Abstract

Mobile users can obtain a wide range of services by maintaining associations, and sharing location and social context, with service providers. But multiple associations are cumbersome to maintain, and sharing private information with untrusted providers is risky. Using a trusted broker to mediate interactions by managing interfaces, user identities, context, social network links, policies, and enabling cross-domain associations, results in more privacy and reduced management burden for users, as we show in this paper. We also describe the prototype implementations of two practically useful applications that require awareness of participants’ location and social context: (i) targeted advertising, and (ii) social network-assisted online purchases.

Keywords

Privacy Multi-Domain Social Network Policy Management Middleware Identity Management Online Advertising Online Payment 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Airtel Money, http://airtelmoney.in
  2. 2.
  3. 3.
    Buecker, A., et al.: Flexible Policy Management for IT Security Services Using IBM Tivoli Security Policy Manager. IBM Red Paper Publication REDP-451200 (March 17, 2009)Google Scholar
  4. 4.
    Cimpian, E., Mocan, A., Stollberg, M.: Mediation Enabled Semantic Web Services Usage. In: Mizoguchi, R., Shi, Z.-Z., Giunchiglia, F. (eds.) ASWC 2006. LNCS, vol. 4185, pp. 459–473. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  5. 5.
    Dahlberg, T., Mallat, N., Ondrus, J., Zmijewska, A.: Past, Present and Future of Mobile Payments Research: A Literature Review. Journal: Electronic Commerce Research and Applications 7(2), 165–181 (2008)Google Scholar
  6. 6.
    Fauvet, M.C., Aït-Bachir, A.: An Automaton-based Approach for Web Service Mediation. In: Proceedings of the 13th ISPE International Conference on Concurrent Engineering (ISPE CE 2006), Antibes, France, September 18-22 (2006)Google Scholar
  7. 7.
  8. 8.
    Guha, S., Cheng, B., Francis, P.: Privad: Practical Privacy in Online Advertising. In: 8th Usenix Conf. on Network Systems Design and Implementation (NSDI), Boston, MA (March 2011)Google Scholar
  9. 9.
    Haidar, D.A., Cuppens-Boulahia, N., Cuppens, F., Debar, H.: Access Negotiation within XACML Architecture. In: Proceedings of the Second Joint Conference on Security in Networks Architectures and Security of Information Systems (SARSSI), Annecy, France (June 2007)Google Scholar
  10. 10.
    Hammer-Lahav, E., et al.: The Oauth 2.0 Authorization Protocol (January 2011), http://tools.ietf.org/pdf/draft-ietf-oauth-v2-12.pdf
  11. 11.
  12. 12.
    Krishnamurthy, B., Wills, C.E.: On the Leakage of Personally Identifiable Information via Online Social Networks. SIGCOMM Comput. Comm. Rev. 40(1), 112–117 (2010)CrossRefGoogle Scholar
  13. 13.
    Loreto, S., Mecklin, T., Opsenica, M., Rissanen, H.M.: Service Broker Architecture: Location Business Case and Mashups. Comm. Mag. 47(4), 97–103 (2009)CrossRefGoogle Scholar
  14. 14.
    Maler, R., Reed, D.: The Venn of Identity: Options and Issues in Federated Identity Management. IEEE Security and Privacy 6(2), 16–23 (2008)CrossRefGoogle Scholar
  15. 15.
    Mas, I., Morawczynski, O.: Designing Mobile Money Services: Lessons from M-PESA. Innovations 4(2), 77–92 (2009)CrossRefGoogle Scholar
  16. 16.
  17. 17.
    Ramakrishna, V., Reiher, P., Kleinrock, L.: Distributed Policy Resolution Through Negotiation in Ubiquitous Computing Environments. In: Proceedings of IEEE PerCom 2009, Galveston, TX (March 2009)Google Scholar
  18. 18.
  19. 19.
    Square Inc. (US), https://squareup.com
  20. 20.
    Verma, M.: XML Security: Control Information Access with XACML, http://www.ibm.com/developerworks/xml/library/x-xacml/
  21. 21.
    Westerinen, A., et al.: RFC 3198: Terminology for Policy-Based Management (November 2001), http://www.ietf.org/rfc/rfc3198
  22. 22.
    Gupta, A., Kalra, A., Boston, D., Borcea, C.: MobiSoC: A Middleware for Mobile Social Computing Applications. Mobile Networks and Applications Journal 14(1), 35–52 (2009)CrossRefGoogle Scholar
  23. 23.
  24. 24.
    Conect.Me Trust Framework, https://connect.me/trust

Copyright information

© ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2013

Authors and Affiliations

  • Venkatraman Ramakrishna
    • 1
  • Apurva Kumar
    • 1
  • Sougata Mukherjea
    • 1
  1. 1.IBM India Research LaboratoryNew DelhiIndia

Personalised recommendations