Skip to main content

Privacy Preserving Social Mobile Applications

  • Conference paper
  • 1044 Accesses

Abstract

Mobile users can obtain a wide range of services by maintaining associations, and sharing location and social context, with service providers. But multiple associations are cumbersome to maintain, and sharing private information with untrusted providers is risky. Using a trusted broker to mediate interactions by managing interfaces, user identities, context, social network links, policies, and enabling cross-domain associations, results in more privacy and reduced management burden for users, as we show in this paper. We also describe the prototype implementations of two practically useful applications that require awareness of participants’ location and social context: (i) targeted advertising, and (ii) social network-assisted online purchases.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Airtel Money, http://airtelmoney.in

  2. Boku, http://www.boku.com

  3. Buecker, A., et al.: Flexible Policy Management for IT Security Services Using IBM Tivoli Security Policy Manager. IBM Red Paper Publication REDP-451200 (March 17, 2009)

    Google Scholar 

  4. Cimpian, E., Mocan, A., Stollberg, M.: Mediation Enabled Semantic Web Services Usage. In: Mizoguchi, R., Shi, Z.-Z., Giunchiglia, F. (eds.) ASWC 2006. LNCS, vol. 4185, pp. 459–473. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  5. Dahlberg, T., Mallat, N., Ondrus, J., Zmijewska, A.: Past, Present and Future of Mobile Payments Research: A Literature Review. Journal: Electronic Commerce Research and Applications 7(2), 165–181 (2008)

    Google Scholar 

  6. Fauvet, M.C., Aït-Bachir, A.: An Automaton-based Approach for Web Service Mediation. In: Proceedings of the 13th ISPE International Conference on Concurrent Engineering (ISPE CE 2006), Antibes, France, September 18-22 (2006)

    Google Scholar 

  7. Google Wallet, http://www.google.com/wallet

  8. Guha, S., Cheng, B., Francis, P.: Privad: Practical Privacy in Online Advertising. In: 8th Usenix Conf. on Network Systems Design and Implementation (NSDI), Boston, MA (March 2011)

    Google Scholar 

  9. Haidar, D.A., Cuppens-Boulahia, N., Cuppens, F., Debar, H.: Access Negotiation within XACML Architecture. In: Proceedings of the Second Joint Conference on Security in Networks Architectures and Security of Information Systems (SARSSI), Annecy, France (June 2007)

    Google Scholar 

  10. Hammer-Lahav, E., et al.: The Oauth 2.0 Authorization Protocol (January 2011), http://tools.ietf.org/pdf/draft-ietf-oauth-v2-12.pdf

  11. Integration Layer, http://www.opengroup.org/soa/source-book/soa_refarch/integration.htm

  12. Krishnamurthy, B., Wills, C.E.: On the Leakage of Personally Identifiable Information via Online Social Networks. SIGCOMM Comput. Comm. Rev. 40(1), 112–117 (2010)

    Article  Google Scholar 

  13. Loreto, S., Mecklin, T., Opsenica, M., Rissanen, H.M.: Service Broker Architecture: Location Business Case and Mashups. Comm. Mag. 47(4), 97–103 (2009)

    Article  Google Scholar 

  14. Maler, R., Reed, D.: The Venn of Identity: Options and Issues in Federated Identity Management. IEEE Security and Privacy 6(2), 16–23 (2008)

    Article  Google Scholar 

  15. Mas, I., Morawczynski, O.: Designing Mobile Money Services: Lessons from M-PESA. Innovations 4(2), 77–92 (2009)

    Article  Google Scholar 

  16. Mobile Pay USA, http://www.mobilepayusa.com

  17. Ramakrishna, V., Reiher, P., Kleinrock, L.: Distributed Policy Resolution Through Negotiation in Ubiquitous Computing Environments. In: Proceedings of IEEE PerCom 2009, Galveston, TX (March 2009)

    Google Scholar 

  18. Server-Side Authentication, http://developers.facebook.com/docs/authentication/server-side/

  19. Square Inc. (US), https://squareup.com

  20. Verma, M.: XML Security: Control Information Access with XACML, http://www.ibm.com/developerworks/xml/library/x-xacml/

  21. Westerinen, A., et al.: RFC 3198: Terminology for Policy-Based Management (November 2001), http://www.ietf.org/rfc/rfc3198

  22. Gupta, A., Kalra, A., Boston, D., Borcea, C.: MobiSoC: A Middleware for Mobile Social Computing Applications. Mobile Networks and Applications Journal 14(1), 35–52 (2009)

    Article  Google Scholar 

  23. Open Identity Exchange, http://openidentityexchange.org/what-is-a-trust-framework

  24. Conect.Me Trust Framework, https://connect.me/trust

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Ramakrishna, V., Kumar, A., Mukherjea, S. (2013). Privacy Preserving Social Mobile Applications. In: Zheng, K., Li, M., Jiang, H. (eds) Mobile and Ubiquitous Systems: Computing, Networking, and Services. MobiQuitous 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 120. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40238-8_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40238-8_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40237-1

  • Online ISBN: 978-3-642-40238-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics