Contrail: Enabling Decentralized Social Networks on Smartphones

  • Patrick Stuedi
  • Iqbal Mohomed
  • Mahesh Balakrishnan
  • Z. Morley Mao
  • Venugopalan Ramasubramanian
  • Doug Terry
  • Ted Wobber
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7049)

Abstract

Mobile devices are increasingly used for social networking applications, where data is shared between devices belonging to different users. Today, such applications are implemented as centralized services, forcing users to trust corporations with their personal data. While decentralized designs for such applications can provide privacy, they are difficult to achieve on current devices due to constraints on connectivity, energy and bandwidth. Contrail is a communication platform that allows decentralized social networks to overcome these challenges. In Contrail, a user installs content filters on her friends’ devices that express her interests; she subsequently receives new data generated by her friends that match the filters. Both data and filters are exchanged between devices via cloud-based relays in encrypted form, giving the cloud no visibility into either. In addition to providing privacy, Contrail enables applications that are very efficient in terms of energy and bandwidth.

References

  1. 1.
  2. 2.
  3. 3.
    Privacy-aware and highly-available osn profiles. In: 6th International Workshop on Collaborative Peer-to-Peer Systems (COPS 2010) (2010)Google Scholar
  4. 4.
    Aguilera, M.K., Strom, R.E., Sturman, D.C., Astley, M., Chandra, T.D.: Matching events in a content-based subscription system. In: PODC 1999: Proceedings of the Eighteenth Annual ACM Symposium on Principles of Distributed Computing. ACM, New York (1999)Google Scholar
  5. 5.
    Ballani, H., Chawathe, Y., Ratnasamy, S., Roscoe, T., Shenker, S.: Off by default. In: Proc. 4th ACM Workshop on Hot Topics in Networks (Hotnets-IV), Citeseer (2005)Google Scholar
  6. 6.
    Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public Key Encryption with Keyword Search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  7. 7.
    Cáceres, R., Cox, L., Lim, H., Shakimov, A., Varshavsky, A.: Virtual individual servers as privacy-preserving proxies for mobile devices. In: Proceedings of the 1st ACM Workshop on Networking, Systems, and Applications for Mobile Handhelds, pp. 37–42. ACM (2009)Google Scholar
  8. 8.
    Eugster, P.T., Felber, P.A., Guerraoui, R., Kermarrec, A.-M.: The many faces of publish/subscribe. ACM Comput. Surv. 35(2), 114–131 (2003)CrossRefGoogle Scholar
  9. 9.
    Ford, B., Strauss, J., Lesniewski, C., Rhea, S., Kaashoek, F., Morris, R.: Persistent Personal Names for Globally Connected Mobile DevicesGoogle Scholar
  10. 10.
    Li, D., Anand, M.: Majab: improving resource management for web-based applications on mobile devices. In: MobiSys 2009: Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services, pp. 95–108. ACM, New York (2009)CrossRefGoogle Scholar
  11. 11.
    Pietiläinen, A.-K., Oliver, E., LeBrun, J., Varghese, G., Diot, C.: Mobiclique: middleware for mobile social networking. In: WOSN 2009: Proceedings of the 2nd ACM Workshop on Online Social Networks, pp. 49–54. ACM, New York (2009)CrossRefGoogle Scholar
  12. 12.
    Qureshi, A., Guttag, J.V.: Horde: separating network striping policy from mechanism. In: MobiSys, pp. 121–134 (2005)Google Scholar
  13. 13.
    Ramasubramanian, V., Rodeheffer, T.L., Terry, D.B., Walraed-Sullivan, M., Wobber, T., Marshall, C.C., Vahdat, A.: Cimbiosys: a platform for content-based partial replication. In: NSDI 2009: Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, pp. 261–276. USENIX Association, Berkeley (2009)Google Scholar
  14. 14.
    Sadeh, N., Hong, J., Cranor, L., Fette, I., Kelley, P., Prabaker, M., Rao, J.: Understanding and capturing people privacy policies in a mobile social networking application. Personal and Ubiquitous Computing 13(6), 401–412 (2009)CrossRefGoogle Scholar
  15. 15.
    Shih, E., Bahl, P., Sinclair, M.: Wake on wireless: An event driven energy saving strategy for battery operated devices. In: Proceedings of the 8th Annual International Conference on Mobile Computing and Networking, pp. 160–171. ACM, New York (2002)CrossRefGoogle Scholar
  16. 16.
    Song, D., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy, S&P 2000 (2000)Google Scholar
  17. 17.
    Sorber, J., Banerjee, N., Corner, M., Rollins, S.: Turducken: Hierarchical power management for mobile devices. In: Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services. ACM, New York (2005)Google Scholar
  18. 18.
    Su, J., Scott, J., Hui, P., Crowcroft, J., De Lara, E., Diot, C., Goel, A., Lim, M., Upton, E.: Haggle: Seamless Networking for Mobile Applications. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, vol. 4717, pp. 391–408. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  19. 19.
    Zhang, H., DeCleene, B., Kurose, J., Towsley, D.: Bootstrapping Deny-By-Default Access Control For Mobile Ad-Hoc Networks. In: IEEE Military Communications Conference (MILCOM) 2008, San Diego, November 17-19 (2008)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2011

Authors and Affiliations

  • Patrick Stuedi
    • 1
  • Iqbal Mohomed
    • 2
  • Mahesh Balakrishnan
    • 3
  • Z. Morley Mao
    • 4
  • Venugopalan Ramasubramanian
    • 3
  • Doug Terry
    • 3
  • Ted Wobber
    • 3
  1. 1.IBM ResearchZurichSwitzerland
  2. 2.IBM ResearchT.J. WatsonUSA
  3. 3.Microsoft ResearchSilicon ValleyUSA
  4. 4.University of MichiganUSA

Personalised recommendations