Abstract

With the rising popularity of social networks, people have started accessing social networking sites from anywhere, any time, and from a variety of devices. Exploiting this ubiquity, the social networking data of an individual can be coupled with her geographical location to build different context aware applications. However, the existing infrastructure to share this personalized data forces users to compromise their privacy. In this paper, we present a secure framework, which allows interaction of social network information with location-based services, without compromising user privacy and security. Through exchanging an encrypted nonce ID (EID) associated with a verified user location, our framework allows location-based services to query its vicinity for relevant information without disclosing user identity. We further argue that, this kind of framework should be adopted as a common security framework for mobile-social interaction to meet privacy requirements.

Keywords

mobile computing social network security privacy wearable device 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Facebook developer resource, http://developers.facebook.com/resources.php
  2. 2.
  3. 3.
    Nyx illuminated clothing, http://www.nyxit.com/
  4. 4.
    Berzowska, J., Coelho, M.: Kukkia and vilkas: Kinetic electronic garments. In: Proceedings of the IEEE International Symposium on Wearable Computers (2005)Google Scholar
  5. 5.
    Borovoy, R., McDonald, M., Martin, F., Resnick, M.: Things that blink: computationally augmented name tags. IBM Systems Journal 35(3-4) (1996)Google Scholar
  6. 6.
    Beach, A., Gartrell, M., Akkala, S., Elston, J., Kelley, J., Nishimoto, K., Ray, B., Razgulin, S., Sundaresan, K., Surendar, B., Terada, M., Han, R.: Whozthat? evolving an ecosystem for context-aware mobile social networks. IEEE Network 22(4), 50–55 (2008)CrossRefGoogle Scholar
  7. 7.
    Beach, A., Ray, B., Buechley, L.: Touch Me wE@r: Getting Physical with Social Networks. In: IEEE International Conference on Computational Science and Engineering, vol. 4, pp. 960–965 (2009)Google Scholar
  8. 8.
    Buechley, L., Eisenberg, M., Catchen, J., Crockett, A.: The lilypad arduino: Using computational textile to investigate engagement, aesthetics and diversity in computer science education. In: CHI, pp. 423–432 (2008)Google Scholar
  9. 9.
    Buechley, L., Eisenberg, M.: Fabric pcbs, electronic sequins, and socket buttons: Techniques for e-textile craft. Personal and Ubquitous Computing (2007)Google Scholar
  10. 10.
    Cheverst, K., Davies, N., Mitchell, K., Friday, A.: Experiences of developing and deploying a context-aware tourist guide: The guide project. In: ACM MobiCom, pp. 20–31 (2000)Google Scholar
  11. 11.
    Dunne, L.E., Toney, A., Ashdown, S., Thomas, B.: Subtle garment integration of technology: A case study of the business suit. In: IFAWC (2004)Google Scholar
  12. 12.
    Eagle, N., Pentland, A.: Social serendipity: Mobilizing social software. IEEE Pervasive Computing 4(2) (April-June 2005)Google Scholar
  13. 13.
    Choudhury, T., et al.: The mobile sensing platform: An embedded activity recognition system. IEEE Pervasive Computing 7(2), 32–41 (2008)CrossRefGoogle Scholar
  14. 14.
    Gennaro, R., Rohatgi, P.: How to sign digital streams, pp. 180–197. Springer, Heidelberg (1997)MATHGoogle Scholar
  15. 15.
    Microsoft Vision Group; Microsoft easyliving, http://research.microsoft.com/easyliving/
  16. 16.
    Harter, A., Hopper, T., Steggles, P., Ward, A., Webster, P.: The anatomy of a context-aware application. In: Mobicom 1999, pp. 59–68 (August 1999)Google Scholar
  17. 17.
    Iwatani, Y.: Love: Japanese style. In: WIRED (1998)Google Scholar
  18. 18.
    Madan, A., Pentland, A.: Vibefones: Socially aware mobile phones. In: ISWC, pp. 109–112 (2006)Google Scholar
  19. 19.
    Pentland, A.: Socially aware computation and communication. IEEE Computer 38(3), 33–40 (2005)CrossRefGoogle Scholar
  20. 20.
    Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: Spins: Security protocols for sensor networks. Wireless Networks, 189–199 (2001)Google Scholar
  21. 21.
    Priyantha, N., Miu, A., Balakrishnan, H., Teller, S.: The cricket compass for context-aware mobile applications. In: ACM MobiCom, pp. 1–14 (2001)Google Scholar
  22. 22.
    Rohatgi, P.: A compact and fast hybrid signature scheme for multicast packet authentiation. In: CCS 1999, pp. 93–100. ACM, New York (1999)Google Scholar

Copyright information

© ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2012

Authors and Affiliations

  • Baishakhi Ray
    • 1
  • Richard Han
    • 1
  1. 1.Department of Computer ScienceUniversity of ColoradoBoulderUSA

Personalised recommendations