Abstract
With the rising popularity of social networks, people have started accessing social networking sites from anywhere, any time, and from a variety of devices. Exploiting this ubiquity, the social networking data of an individual can be coupled with her geographical location to build different context aware applications. However, the existing infrastructure to share this personalized data forces users to compromise their privacy. In this paper, we present a secure framework, which allows interaction of social network information with location-based services, without compromising user privacy and security. Through exchanging an encrypted nonce ID (EID) associated with a verified user location, our framework allows location-based services to query its vicinity for relevant information without disclosing user identity. We further argue that, this kind of framework should be adopted as a common security framework for mobile-social interaction to meet privacy requirements.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Facebook developer resource, http://developers.facebook.com/resources.php
Facebook statistics, http://www.facebook.com/press/info.php?statistics
Nyx illuminated clothing, http://www.nyxit.com/
Berzowska, J., Coelho, M.: Kukkia and vilkas: Kinetic electronic garments. In: Proceedings of the IEEE International Symposium on Wearable Computers (2005)
Borovoy, R., McDonald, M., Martin, F., Resnick, M.: Things that blink: computationally augmented name tags. IBM Systems Journal 35(3-4) (1996)
Beach, A., Gartrell, M., Akkala, S., Elston, J., Kelley, J., Nishimoto, K., Ray, B., Razgulin, S., Sundaresan, K., Surendar, B., Terada, M., Han, R.: Whozthat? evolving an ecosystem for context-aware mobile social networks. IEEE Network 22(4), 50–55 (2008)
Beach, A., Ray, B., Buechley, L.: Touch Me wE@r: Getting Physical with Social Networks. In: IEEE International Conference on Computational Science and Engineering, vol. 4, pp. 960–965 (2009)
Buechley, L., Eisenberg, M., Catchen, J., Crockett, A.: The lilypad arduino: Using computational textile to investigate engagement, aesthetics and diversity in computer science education. In: CHI, pp. 423–432 (2008)
Buechley, L., Eisenberg, M.: Fabric pcbs, electronic sequins, and socket buttons: Techniques for e-textile craft. Personal and Ubquitous Computing (2007)
Cheverst, K., Davies, N., Mitchell, K., Friday, A.: Experiences of developing and deploying a context-aware tourist guide: The guide project. In: ACM MobiCom, pp. 20–31 (2000)
Dunne, L.E., Toney, A., Ashdown, S., Thomas, B.: Subtle garment integration of technology: A case study of the business suit. In: IFAWC (2004)
Eagle, N., Pentland, A.: Social serendipity: Mobilizing social software. IEEE Pervasive Computing 4(2) (April-June 2005)
Choudhury, T., et al.: The mobile sensing platform: An embedded activity recognition system. IEEE Pervasive Computing 7(2), 32–41 (2008)
Gennaro, R., Rohatgi, P.: How to sign digital streams, pp. 180–197. Springer, Heidelberg (1997)
Microsoft Vision Group; Microsoft easyliving, http://research.microsoft.com/easyliving/
Harter, A., Hopper, T., Steggles, P., Ward, A., Webster, P.: The anatomy of a context-aware application. In: Mobicom 1999, pp. 59–68 (August 1999)
Iwatani, Y.: Love: Japanese style. In: WIRED (1998)
Madan, A., Pentland, A.: Vibefones: Socially aware mobile phones. In: ISWC, pp. 109–112 (2006)
Pentland, A.: Socially aware computation and communication. IEEE Computer 38(3), 33–40 (2005)
Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: Spins: Security protocols for sensor networks. Wireless Networks, 189–199 (2001)
Priyantha, N., Miu, A., Balakrishnan, H., Teller, S.: The cricket compass for context-aware mobile applications. In: ACM MobiCom, pp. 1–14 (2001)
Rohatgi, P.: A compact and fast hybrid signature scheme for multicast packet authentiation. In: CCS 1999, pp. 93–100. ACM, New York (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Ray, B., Han, R. (2012). SecureWear: A Framework for Securing Mobile Social Networks. In: Meghanathan, N., Chaki, N., Nagamalai, D. (eds) Advances in Computer Science and Information Technology. Computer Science and Engineering. CCSIT 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 85. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27308-7_55
Download citation
DOI: https://doi.org/10.1007/978-3-642-27308-7_55
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27307-0
Online ISBN: 978-3-642-27308-7
eBook Packages: Computer ScienceComputer Science (R0)