Skip to main content

MoP-2-MoP – Mobile Private Microblogging

  • Conference paper
  • First Online:
Financial Cryptography and Data Security (FC 2014)

Abstract

Microblogging services have become popular, especially since smartphones made them easily accessible for common users. However, current services like Twitter rely on a centralized infrastructure, which has serious drawbacks from privacy and reliability perspectives. In this paper, we present a decentralized privacy-preserving microblogging infrastructure based on a distributed peer-to-peer network of mobile users. It is resistant to censorship and provides high availability. Our solution allows secure distribution of encrypted messages over local radio links to physically close peers. When redistributing messages, each peer re-randomizes encryptions to achieve unlinkability. Moreover, we show the feasibility of our solution using different synchronization strategies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    We used the package’s mobility patterns RandomWaypoint and GaussianMarkov as well, but due to similar results we only show the results for ManhattanGrid here.

  2. 2.

    In this period the network is in its operational window, having most buffers filled.

  3. 3.

    https://github.com/rtyley/spongycastle

  4. 4.

    www.littleeye.co

  5. 5.

    https://www.torproject.org

References

  1. Aschenbruck, N., Ernst, R., Gerhards-Padilla, E., Schwamborn, M.: Bonnmotion: a mobility scenario generation and analysis tool. In: ICST’10, pp. 51:1–51:10 (2010)

    Google Scholar 

  2. Aviv, A.J., Sherr, M., Blaze, M., Smith, J.M.: Evading cellular data monitoring with human movement networks. In: HotSec’10, pp. 1–9 (2010)

    Google Scholar 

  3. Baden, R.: LoKI: location-based PKI for social networks. SIGCOMM Comput. Commun. Rev. 41(4), 394–395 (2011)

    Article  Google Scholar 

  4. Chaintreau, A., Hui, P., Crowcroft, J., Diot, C., Gass, R., Scott, J.: Impact of human mobility on opportunistic forwarding algorithms. IEEE Trans. Mob. Comput. 6(6), 606–620 (2007)

    Article  Google Scholar 

  5. De Cristofaro, E., Soriente, C., Tsudik, G., Williams, A.: Hummingbird: privacy at the time of twitter. In: S&P’12, pp. 285–299 (2012)

    Google Scholar 

  6. El Defrawy, K., Tsudik, G.: Alarm: anonymous location-aided routing in suspicious manets. IEEE Trans. Mob. Comput. 10(9), 1345–1358 (2011)

    Article  Google Scholar 

  7. Fanti, G., Ben David, Y., Benthall, S., Brewer, E., Shenker, S.: Rangzen: circumventing government-imposed communication blackouts. In: UCB/EECS-2013-128

    Google Scholar 

  8. Fonseca, E., Festag, A., Baldessari, R., Aguiar, R.L.: Support of anonymity in vanets - putting pseudonymity into practice. In: WCNC’07, pp. 3400–3405 (2007)

    Google Scholar 

  9. Golle, P., Jakobsson, M., Juels, A., Syverson, P.F.: Universal re-encryption for mixnets. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 163–178. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  10. Kwak, H., Lee, C., Park, H., Moon, S.: What is twitter, a social network or a news media? In: WWW’10, pp. 591–600 (2010)

    Google Scholar 

  11. McCord, M., Chuah, M.: Spam detection on twitter using traditional classifiers. In: Calero, J.M.A., Yang, L.T., Mármol, F.G., García Villalba, L.J., Li, A.X., Wang, Y. (eds.) ATC 2011. LNCS, vol. 6906, pp. 175–186. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  12. McNamara, L., Mascolo, C., Capra, L.: Media sharing based on colocation prediction in urban transport. In: MobiCom’08, pp. 58–69 (2008)

    Google Scholar 

  13. Perrucci, G.P., Fitzek, F.H.P., Widmer, J.: Survey on energy consumption entities on the smartphone platform, pp. 1–6, May 2011

    Google Scholar 

  14. Reiter, M.K., Rubin, A.D.: Crowds: anonymity for web transactions. ACM Trans. Inf. Syst. Secur. 1(1), 66–92 (1998)

    Article  Google Scholar 

  15. Rhee, I., Shin, M., Lee, K., Hong, S., Chong, S.: Human mobility patterns and their impact on delay tolerant networks. In: HotNets’07 (2007)

    Google Scholar 

  16. Rogers, M., Saitta, E.: Secure communication over diverse transports: [short paper]. In: WPES’12, pp. 75–80 (2012)

    Google Scholar 

  17. Stanford MobiSocial project. http://mobisocial.stanford.edu

  18. Su, J., Chin, A., Popivanova, A., Goel, A., de Lara, E.: User mobility for opportunistic ad-hoc networking. In: WMCSA’04, pp. 41–50 (2004)

    Google Scholar 

  19. Weng, J., Lim, E.P., Jiang, J., He, Q.: Twitterrank: finding topic-sensitive influential twitterers. In: WSDM’10, pp. 261–270 (2010)

    Google Scholar 

  20. Zhang, Y., Liu, W., Lou, W., Fang, Y.: Mask: anonymous on-demand routing in mobile ad hoc networks. IEEE Trans. Wirel. Commun. 5(9), 2376–2385 (2006)

    Article  Google Scholar 

Download references

Acknowledgments

We thank the anonymous reviewers and our shepherd Urs Hengartner for their valuable comments. Mihai Bucicoiu was funded by the Romanian Ministry of Labour through grant POSDRU 76903.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marius Senftleben .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 International Financial Cryptography Association

About this paper

Cite this paper

Senftleben, M., Bucicoiu, M., Tews, E., Armknecht, F., Katzenbeisser, S., Sadeghi, AR. (2014). MoP-2-MoP – Mobile Private Microblogging. In: Christin, N., Safavi-Naini, R. (eds) Financial Cryptography and Data Security. FC 2014. Lecture Notes in Computer Science(), vol 8437. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45472-5_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-45472-5_25

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-45471-8

  • Online ISBN: 978-3-662-45472-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics