Solutions to Security and Privacy Issues in Mobile Social Networking

Social network information is now being used in ways for which it may have not been originally intended. In particular, increased use of smartphones capable ofrunning applications which access social network information enable applications to be aware of a user's location and preferences. However, current models forexchange of this information require users to compromise their privacy and security. We present several of these privacy and security issues, along withour design and implementation of solutions for these issues. Our work allows location-based services to query local mobile devices for users' social network information, without disclosing user identity or compromising users' privacy and security. We contend that it is important that such solutions be acceptedas mobile social networks continue to grow exponentially.

[1]  Paul F. Syverson,et al.  Onion routing , 1999, CACM.

[2]  Mor Naaman,et al.  Over-exposed?: privacy patterns and considerations in online and mobile photo sharing , 2007, CHI.

[3]  Charles M. Gartrell SocialAware: Context-aware multimedia presentation via mobile social networks , 2008 .

[4]  Refik Molva,et al.  Privacy preserving social networking through decentralization , 2009, 2009 Sixth International Conference on Wireless On-Demand Network Systems and Services.

[5]  Srdjan Capkun,et al.  Secure Location Verification with Hidden and Mobile Base Stations , 2008, IEEE Transactions on Mobile Computing.

[6]  Jie Gao,et al.  Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[7]  John Kelley,et al.  WhozThat? evolving an ecosystem for context-aware mobile social networks , 2008, IEEE Network.

[8]  Alex Pentland,et al.  Social serendipity: mobilizing social software , 2005, IEEE Pervasive Computing.

[9]  Yarden Katz,et al.  Using Social Network-based Trust For Default Reasoning On The Web , 2006 .

[10]  Justin Manweiler,et al.  We saw each other on the subway: secure, anonymous proximity-based missed connections , 2009, HotMobile '09.

[11]  Paul F. Syverson,et al.  Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..

[12]  Krishna P. Gummadi,et al.  Measurement and analysis of online social networks , 2007, IMC '07.

[13]  Saikat Guha,et al.  NOYB: privacy in online social networks , 2008, WOSN '08.

[14]  Robert Richards,et al.  Representational State Transfer (REST) , 2006 .

[15]  Emiliano Miluzzo,et al.  CenceMe - Injecting Sensing Presence into Social Networking Applications , 2007, EuroSSC.

[16]  Landon P. Cox,et al.  SmokeScreen: flexible privacy controls for presence-sharing , 2007, MobiSys '07.

[17]  Alec Wolman,et al.  Lockr: social access control for web 2.0 , 2008, WOSN '08.