Secure encounter-based mobile social networks: requirements, designs, and trade-offs

dc.citation.doi10.1109/TDSC.2013.19en_US
dc.citation.epage393en_US
dc.citation.issue6en_US
dc.citation.jtitleIEEE Transactions on Dependable and Secure Computingen_US
dc.citation.spage380en_US
dc.citation.volume10en_US
dc.contributor.authorMohaisen, Abedelaziz
dc.contributor.authorKune, Denis Foo
dc.contributor.authorVasserman, Eugene Y.
dc.contributor.authorKim, Myungsun
dc.contributor.authorKim, Yongdae
dc.contributor.authoreideyven_US
dc.date.accessioned2014-04-25T21:21:58Z
dc.date.available2014-04-25T21:21:58Z
dc.date.issued2013-03-21
dc.date.published2013en_US
dc.description.abstractEncounter-based social networks and encounter-based systems link users who share a location at the same time, as opposed to the traditional social network paradigm of linking users who have an offline friendship. This new approach presents challenges that are fundamentally different from those tackled by previous social network designs. In this paper, we explore the functional and security requirements for these new systems, such as availability, security, and privacy, and present several design options for building secure encounter-based social networks. To highlight these challenges we examine one recently proposed encounter-based social network design and compare it to a set of idealized security and functionality requirements. We show that it is vulnerable to several attacks, including impersonation, collusion, and privacy breaching, even though it was designed specifically for security. Mindful of the possible pitfalls, we construct a flexible framework for secure encounter-based social networks, which can be used to construct networks that offer different security, privacy, and availability guarantees. We describe two example constructions derived from this framework, and consider each in terms of the ideal requirements. Some of our new designs fulfill more requirements in terms of system security, reliability, and privacy than previous work. We also evaluate real-world performance of one of our designs by implementing a proof-of-concept iPhone application called MeetUp. Experiments highlight the potential of our system and hint at the deployability of our designs on a large scale.en_US
dc.description.versionArticle (author version)
dc.identifier.urihttp://hdl.handle.net/2097/17572
dc.language.isoen_USen_US
dc.relation.urihttp://doi.org/10.1109/TDSC.2013.19en_US
dc.rightsThis Item is protected by copyright and/or related rights. You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s).
dc.rights.urihttps://rightsstatements.org/page/InC/1.0/
dc.subjectSocial networksen_US
dc.subjectLocation-based servicesen_US
dc.subjectPrivacyen_US
dc.titleSecure encounter-based mobile social networks: requirements, designs, and trade-offsen_US
dc.typeTexten_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
VassermanIEEE2013.pdf
Size:
430.95 KB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.62 KB
Format:
Item-specific license agreed upon to submission
Description: