DocumentCode :
1765182
Title :
Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs
Author :
Mohaien, Abedelaziz ; Kune, Denis Foo ; Vasserman, Eugene Y. ; Myungsun Kim ; Yongdae Kim
Author_Institution :
VeriSign Labs., Reston, VA, USA
Volume :
10
Issue :
6
fYear :
2013
fDate :
Nov.-Dec. 2013
Firstpage :
380
Lastpage :
393
Abstract :
Encounter-based social networks and encounter-based systems link users who share a location at the same time, as opposed to the traditional social network paradigm of linking users who have an offline friendship. This new approach presents challenges that are fundamentally different from those tackled by previous social network designs. In this paper, we explore the functional and security requirements for these new systems, such as availability, security, and privacy, and present several design options for building secure encounter-based social networks. To highlight these challenges, we examine one recently proposed encounter-based social network design and compare it to a set of idealized security and functionality requirements. We show that it is vulnerable to several attacks, including impersonation, collusion, and privacy breaching, even though it was designed specifically for security. Mindful of the possible pitfalls, we construct a flexible framework for secure encounter-based social networks, which can be used to construct networks that offer different security, privacy, and availability guarantees. We describe two example constructions derived from this framework, and consider each in terms of the ideal requirements. Some of our new designs fulfill more requirements in terms of system security, reliability, and privacy than previous work. We also evaluate real-world performance of one of our designs by implementing a proof-of-concept iPhone application called MeetUp. Experiments highlight the potential of our system and hint at the deployability of our designs on a large scale.
Keywords :
data privacy; mobile computing; security of data; smart phones; social networking (online); MeetUp; collusion attack; encounter-based systems; functional requirements; iPhone application; impersonation attack; privacy breaching; secure encounter-based mobile social network design; security requirements; system privacy; system reliability; system security; Authentication; Mobile communication; Mobile radio mobility management; Privacy; Social network services; Social networks; location-based services; privacy;
fLanguage :
English
Journal_Title :
Dependable and Secure Computing, IEEE Transactions on
Publisher :
ieee
ISSN :
1545-5971
Type :
jour
DOI :
10.1109/TDSC.2013.19
Filename :
6484066
Link To Document :
بازگشت