Abstract
Mobile devices are becoming cheaper and resourceful, with more processing power and storage, multiple network interfaces, GPS and a variety of physical sensors, allowing the execution of sophisticated context-aware applications. Through the use of Mobile Social Networks (MSN), users may access, publish and share content generated by them at anytime and anywhere, enhancing their social interactions. MSN applications are characterized by the integration of context information to the social network content, enriching the existing applications and providing new services. On the other hand, the extensive use of context information leads to new privacy and security challenges, which is the scope of this chapter, which aims to describe the main concepts, research challenges and solutions for this area.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
- 3.
- 4.
- 5.
- 6.
A Captcha is a type of challenge-response test used in computing as an attempt to ensure that the response is generated by a person (human being), not a machine.
- 7.
- 8.
Extensible Messaging and Presence Protocol—http://xmpp.org/.
- 9.
- 10.
- 11.
References
An, J., Ko, Y., Lee, D.: A social relation aware routing protocol for mobile ad hoc networks. In: Proceedings of the IEEE International Conference on Pervasive Computing and Communications, PERCOM ’09, pp. 1–6. IEEE Computer Society, Oakland, CA (2009)
Anderson, J., Diaz, C., Bonneau, J., Stajano, F.: Privacy-enabling social networking over untrusted networks. In: Proceedings of the 2nd ACM Workshop on Online Social Networks, WOSN ’09, pp. 1–6. ACM, New York, NY (2009)
Andress, J.: The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. Syngress Media. Elsevier (2011)
Anthony, D., Henderson, T., Kotz, D.: Privacy in location aware computing environments. IEEE Pervasive Comput. 6(4), 64–72 (2007)
Antoniou, Z., Kalofonos, D.: User-centered design of a secure p2p personal and social networking platform. In: Proceedings of the 3rd IASTED International Conference on Human Computer Interaction, HCI ’08, pp. 186–191. ACTA Press, Anaheim, CA (2008)
Ardagna, C.A., Cremonini, M., Damiani, E., di Vimercati, S.D.C., Samarati, P.: Privacy-enhanced location services information. In: Digital Privacy: Theory, Technologies and Practices, pp. 307–326. Auerbach Publications (Taylor and Francis Group) (2007)
Baden, R., Bender, A., Spring, N., Bhattacharjee, B., Starin, D.: Persona: an online social network with user-defined privacy. In: Proceedings of the ACM SIGCOMM 2009 conference on Data communication, SIGCOMM ’09, pp. 135–146. ACM, New York, NY (2009)
Baldauf, M., Dustdar, S., Rosenberg, F.: A survey on context-aware systems. Int. J. Ad Hoc Ubiquitous Comput. 2(4), 263–277 (2007)
Beach, A., Gartrell, M., Akkala, S., Elston, J., Kelley, J., Nishimoto, K., Ray, B., Razgulin, S., Sundaresan, K., Surendar, B., Terada, M., Han, R.: Whozthat? evolving an ecosystem for context-aware mobile social networks. IEEE Netw. 22(4), 50–55 (2008)
Beach, A., Gartrell, M., Han, R.: Solutions to security and privacy issues in mobile social networking. In: Proceedings of the International Conference on Computational Science and Engineering, CSE ’09, vol. 4, pp. 1036–1042 (2009)
Beach, A., Gartrell, M., Xing, X., Han, R., Lv, Q., Mishra, S., Seada, K.: Fusing mobile, sensor, and social data to fully enable context-aware computing. In: Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications, HotMobile ’10, pp. 60–65. ACM, New York, NY (2010)
Beach, A., Raz, B., Buechley, L.: Touch me wear: Getting physical with social networks. In: Proceedings of the 2009 International Conference on Computational Science and Engineering, CSE ’09, vol. 4, pp. 960–965. IEEE Computer Society, Oakland, CA (2009)
