SBone: Personal Device Sharing Using Social Networks

People own a number of personal devices whose state and resources might be of interest to others. Owners of these devices may be willing to selectively share them with their family, friends, and colleagues, but there exists no easy and secure mechanism to do so. In this paper, we propose SBone, an architecture that allows personal devices to share their resources and state with each other, seamlessly and securely, using a social network for authentication, naming, discovery and access control. The sharing mechanism is derived from the inter-personal relationships that exists among owners by virtue of their presence in online social networks. We present a case study of how SBone can be used to share internet connectivity resource between devices.

[1]  Eiji Kawai,et al.  USB/IP - A Peripheral Bus Extension for Device Sharing over IP Network (Awarded FREENIX Track Best Paper Award!) , 2005, USENIX ATC, FREENIX Track.

[2]  Sacha Brostoff,et al.  Transforming the ‘Weakest Link’ — a Human/Computer Interaction Approach to Usable and Effective Security , 2001 .

[3]  Jon Kleinberg,et al.  Maximizing the spread of influence through a social network , 2003, KDD '03.

[4]  Dan Wing,et al.  Session Traversal Utilities for NAT (STUN) , 2020, RFC.

[5]  Robert Tappan Morris,et al.  Persistent personal names for globally connected mobile devices , 2006, OSDI '06.

[6]  Yong Ho Song,et al.  Design and Implementation of Peripheral Sharing Mechanism on Pervasive Computing with Heterogeneous Environment , 2007, SEUS.

[7]  Diana K. Smetters,et al.  Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.

[8]  Diana K. Smetters,et al.  Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute , 2004, USENIX Security Symposium.

[9]  Ben Y. Zhao,et al.  Preserving privacy in location-based mobile social applications , 2010, HotMobile '10.

[10]  Daniel A. Keim,et al.  On Knowledge Discovery and Data Mining , 1997 .

[11]  Alec Wolman,et al.  Lockr: better privacy for social networks , 2009, CoNEXT '09.

[12]  Priya Narasimhan,et al.  Software Technologies for Embedded and Ubiquitous Systems , 2009, Lecture Notes in Computer Science.

[13]  Shaozhi Ye,et al.  Davis social links: integrating social networks with internet routing , 2007, LSAD '07.

[14]  Nick Feamster,et al.  Authenticated out-of-band communication over social links , 2008, WOSN '08.

[15]  Jure Leskovec,et al.  Meme-tracking and the dynamics of the news cycle , 2009, KDD.

[16]  Mark S. Granovetter The Strength of Weak Ties , 1973, American Journal of Sociology.

[17]  Robert Tappan Morris,et al.  User-Relative Names for Globally Connected Personal Devices , 2006, IPTPS.

[18]  Jonathan D. Rosenberg,et al.  Traversal Using Relays around NAT (TURN) Extensions for TCP Allocations , 2010, RFC.

[19]  Mark Allman Personal Namespaces , 2007, HotNets.

[20]  Karsten Schwan,et al.  CameraCast: flexible access to remote video sensors , 2007, Electronic Imaging.

[21]  Paul Dourish,et al.  Security in the wild: user strategies for managing security as an everyday, practical problem , 2004, Personal and Ubiquitous Computing.

[22]  M. Hansen,et al.  Participatory Sensing , 2019, Internet of Things.

[23]  N. Asokan,et al.  Visitor access management in personal wireless networks , 2005, Seventh IEEE International Symposium on Multimedia (ISM'05).

[24]  W. Keith Edwards,et al.  Home networking and HCI: what hath god wrought? , 2007, CHI.

[25]  Wei Wang,et al.  Composable IO: a novel resource sharing platform in personal Clouds , 2011, The Journal of Supercomputing.