SmokeScreen: flexible privacy controls for presence-sharing

Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both trusted social relations and untrusted strangers. In this paper, we present a system called SmokeScreen that provides flexible and power-efficient mechanisms for privacy management. Broadcasting clique signals, which can only be interpreted by other trusted users, enables sharing between social relations; broadcasting opaque identifiers (OIDs), which can only be resolved to an identity by a trusted broker, enables sharing between strangers. Computing these messages is power-efficient since they can be pre-computed with acceptable storage costs. In evaluating these mechanisms we first analyzed traces from an actual presence-sharing application. Four months of traces provide evidence of anonymous snooping, even among trusted users. We have also implemented our mechanisms on two devices and found the power demands of clique signals and OIDs to be reasonable. A mobile phone running our software can operate for several days on a single charge.

[1]  James A. Landay,et al.  Privacy risk models for designing privacy-sensitive ubiquitous computing systems , 2004, DIS '04.

[2]  Robert J. T. Morris,et al.  The evolution of storage systems , 2003, IBM Syst. J..

[3]  Craig A. N. Soules,et al.  Connections: using context to enhance file search , 2005, SOSP '05.

[4]  Landon P. Cox,et al.  Presence-Exchanges: Toward Sustainable Presence-Sharing , 2006, Seventh IEEE Workshop on Mobile Computing Systems & Applications (WMCSA'06 Supplement).

[5]  Kostas G. Anagnostakis,et al.  Exchange-based incentive mechanisms for peer-to-peer file sharing , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..

[6]  James A. Landay,et al.  An architecture for privacy-sensitive ubiquitous computing , 2004, MobiSys '04.

[7]  Marc Davis,et al.  Metadata creation system for mobile images , 2004, MobiSys '04.

[8]  Marco Gruteser,et al.  Enhancing Location Privacy in Wireless LAN Through Disposable Interface Identifiers: A Quantitative Analysis , 2003, WMASH '03.

[9]  William M. Daley,et al.  Digital Signature Standard (DSS) , 2000 .

[10]  Paul Dourish,et al.  Unpacking "privacy" for a networked world , 2003, CHI '03.

[11]  J. Davenport Editor , 1960 .

[12]  Nigel Davies,et al.  Preserving Privacy in Environments with Location-Based Applications , 2003, IEEE Pervasive Comput..

[13]  Pete Chown,et al.  Advanced Encryption Standard (AES) Ciphersuites for Transport Layer Security (TLS) , 2002, RFC.

[14]  David Mazières,et al.  RE: Reliable Email , 2006, NSDI.

[15]  Jim Gray,et al.  Notes on Data Base Operating Systems , 1978, Advanced Course: Operating Systems.

[16]  Benny Pinkas,et al.  Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.

[17]  Simon King,et al.  MMM2: mobile media metadata for media sharing , 2005, CHI EA '05.

[18]  Xerox,et al.  The Small World , 1999 .

[19]  John C. Tang,et al.  Work rhythms: analyzing visualizations of awareness histories of distributed groups , 2002, CSCW '02.

[20]  Marc Davis,et al.  Bluetooth Pooling to Enrich Co-Presence Information , 2005 .

[21]  Tara Matthews,et al.  Location disclosure to social relations: why, when, & what people want to share , 2005, CHI.

[22]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[23]  Bill N. Schilit,et al.  Place Lab: Device Positioning Using Radio Beacons in the Wild , 2005, Pervasive.

[24]  Alex Pentland,et al.  Reality mining: sensing complex social systems , 2006, Personal and Ubiquitous Computing.

[25]  Alex Pentland,et al.  Social serendipity: mobilizing social software , 2005, IEEE Pervasive Computing.

[26]  Marco Gruteser,et al.  USENIX Association , 1992 .

[27]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[28]  Gregory D. Abowd,et al.  The ContextCam: Automated Point of Capture Video Annotation , 2004, UbiComp.

[29]  尚弘 島影 National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .

[30]  Abigail Sellen,et al.  The ubiquitous camera: an in-depth study of camera phone use , 2005, IEEE Pervasive Computing.

[31]  Anind K. Dey,et al.  Who wants to know what when? privacy preference determinants in ubiquitous computing , 2003, CHI Extended Abstracts.