skip to main content
10.1145/2594368.2594374acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
research-article
Open Access

EnCore: private, context-based communication for mobile social apps

Authors Info & Claims
Published:02 June 2014Publication History

ABSTRACT

Mobile social apps provide sharing and networking opportunities based on a user's location, activity, and set of nearby users. A platform for these apps must meet a wide range of communication needs while ensuring users' control over their privacy. In this paper, we introduce EnCore, a mobile platform that builds on secure encounters between pairs of devices as a foundation for privacy-preserving communication. An encounter occurs whenever two devices are within Bluetooth radio range of each other, and generates a unique encounter ID and associated shared key. EnCore detects nearby users and resources, bootstraps named communication abstractions called events for groups of proximal users, and enables communication and sharing among event participants, while relying on existing network, storage and online social network services. At the same time, EnCore puts users in control of their privacy and the confidentiality of the information they share. Using an Android implementation of EnCore and an app for event-based communication and sharing, we evaluate EnCore's utility using a live testbed deployment with 35 users.

References

  1. AllJoyn. http://www.joyn.org. Last accessed: September 2013.Google ScholarGoogle Scholar
  2. Android Beam. http://developer.android.com/guide/topics/connectivity/nfc/nfc.html#p2p%. Last accessed: June 2013.Google ScholarGoogle Scholar
  3. Bluetooth Specification Core Version 4.0. https://www.bluetooth.org/docman/handlers/downloaddoc.ashx?doc_id=22973%7. Last accessed: March 2014.Google ScholarGoogle Scholar
  4. FireChat. https://itunes.apple.com/us/app/firechat/id719829352?mt=8. Last accessed: March 2014.Google ScholarGoogle Scholar
  5. Foursquare. https://foursquare.com/. Last accessed: June 2013.Google ScholarGoogle Scholar
  6. Friday: automated journal. http://www.fridayed.com/. Last accessed: October 2013.Google ScholarGoogle Scholar
  7. Google fires engineer for violating privacy policies. http://www.physorg.com/news203744839.html. Last accessed: September 2012.Google ScholarGoogle Scholar
  8. Haggle. http://www.haggleproject.org. Last accessed: September 2013.Google ScholarGoogle Scholar
  9. Highlight. http://highlig.ht/. Last accessed: December 2013.Google ScholarGoogle Scholar
  10. iOS 7 AirDrop. http://support.apple.com/kb/HT5887. Last accessed: January 2014.Google ScholarGoogle Scholar
  11. Lokast. http://www.lokast.com. Last accessed: September 2013.Google ScholarGoogle Scholar
  12. Mailinator: Free disposable email. http://mailinator.com/. Last accessed: January 2014.Google ScholarGoogle Scholar
  13. Memoto: automatic lifelogging camera. http://memoto.com/. Last accessed: September 2013.Google ScholarGoogle Scholar
  14. Near Field Communication -- Interface and Protocol (ISO/IEC 18092:2013). http://www.iso.org/iso/home/store/catalogue_ics/catalogue_detail_ics.ht%m?csnumber=56692. Last accessed: September 2013.Google ScholarGoogle Scholar
  15. Nintendo 3DS. http://www.nintendo.com/3ds. Last accessed: September 2013.Google ScholarGoogle Scholar
  16. Secret. https://www.secret.ly/. Last accessed: March 2014.Google ScholarGoogle Scholar
  17. Sony PlayStation Vita. http://us.playstation.com/psvita/. Last accessed: September 2013.Google ScholarGoogle Scholar
  18. Tile. http://www.thetileapp.com/. Last accessed: September 2013.Google ScholarGoogle Scholar
  19. Whisper. http://whisper.sh/. Last accessed: March 2014.Google ScholarGoogle Scholar
  20. Wi-Fi Direct. http://www.wi-fi.org/discover-and-learn/wi-fi-direct. Last accessed: September 2013.Google ScholarGoogle Scholar
  21. N. Aharony, W. Pan, C. Ip, I. Khayal, and A. Pentland. Social fMRI: Investigating and shaping social mechanisms in the real world. Pervasive Mob. Comput., 7(6), Dec. 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. W. Apolinarski, M. Handte, M. U. Iqbal, and P. J. Marrón. Secure interaction with piggybacked key-exchange. Pervasive Mob. Comput., 10, Feb. 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin. Persona: an online social network with user-defined privacy. In Proceedings of the ACM SIGCOMM conference on Data communication, SIGCOMM '09, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. L. B. Baker and J. Finkle. Sony PlayStation suffers massive data breach. http://www.reuters.com/article/2011/04/26/us-sony-stoldendata-idUSTRE73%P6WB20110426. Last accessed: September 2012.Google ScholarGoogle Scholar
