DC Field | Value | Language |
---|---|---|
dc.contributor.author | Mohaien, Abedelaziz | ko |
dc.contributor.author | Kune, Denis Foo | ko |
dc.contributor.author | Vasserman, Eugene Y. | ko |
dc.contributor.author | Kim, Myungsun | ko |
dc.contributor.author | Kim, Yongdae | ko |
dc.date.accessioned | 2014-09-01T07:44:54Z | - |
dc.date.available | 2014-09-01T07:44:54Z | - |
dc.date.created | 2013-12-12 | - |
dc.date.created | 2013-12-12 | - |
dc.date.issued | 2013-11 | - |
dc.identifier.citation | IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.10, no.6, pp.380 - 393 | - |
dc.identifier.issn | 1545-5971 | - |
dc.identifier.uri | http://hdl.handle.net/10203/189353 | - |
dc.description.abstract | Encounter-based social networks and encounter-based systems link users who share a location at the same time, as opposed to the traditional social network paradigm of linking users who have an offline friendship. This new approach presents challenges that are fundamentally different from those tackled by previous social network designs. In this paper, we explore the functional and security requirements for these new systems, such as availability, security, and privacy, and present several design options for building secure encounter-based social networks. To highlight these challenges, we examine one recently proposed encounter-based social network design and compare it to a set of idealized security and functionality requirements. We show that it is vulnerable to several attacks, including impersonation, collusion, and privacy breaching, even though it was designed specifically for security. Mindful of the possible pitfalls, we construct a flexible framework for secure encounter-based social networks, which can be used to construct networks that offer different security, privacy, and availability guarantees. We describe two example constructions derived from this framework, and consider each in terms of the ideal requirements. Some of our new designs fulfill more requirements in terms of system security, reliability, and privacy than previous work. We also evaluate real-world performance of one of our designs by implementing a proof-of-concept iPhone application called MeetUp. Experiments highlight the potential of our system and hint at the deployability of our designs on a large scale. | - |
dc.language | English | - |
dc.publisher | IEEE COMPUTER SOC | - |
dc.title | Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs | - |
dc.type | Article | - |
dc.identifier.wosid | 000326835700005 | - |
dc.identifier.scopusid | 2-s2.0-84897800670 | - |
dc.type.rims | ART | - |
dc.citation.volume | 10 | - |
dc.citation.issue | 6 | - |
dc.citation.beginningpage | 380 | - |
dc.citation.endingpage | 393 | - |
dc.citation.publicationname | IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING | - |
dc.identifier.doi | 10.1109/TDSC.2013.19 | - |
dc.embargo.liftdate | 9999-12-31 | - |
dc.embargo.terms | 9999-12-31 | - |
dc.contributor.localauthor | Kim, Yongdae | - |
dc.contributor.nonIdAuthor | Mohaien, Abedelaziz | - |
dc.contributor.nonIdAuthor | Kune, Denis Foo | - |
dc.contributor.nonIdAuthor | Vasserman, Eugene Y. | - |
dc.contributor.nonIdAuthor | Kim, Myungsun | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | Social networks | - |
dc.subject.keywordAuthor | location-based services | - |
dc.subject.keywordAuthor | privacy | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.