On the Privacy and Performance of Mobile Anonymous Microblogging

Microblogging is a popular form of online social networking activity. It allows users to send messages in a one-to-many publish-subscribe manner. Most current service providers are centralized and deploy a client-server model with unencrypted message content. As a consequence, all user behavior can, by default, be monitored, and censoring based on message content can easily be enforced on the server side. A distributed, peer-to-peer microblogging system consisting of mobile smartphone-equipped users that exchange group encrypted messages in an anonymous and censorship-resistant manner can alleviate privacy and censorship issues. We experimentally evaluate message spread of such systems with simulations that run on a range of synthetic and real-world mobility inputs, thus extending the previous work. We show that such systems are feasible for a range of mobility and network settings, both under normal and under adversarial conditions, e.g., under the presence of nodes which jam the network or send spam.

[1]  Xiaoyan Hong,et al.  ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks , 2003, MobiHoc '03.

[2]  Wenjing Lou,et al.  Anonymous communications in mobile ad hoc networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[3]  Deva K. Borah,et al.  A review of communication-oriented optical wireless systems , 2012, EURASIP J. Wirel. Commun. Netw..

[4]  Johan Pouwelse,et al.  Media without censorship (CensorFree) scenarios , 2012 .

[5]  Tracy Camp,et al.  A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..

[6]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[7]  Pierre St. Juste,et al.  Enabling decentralized microblogging through P2PVPNs , 2013, 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC).

[8]  Claudio Soriente,et al.  Hummingbird: Privacy at the Time of Twitter , 2012, 2012 IEEE Symposium on Security and Privacy.

[9]  Micah Sherr,et al.  Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks , 2012, ESORICS.

[10]  Elmar Gerhards-Padilla,et al.  BonnMotion: a mobility scenario generation and analysis tool , 2010, SimuTools.

[11]  Bharat K. Bhargava,et al.  Private Anonymous Messaging , 2012, 2012 IEEE 31st Symposium on Reliable Distributed Systems.

[12]  Ronggong Song,et al.  AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks , 2005, SASN '05.

[13]  George Danezis,et al.  On the PET Workshop Panel "Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?" , 2004, Privacy Enhancing Technologies.

[14]  Minho Shin,et al.  AnonySense: A system for anonymous opportunistic sensing , 2011, Pervasive Mob. Comput..

[15]  Imad Aad,et al.  The Mobile Data Challenge: Big Data for Mobile Computing Research , 2012 .

[16]  Burkhard Englert,et al.  Megaphone: Fault Tolerant, Scalable, and Trustworthy P2P Microblogging , 2010, 2010 Fifth International Conference on Internet and Web Applications and Services.

[17]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[18]  Sushil Jajodia,et al.  Providing Users’ Anonymity in Mobile Hybrid Networks , 2013, TOIT.

[19]  Matthew Smith,et al.  Helping Johnny 2.0 to encrypt his Facebook conversations , 2012, SOUPS.

[20]  Mohan S. Kankanhalli,et al.  Anonymous secure routing in mobile ad-hoc networks , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[21]  Pierre St. Juste,et al.  Litter: A Lightweight Peer-to-Peer Microblogging Service , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.

[22]  Azzedine Boukerche,et al.  SDAR: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[23]  Qi He,et al.  TwitterRank: finding topic-sensitive influential twitterers , 2010, WSDM '10.

[24]  Paul F. Syverson,et al.  Hiding Routing Information , 1996, Information Hiding.

[25]  Brent Waters,et al.  Anon-Pass: Practical Anonymous Subscriptions , 2013, IEEE Security & Privacy.

[26]  A. Juels,et al.  Universal Re-encryption for Mixnets , 2004, CT-RSA.

[27]  Bart Preneel,et al.  ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).

[28]  Jörg Ott,et al.  Floating content: Information sharing in urban areas , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[29]  Mitsuji Matsumoto,et al.  WLC10-3: IrSimple Modeling and Performance Evaluation for High-Speed Infrared Communications , 2006, IEEE Globecom 2006.

[30]  Jorma T. Virtamo,et al.  Criticality condition for information floating with random walk of nodes , 2013, Perform. Evaluation.

[31]  Srikanth V. Krishnamurthy,et al.  Twitsper: Tweeting privately , 2013, IEEE Security & Privacy.

[32]  Max Mühlhäuser,et al.  Twitterize: Anonymous Micro-blogging , 2014, 2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA).

[33]  Yahel Ben-David Robin : An Attack-resilient Microblogging Service to Circu mvent Government-Imposed Communication Blackouts , 2011 .

[34]  Mauro Conti,et al.  An Anonymous End-to-End Communication Protocol for Mobile Cloud Environments , 2014, IEEE Transactions on Services Computing.

[35]  Stefan Katzenbeisser,et al.  MoP-2-MoP - Mobile Private Microblogging , 2014, Financial Cryptography.

[36]  Herbert Bos,et al.  Paranoid Android: versatile protection for smartphones , 2010, ACSAC '10.

[37]  Mark E. J. Newman,et al.  Power-Law Distributions in Empirical Data , 2007, SIAM Rev..

[38]  Michael K. Reiter,et al.  Crowds: anonymity for Web transactions , 1998, TSEC.