  25. M. Bakht, M. Trower, and R. H. Kravets. Searchlight: won't you be my neighbor? In Proceedings of the 18th annual international conference on Mobile computing and networking, MobiCom '12, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. V. Brik, S. Banerjee, M. Gruteser, and S. Oh. Wireless device identification with radiometric signatures. In Proceedings of the 14th ACM international conference on Mobile computing and networking, MobiCom '08, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. J. A. Calandrino, A. Kilzer, A. Narayanan, E. W. Felten, and V. Shmatikov. "you might also like: " privacy risks of collaborative filtering. In Proceedings of the 2011 IEEE Symposium on Security and Privacy, SP '11, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. C. Castelluccia and P. Mutaf. Shake them up!: a movement-based pairing protocol for CPU-constrained devices. In Proceedings of the 3rd international conference on Mobile systems, applications, and services, MobiSys '05, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. L. P. Cox, A. Dalton, and V. Marupadi. Smokescreen: flexible privacy controls for presence-sharing. In Proceedings of the 5th international conference on Mobile systems, applications and services, MobiSys '07, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. E. D. Cristofaro, Y. Lu, and G. Tsudik. Efficient techniques for privacy-preserving sharing of sensitive information. Cryptology ePrint Archive, Report 2011/113, 2011. http://eprint.iacr.org/.Google ScholarGoogle Scholar
  31. W. Diffie and M. Hellman. New Directions in Cryptography. IEEE Transactions on Information Theory, 22(6), nov 1976. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. B. Dodson, I. Vo, T. Purtell, A. Cannon, and M. Lam. Musubi: disintermediated interactive social feeds for mobile devices. In Proceedings of the 21st international conference on World Wide Web, WWW '12, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. P. Dutta and D. Culler. Practical asynchronous neighbor discovery and rendezvous for mobile sensing applications. In Proceedings of the 6th ACM conference on Embedded network sensor systems, SenSys '08, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. B. Ford, J. Strauss, C. Lesniewski-Laas, S. Rhea, F. Kaashoek, and R. Morris. Persistent personal names for globally connected mobile devices. In Proceedings of the 7th symposium on Operating systems design and implementation, OSDI '06, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. M. Goetz and S. Nath. Privacy-aware personalization for mobile advertising. Technical report.Google ScholarGoogle Scholar
  36. B. Greenstein, D. McCoy, J. Pang, T. Kohno, S. Seshan, and D. Wetherall. Improving wireless privacy with an identifier-free link layer protocol. In Proceedings of the 6th international conference on Mobile systems, applications, and services, MobiSys '08, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. S. Guha, M. Jain, and V. N. Padmanabhan. Koi: a location-privacy platform for smartphone apps. In Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation, NSDI'12, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. C. A. Gunter, M. J. May, and S. G. Stubblebine. A formal privacy system and its application to location based services. In Proceedings of the 4th international conference on Privacy Enhancing Technologies, PET'04, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. B. Han and A. Srinivasan. ediscovery: Energy efficient device discovery for mobile opportunistic communications. In Proceedings of the 20th IEEE International Conference on Network Protocols (ICNP), ICNP '12, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. B. Hoh, M. Gruteser, R. Herring, J. Ban, D. Work, J.-C. Herrera, A. M. Bayen, M. Annavaram, and Q. Jacobson. Virtual trip lines for distributed privacy-preserving traffic monitoring. In Proceedings of the 6th international conference on Mobile systems, applications, and services, MobiSys '08, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications. In Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. P. Jappinen, I. Laakkonen, V. Latva, and A. Hamalainen. Bluetooth device surveillance and its implications. WSEAS Transactions on Information Science and Applications, 1(4), Oct. 2004.Google ScholarGoogle Scholar
