Secure encounter-based mobile social networks: requirements, designs, and trade-offs

K-REx Repository

Show simple item record

dc.contributor.author Mohaisen, Abedelaziz
dc.contributor.author Kune, Denis Foo
dc.contributor.author Vasserman, Eugene Y.
dc.contributor.author Kim, Myungsun
dc.contributor.author Kim, Yongdae
dc.date.accessioned 2014-04-25T21:21:58Z
dc.date.available 2014-04-25T21:21:58Z
dc.date.issued 2014-04-25
dc.identifier.uri http://hdl.handle.net/2097/17572
dc.description.abstract Encounter-based social networks and encounter-based systems link users who share a location at the same time, as opposed to the traditional social network paradigm of linking users who have an offline friendship. This new approach presents challenges that are fundamentally different from those tackled by previous social network designs. In this paper, we explore the functional and security requirements for these new systems, such as availability, security, and privacy, and present several design options for building secure encounter-based social networks. To highlight these challenges we examine one recently proposed encounter-based social network design and compare it to a set of idealized security and functionality requirements. We show that it is vulnerable to several attacks, including impersonation, collusion, and privacy breaching, even though it was designed specifically for security. Mindful of the possible pitfalls, we construct a flexible framework for secure encounter-based social networks, which can be used to construct networks that offer different security, privacy, and availability guarantees. We describe two example constructions derived from this framework, and consider each in terms of the ideal requirements. Some of our new designs fulfill more requirements in terms of system security, reliability, and privacy than previous work. We also evaluate real-world performance of one of our designs by implementing a proof-of-concept iPhone application called MeetUp. Experiments highlight the potential of our system and hint at the deployability of our designs on a large scale. en_US
dc.language.iso en_US en_US
dc.relation.uri http://www.computer.org/csdl/trans/tq/2013/06/ttq2013060380-abs.html en_US
dc.subject Social networks en_US
dc.subject Location-based services en_US
dc.subject Privacy en_US
dc.title Secure encounter-based mobile social networks: requirements, designs, and trade-offs en_US
dc.type Article (author version) en_US
dc.date.published 2013 en_US
dc.citation.doi doi:10.1109/TDSC.2013.19 en_US
dc.citation.epage 393 en_US
dc.citation.issue 6 en_US
dc.citation.jtitle IEEE Transactions on Dependable and Secure Computing en_US
dc.citation.spage 380 en_US
dc.citation.volume 10 en_US
dc.contributor.authoreid eyv en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search K-REx


Advanced Search

Browse

My Account

Statistics








Center for the

Advancement of Digital

Scholarship

118 Hale Library

Manhattan KS 66506


(785) 532-7444

cads@k-state.edu