Skip to main content

Abstract

With the rising popularity of social networks, people have started accessing social networking sites from anywhere, any time, and from a variety of devices. Exploiting this ubiquity, the social networking data of an individual can be coupled with her geographical location to build different context aware applications. However, the existing infrastructure to share this personalized data forces users to compromise their privacy. In this paper, we present a secure framework, which allows interaction of social network information with location-based services, without compromising user privacy and security. Through exchanging an encrypted nonce ID (EID) associated with a verified user location, our framework allows location-based services to query its vicinity for relevant information without disclosing user identity. We further argue that, this kind of framework should be adopted as a common security framework for mobile-social interaction to meet privacy requirements.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Facebook developer resource, http://developers.facebook.com/resources.php

  2. Facebook statistics, http://www.facebook.com/press/info.php?statistics

  3. Nyx illuminated clothing, http://www.nyxit.com/

  4. Berzowska, J., Coelho, M.: Kukkia and vilkas: Kinetic electronic garments. In: Proceedings of the IEEE International Symposium on Wearable Computers (2005)

    Google Scholar 

  5. Borovoy, R., McDonald, M., Martin, F., Resnick, M.: Things that blink: computationally augmented name tags. IBM Systems Journal 35(3-4) (1996)

    Google Scholar 

  6. Beach, A., Gartrell, M., Akkala, S., Elston, J., Kelley, J., Nishimoto, K., Ray, B., Razgulin, S., Sundaresan, K., Surendar, B., Terada, M., Han, R.: Whozthat? evolving an ecosystem for context-aware mobile social networks. IEEE Network 22(4), 50–55 (2008)

    Article  Google Scholar 

  7. Beach, A., Ray, B., Buechley, L.: Touch Me wE@r: Getting Physical with Social Networks. In: IEEE International Conference on Computational Science and Engineering, vol. 4, pp. 960–965 (2009)

    Google Scholar 

  8. Buechley, L., Eisenberg, M., Catchen, J., Crockett, A.: The lilypad arduino: Using computational textile to investigate engagement, aesthetics and diversity in computer science education. In: CHI, pp. 423–432 (2008)

    Google Scholar 

  9. Buechley, L., Eisenberg, M.: Fabric pcbs, electronic sequins, and socket buttons: Techniques for e-textile craft. Personal and Ubquitous Computing (2007)

    Google Scholar 

  10. Cheverst, K., Davies, N., Mitchell, K., Friday, A.: Experiences of developing and deploying a context-aware tourist guide: The guide project. In: ACM MobiCom, pp. 20–31 (2000)

    Google Scholar 

  11. Dunne, L.E., Toney, A., Ashdown, S., Thomas, B.: Subtle garment integration of technology: A case study of the business suit. In: IFAWC (2004)

    Google Scholar 

  12. Eagle, N., Pentland, A.: Social serendipity: Mobilizing social software. IEEE Pervasive Computing 4(2) (April-June 2005)

    Google Scholar 

  13. Choudhury, T., et al.: The mobile sensing platform: An embedded activity recognition system. IEEE Pervasive Computing 7(2), 32–41 (2008)

    Article  Google Scholar 

  14. Gennaro, R., Rohatgi, P.: How to sign digital streams, pp. 180–197. Springer, Heidelberg (1997)

    MATH  Google Scholar 

  15. Microsoft Vision Group; Microsoft easyliving, http://research.microsoft.com/easyliving/

  16. Harter, A., Hopper, T., Steggles, P., Ward, A., Webster, P.: The anatomy of a context-aware application. In: Mobicom 1999, pp. 59–68 (August 1999)

    Google Scholar 

  17. Iwatani, Y.: Love: Japanese style. In: WIRED (1998)

    Google Scholar 

  18. Madan, A., Pentland, A.: Vibefones: Socially aware mobile phones. In: ISWC, pp. 109–112 (2006)

    Google Scholar 

  19. Pentland, A.: Socially aware computation and communication. IEEE Computer 38(3), 33–40 (2005)

    Article  Google Scholar 

  20. Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: Spins: Security protocols for sensor networks. Wireless Networks, 189–199 (2001)

    Google Scholar 

  21. Priyantha, N., Miu, A., Balakrishnan, H., Teller, S.: The cricket compass for context-aware mobile applications. In: ACM MobiCom, pp. 1–14 (2001)

    Google Scholar 

  22. Rohatgi, P.: A compact and fast hybrid signature scheme for multicast packet authentiation. In: CCS 1999, pp. 93–100. ACM, New York (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Ray, B., Han, R. (2012). SecureWear: A Framework for Securing Mobile Social Networks. In: Meghanathan, N., Chaki, N., Nagamalai, D. (eds) Advances in Computer Science and Information Technology. Computer Science and Engineering. CCSIT 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 85. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27308-7_55

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27308-7_55

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27307-0

  • Online ISBN: 978-3-642-27308-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics