DocumentCode
1765182
Title
Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs
Author
Mohaien, Abedelaziz ; Kune, Denis Foo ; Vasserman, Eugene Y. ; Myungsun Kim ; Yongdae Kim
Author_Institution
VeriSign Labs., Reston, VA, USA
Volume
10
Issue
6
fYear
2013
fDate
Nov.-Dec. 2013
Firstpage
380
Lastpage
393
Abstract
Encounter-based social networks and encounter-based systems link users who share a location at the same time, as opposed to the traditional social network paradigm of linking users who have an offline friendship. This new approach presents challenges that are fundamentally different from those tackled by previous social network designs. In this paper, we explore the functional and security requirements for these new systems, such as availability, security, and privacy, and present several design options for building secure encounter-based social networks. To highlight these challenges, we examine one recently proposed encounter-based social network design and compare it to a set of idealized security and functionality requirements. We show that it is vulnerable to several attacks, including impersonation, collusion, and privacy breaching, even though it was designed specifically for security. Mindful of the possible pitfalls, we construct a flexible framework for secure encounter-based social networks, which can be used to construct networks that offer different security, privacy, and availability guarantees. We describe two example constructions derived from this framework, and consider each in terms of the ideal requirements. Some of our new designs fulfill more requirements in terms of system security, reliability, and privacy than previous work. We also evaluate real-world performance of one of our designs by implementing a proof-of-concept iPhone application called MeetUp. Experiments highlight the potential of our system and hint at the deployability of our designs on a large scale.
Keywords
data privacy; mobile computing; security of data; smart phones; social networking (online); MeetUp; collusion attack; encounter-based systems; functional requirements; iPhone application; impersonation attack; privacy breaching; secure encounter-based mobile social network design; security requirements; system privacy; system reliability; system security; Authentication; Mobile communication; Mobile radio mobility management; Privacy; Social network services; Social networks; location-based services; privacy;
fLanguage
English
Journal_Title
Dependable and Secure Computing, IEEE Transactions on
Publisher
ieee
ISSN
1545-5971
Type
jour
DOI
10.1109/TDSC.2013.19
Filename
6484066
Link To Document