around the world. Counterpart International’s mission is to partner with local organizations - formal and informal - to build inclusive, sustainable communities in which their people thrive. We hope this manual will be an essential tool for civil society organizations to more effectively and purposefully pursue their missions in service of their communities.
    [Show full text]
  • A Multicultural Undergraduate Research Project from a First-Year Seminar
    International Journal of Teaching and Learning in Higher Education 2017, Volume 29, Number 1, 162-176 http://www.isetl.org/ijtlhe/ ISSN 1812-9129 When Twitter Meets Advocacy: A Multicultural Undergraduate Research Project From a First-Year Seminar Sarah Maben and Lora Helvie-Mason Tarleton State University Two professors share how they combined Web 2.0, multicultural themes, and undergraduate research in a first-year seminar. The professors explain the “perfect storm” of a project in which undergraduate students collected and analyzed tweets from advocates for various multicultural causes to produce their first collegiate research project. Capitalizing on student interest in social networking, professors aimed to meet multiple student learning objectives and satisfy an overarching theme of multiculturalism for the first-year seminar at a university in the southwestern United States. Students analyzed Twitter handles for causes or individuals advocating for causes related to social, political, and humanitarian efforts. Using basic qualitative and quantitative approaches, students wrote undergraduate research papers and presented their findings about how their cause and advocates used Twitter. The article provides project and assessment rubrics, ideas for improvement, and tools for replication. As we consider the new face of activism in a communication. In 140 characters, anyone with a digital age and the impact of social media on college mobile device and Internet connectivity can microblog students, instructors of a first-year seminar course about topics ranging from individual musings, developed a project where students conducted research strategic messages for a company or organization, or on the use of Twitter as a channel for advocacy. news and information.
    [Show full text]
  • Social Bookmarking Report
    Social Bookmarking Report Order ID 567971 Timestamp Bookmark Count Bookmark 2012-05-09 01:57:12 1 http://ramona74r.livejournal.com/ 2012-05-09 01:57:12 2 http://www.plurk.com/ramona74r 2012-05-09 01:57:12 3 http://friendfeed.com/ramona74r 2012-05-09 01:57:12 4 http://www.folkd.com/user/ramona74r 2012-05-09 01:57:12 5 http://blinklist.com/users/ramona74r 2012-05-09 01:57:12 6 http://www.stumbleupon.com/stumbler/ramona74r/ 2012-05-09 01:57:12 7 http://www.reddit.com/user/ramona74r/ 2012-05-09 01:57:12 8 http://ramona74r.multiply.com/links 2012-05-09 01:57:12 9 http://ramona74r.posterous.com 2012-05-09 01:57:12 10 http://ramona74r.linkarena.com/ 2012-05-09 01:57:12 11 http://www.jeteye.com/user/ramona74r 2012-05-09 01:57:12 12 http://www.delicious.com/ramona74r 2012-05-09 01:57:12 13 http://www.kaboodle.com/ramona74r/things-i-love.html?v=LIST 2012-05-09 01:57:12 14 http://www.diigo.com/user/ramona74r 2012-05-09 01:57:12 15 http://www.oneview.com/user/ramona74r/ 2012-05-09 01:57:12 16 http://www.oneview.de/user/ramona74r/ 2012-05-09 01:57:12 17 http://www.weheartgossip.com/user/ramona74r 2012-05-09 01:57:12 18 http://www.quickieclick.com/member/index.php/ramona74r 2012-05-09 01:57:12 19 http://url.org/bookmarks/ramona74r 2012-05-09 01:57:12 20 http://www.startaid.com/user/ramona74r 2012-05-09 01:57:12 21 http://public.sitejot.com/ramona74r.html 2012-05-09 01:57:12 22 http://weblinkr.com/ramona74r 2012-05-09 01:57:12 23 http://linkagogo.com/go/Members/ramona74r/Home 2012-05-09 01:57:12 24 http://www.cxweb.de/bookmarks/ramona74r 2012-05-09
    [Show full text]
  • Enriching the Twitter Stream
    Enriching the Twitter Stream Increasing Data Mining Yield and Quality Using Machine Learning NASA/Goddard EARTH SCIENCES DATA and INFORMATION SERVICES CENTER (GES DISC) AGU December 2018 NH43B-2988 Arif Albayrak1,2, William Teng1,2, John Corcoran3, Sky C. Wang4, Daniel Maksumov5, Carlee Loeser1,2, and Long Pham1 1NASA Goddard Space Flight Center; 2ADNET Systems, Inc.; 3Cornell University; 4University of Michigan Ann Arbor; 5CUNY Queens College Emails: [email protected]; [email protected] A Paradigm Shift Classifying Tweet-linked Images (Corcoran) <ClassificationClassifying ofFacebook Facebook Posts Posts> (Maksumov (Maksumov) ) • Social media data streams, such as Twitter, are important sources of real-time Construct classifier to analyze images for precipitation-related information (e.g., is Construct classifiers to label posts on Facebook weather pages as precipitation and historical global information for science applications, e.g., augmenting there rain in the image? is it a forecast map?) related (e.g., is this post suggesting that it’s snowing right now?) validation programs of NASA science missions such as Global Precipitation A Transfer-Learning Approach Data Preprocessing: Cleaning Facebook Posts Measurement (GPM). • Deep learning models, particularly Convolutional Neural Networks (CNN), have • Determinant of output tweet quality from our tweet processing infrastructure is been shown to be very effective for large-scale image recognition and classification. the quality of the tweets retrieved from the Twitter stream. take look these • Because a large number of labeled images is required to develop CNN, doing so two graphics • Twitter provides a large source of citizen scientists for crowdsourcing. These from scratch would be very costly in compute and time resources.