  43. S. Jarecki and N. Saxena. Authenticated key agreement with key re-use in the short authenticated strings model. In Proceedings of the 7th international conference on Security and cryptography for networks, SCN'10, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias. Preventing location-based identity inference in anonymous spatial queries. IEEE Trans. on Knowl. and Data Eng., 19(12), Dec. 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. A. Kandhalu, K. Lakshmanan, and R. R. Rajkumar. U-connect: a low-latency energy-efficient asynchronous neighbor discovery protocol. In Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks, IPSN '10, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. V. Lenders, E. Koukoumidis, P. Zhang, and M. Martonosi. Location-based trust for mobile user-generated content: applications, challenges and implementations. In Proceedings of the 9th workshop on Mobile computing systems and applications, HotMobile '08, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. M. Lentz, V. Erdelyi, P. Aditya, E. Shi, P. Druschel, and B. Bhattacharjee. SDDR: Light-Weight Cryptographic Discovery for Mobile Encounters. http://www.cs.umd.edu/projects/encore.Google ScholarGoogle Scholar
  48. Y.-H. Lin, A. Studer, H.-C. Hsiao, J. M. McCune, K.-H. Wang, M. Krohn, P.-L. Lin, A. Perrig, H.-M. Sun, and B.-Y. Yang. Spate: small-group pki-less authenticated trust establishment. In Proceedings of the 7th international conference on Mobile systems, applications, and services, MobiSys '09, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. J. Manweiler, R. Scudellari, and L. P. Cox. Smile: encounter-based trust for mobile social services. In Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. R. Mayrhofer and H. Gellersen. Shake well before use: authentication based on accelerometer data. In Proceedings of the 5th international conference on Pervasive computing, PERVASIVE'07, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. J. S. Plank. A tutorial on reed-solomon coding for fault-tolerance in raid-like systems. Software-Practice & Experience, 27(9), Sept. 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. F. Y. Rashid. Epsilon data breach highlights cloud-computing security concerns. http://www.eweek.com/c/a/Security/Epsilon-Data-Breach-Highlights-Cloud-Computing-Security-Concerns-637161/. Last accessed: September 2012.Google ScholarGoogle Scholar
  53. I. S. Reed and G. Solomon. Polynomial codes over certain finite fields. Journal of the Society for Industrial & Applied Mathematics, 8(2), jun 1960.Google ScholarGoogle Scholar
  54. S. Saroiu and A. Wolman. Enabling new mobile applications with location proofs. In Proceedings of the 10th workshop on Mobile Computing Systems and Applications, HotMobile '09, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. A. Schulman, T. Schmid, P. Dutta, and N. Spring. Demo: Phone power monitoring with BattOr. In In the 17th ACM international conference on Mobile computing and networking, MobiCom '11, 2011.Google ScholarGoogle Scholar
  56. R. Shokri, G. Theodorakopoulos, J.-Y. Le Boudec, and J.-P. Hubaux. Quantifying location privacy. In Proceedings of the 2011 IEEE Symposium on Security and Privacy, SP '11, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. J. Su, J. Scott, P. Hui, J. Crowcroft, E. De Lara, C. Diot, A. Goel, M. H. Lim, and E. Upton. Haggle: seamless networking for mobile applications. In Proceedings of the 9th international conference on Ubiquitous computing, UbiComp '07, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. W.-T. Tan, M. Baker, B. Lee, and R. Samadani. The sound of silence. In Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems, SenSys '13, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. K. Thomas. Microsoft cloud data breach heralds things to come. http://www.pcworld.com/article/214775/microsoft_cloud_data_breach_sign_of_future.html. Last accessed: September 2012.Google ScholarGoogle Scholar
  60. W. Wang, V. Srinivasan, and M. Motani. Adaptive contact probing mechanisms for delay tolerant applications. In Proceedings of the 13th annual ACM international conference on Mobile computing and networking, MobiCom '07, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. EnCore: private, context-based communication for mobile social apps

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      MobiSys '14: Proceedings of the 12th annual international conference on Mobile systems, applications, and services
      June 2014
      410 pages
      ISBN:9781450327930
      DOI:10.1145/2594368

      Copyright © 2014 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 2 June 2014

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      MobiSys '14 Paper Acceptance Rate25of185submissions,14%Overall Acceptance Rate274of1,679submissions,16%

      Upcoming Conference

      MOBISYS '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    ePub

    View this article in ePub.

    View ePub