CrowdShare: Secure Mobile Resource Sharing

  • N. Asokan
  • Alexandra Dmitrienko
  • Marcin Nagy
  • Elena Reshetova
  • Ahmad-Reza Sadeghi
  • Thomas Schneider
  • Stanislaus Stelle
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7954)

Abstract

Mobile smart devices and services have become an integral part of our daily life. In this context there are many compelling scenarios for mobile device users to share resources. A popular example is tethering. However, sharing resources also raises privacy and security issues.

In this paper, we present CrowdShare, a complete framework and its (Android) implementation for secure and private resource sharing among nearby devices. CrowdShare provides pseudonymity for users, accountability of resource usage, and the possibility of specifying access control in terms of social network relationships. Further, CrowdShare preserves secure connectivity between nearby devices even in the absence of the mobile infrastructure. We have implemented CrowdShare on Android devices and report good performance results.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
  2. 2.
    Serval - comunicate anywhere, anytime, http://www.servalproject.org/ (visited July 26, 2012)
  3. 3.
    von Arb, M., et al.: VENETA: Serverless friend-of-friend detection in mobile social networking. In: WiMob, pp. 184–189. IEEE (2008)Google Scholar
  4. 4.
    Asokan, N., Dmitrienko, A., Nagy, M., Reshetova, E., Sadeghi, A.-R., Schneider, T., Stelle, S.: Crowdshare: Secure mobile resource sharing. Technical Report TUD-CS-2013-0084, TU Darmstadt (April 2013), http://www.trust.informatik.tu-darmstadt.de/publications/publication-details/?no_cache=1&tx_bibtex_pi1
  5. 5.
    De Cristofaro, E., Manulis, M., Poettering, B.: Private discovery of common social contacts. In: Lopez, J., Tsudik, G. (eds.) ACNS 2011. LNCS, vol. 6715, pp. 147–165. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  6. 6.
    Gardner-Stephen, P.: The serval project: Practical wireless ad-hoc mobile telecommunications (2011)Google Scholar
  7. 7.
    Ginzboorg, P., et al.: DTN communication in a mine. In: ExtremeCom (2010)Google Scholar
  8. 8.
    Hossmann, T., et al.: Twitter in disaster mode: Security architecture. In: CoNEXT. ACM (2011)Google Scholar
  9. 9.
    JoikuSpot (2007), http://joikusoft.com/
  10. 10.
    Neumann, A., et al.: B.A.T.M.A.N.: Better approach to mobile ad-hoc networking. IEFT Draft (2008)Google Scholar
  11. 11.
    Nokia. Nokia Instant Community. Article in Nokia Conversations Blog (May 2010), http://conversations.nokia.com/2010/05/25/nokia-instant-community-gets-you-social/
  12. 12.
    Pitkänen, M., et al.: SCAMPI: Service platform for social aware mobile and pervasive computing. Computer Communication Review 42(4) (2012)Google Scholar
  13. 13.
    Zhang, L., et al.: Message in a sealed bottle: Privacy preserving friending in social networks. CoRR, abs/1207.7199 (2012)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • N. Asokan
    • 1
  • Alexandra Dmitrienko
    • 2
  • Marcin Nagy
    • 5
  • Elena Reshetova
    • 4
  • Ahmad-Reza Sadeghi
    • 2
    • 3
  • Thomas Schneider
    • 3
  • Stanislaus Stelle
    • 3
  1. 1.University of HelsinkiFinland
  2. 2.Fraunhofer-Institut SIT DarmstadtGermany
  3. 3.Technische Universität DarmstadtGermany
  4. 4.Intel Open LabsFinland
  5. 5.Aalto UniversityFinland

Personalised recommendations