    [Show full text]
  • Social Networking Service History
    Social Networking Service A social networking service is an online service, platform, or site that focuses on building and reflecting of social networks or social relations among people, who, for example, share interests and/or activities. A social network service essentially consists of a representation of each user (often a profile), his/her social links, and a variety of additional services. Most social network services are web based and provide means for users to interact over the Internet, such as e-mail and instant messaging. Online community services are sometimes considered as a social network service, though in a broader sense, social network service usually means an individual-centered service whereas online community services are group-centered. Social networking sites allow users to share ideas, activities, events, and interests within their individual networks. The main types of social networking services are those which contain category places (such as former school year or classmates), means to connect with friends (usually with self- description pages) and a recommendation system linked to trust. Popular methods now combine many of these, with Facebook and Twitter widely used worldwide, Nexopia (mostly in Canada); Bebo, VKontakte, Hi5, Hyves (mostly in The Netherlands), Draugiem.lv (mostly in Latvia), StudiVZ (mostly in Germany), iWiW (mostly in Hungary), Tuenti (mostly in Spain), Nasza-Klasa (mostly in Poland), Decayenne, Tagged, XING, Badoo and Skyrock in parts of Europe; Orkut and Hi5 in South America and Central America; and Mixi, Multiply, Orkut, Wretch, renren and Cyworld in Asia and the Pacific Islands and LinkedIn and Orkut are very popular in India.
    [Show full text]
  • Twitter External Brand Guidelines
    Twitter Brand Guidelines October 2020 2 Twitter Brand Guidelines Using the We’ve created this guide to help you use some of our core brand elements Twitter — our logo, #hashtag, and the @reply, and Tweets. It shouldn’t take long to brand read (we kept it short). Definitely check it out before you get started. Please note that this guide isn't exhaustive. Please reach out to [email protected] if what you are looking for isn't specifically covered here. 3 Twitter Brand Guidelines Our logo 4 Our logo The basics Our logo is our most recognizable asset. That’s why we love it, are protective of it and ask you to follow the rules when you use it. Here’s how: • Only show the logo in Twitter blue or white. You can use black for certain exceptions (please reach out to us for approval). • Don’t alter, rotate, or modify the logo. • Don’t animate the logo or make it talk, chirp, or fly. • Don’t use outdated versions of the logo. 5 Our logo Spacing Give our bird some room to breathe. • The empty space around the logo should be at least 150% 100% of the width of the logo. • Don’t go any smaller than 16 pixels wide. 150% 16px Logo clear space Logo minimum size 6 Our logo Color Remember, the Twitter logo is always either blue or white. • When placing the logo on an image, always use the white version. • For images with a light background, we sugest applying a 10-20% black tint to the entire image, so that the white logo is legible.
    [Show full text]
  • Prof. Jay S. Grossman General, Cosmetic & Implant Dentistry
    11980 San Vicente Boulevard Suite 507 Brentwood, California 90049 (310) 820 — 0123 | https://www.conciergedentistry.com/ Prof. Jay S. Grossman General, Cosmetic & Implant Dentistry AS OF 6/19 THERE WERE MORE THAN 197 WRITE UPS, ARTICLES WRITTEN BY DR. GROSSMAN, LECTURES GIVEN, TV/RADIO INTERVIEWS OR AWARDS RECEIVED BY DR. GROSSMAN. 2019 198. Airplane pockets, a travel essential with proceeds benefiting HNT 197. NYU Strusser Award for outstanding contributions in improving public health 196. The Shining World Compassion Award: https://www.youtube.com/watch?v=R_oz1gX4VR4 195. American Legion: Recognition as one of Los Angeles’s “100 most fascinating people” 194. Warning about the use of Triclosan in toothpaste: EIN Presswire 193. Nominated as one of America’s Best Dentists: As determined by peers, patients, research by nominating committee, background, experience, years in practice, online ratings and patient reviews. http://www.todaysbestdentists.com/ 2018 192. A difficult trip to Africa; linked in ( https://www.linkedin.com/pulse/happy-ending-extraordinarily-difficult-trip-africa-jay-grossman- dds/?published=t ) 191. The Pink Lady, LA Talk Radio, HNT and it’s impact on Veterans and Foster Children 190. JV Crum 3rd, Syndicated Radio Network, Philanthropy and building a successful business 189. International newspaper article in the Guardian; HNT 188. Award for HNT, presented by Congressman Ted Lieu & the Secretary of Veterans Affairs 187. Sleep Apnea, article to patient base 186. Opioid & Prescription abuse, article to patient base, Linked in ( https://www.linkedin.com/pulse/opioid-prescription-abuse-jay-grossman-dds/ ) 185. Saliva and dry mouth, article to patient base 184. America’s Best Dentist’s Award: 183.
    [Show full text]