Belapurkar, A., Chakrabarti, A., Ponnapalli, H., Varadarajan, N., Padmanabhuni, S., Sundarrajan, S.: Distributed Systems Security: Issues, Processes and Solutions. Wiley, (2009)
Bilge, L., Strufe, T., Balzarotti, D., Kirda, E.: All your contacts are belong to us: automated identity theft attacks on social networks. In: Proceedings of the 18th international conference on World wide web, WWW ’09, pp. 551–560. ACM, New York, NY (2009)
Boix, E.G., Carreton, A.L., Scholliers, C., Van Cutsem, T., De Meuter, W., D’Hondt, T.: Flocks: enabling dynamic group interactions in mobile social networking applications. In: Proceedings of the 2011 ACM Symposium on Applied Computing, SAC ’11, pp. 425–432. ACM, New York, NY (2011)
Bottazzi, D., Montanari, R., Toninelli, A.: Context-aware middleware for anytime, anywhere social networks. IEEE Intell. Syst. 22(5), 23–32 (2007)
Boyd, D., Ellison, N.B.: Social network sites: definition, history, and scholarship. J. Comput. Mediat. Comm. 13(1–2) (2007)
Breslin, J.G., Decker, S., Hauswirth, M., Hynes, G., Phuoc, D.L., Passant, A., Polleres, A., Rabsch, C., Reynolds, V.: Integrating social networks and sensor networks. In: Proceedings of the W3C Workshop on the Future of Social Networking (2009)
Carminati, B., Ferrari, E., Heatherly, R., Kantarcioglu, M., Thuraisingham, B.: Semantic web-based social network access control. Comput. Secur. 30(2–3), 108–115 (2011)
Chang, E., Thomson, P., Dillon, T., Hussain, F.: The fuzzy and dynamic nature of trust. In: Proceedings of the 2nd international Conference on Trust, Privacy, and Security in Digital Business, TrustBus’05, pp. 161–174. Springer, Berlin, Heidelberg (2005)
Chen, G., Rahman, F.: Analyzing privacy designs of mobile social networking applications. In: Proceedings of the IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC ’08, vol. 2, pp. 83–88. IEEE Computer Society, Oakland, CA (2008)
Cutillo, L.A., Molva, R., Strufe, T.: Safebook: A privacy-preserving online social network leveraging on real-life trust. Comm. Mag. 47(12), 94–101 (2009)
David, L., Vasconcelos, R., Alves, L., André, R., Baptista, G., Endler, M.: A communication middleware for scalable real-time mobile collaboration. In: WETICE, pp. 54–59 (2012)
Dey, A.K.: Understanding and using context. Pers. Ubiquitous Comput. 5(1), 4–7 (2001)
Dong, W., Dave, V., Qiu, L., Zhang, Y.: Secure friend discovery in mobile social networks. In: Proceedings of 30th IEEE International Conference on Computer Communications, INFOCOM ’11, pp. 1647–1655. IEEE Computer Society, Oakland, CA (2011)
Douceur, J.R.: The sybil attack. In: Revised Papers from the First International Workshop on Peer-to-Peer Systems, IPTPS ’01, pp. 251–260. Springer, London (2002)
Endler, M., Skyrme, A., Schuster, D., Springer, T.: Defining situated social context for pervasive social computing. In: Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops ’11, pp. 519–524 (2011)
Fang, L., LeFevre, K.: Privacy wizards for social networking sites. In: Proceedings of the 19th International Conference on World Wide Web, WWW ’10, pp. 351–360. ACM, New York, NY (2010)
Ford, B., Strauss, J., Lesniewski-Laas, C., Rhea, S., Kaashoek, F., Morris, R.: Persistent personal names for globally connected mobile devices. In: Proceedings of the 7th Symposium on Operating Systems Design and Implementation, OSDI ’06, pp. 233–248. USENIX Association (2006)
Friedland, G., Sommer, R.: Cybercasing the joint: on the privacy implications of geo-tagging. In: Proceedings of the 5th USENIX Conference on Hot Topics in Security, HotSec’10, pp. 1–8. USENIX Association (2010)
Gao, H., Hu, J., Huang, T., Wang, J., Chen, Y.: Security issues in online social networks. IEEE Internet Comput. 15(4), 56–63 (2011)
Gerlicher, A.R.S.: Developing collaborative xml editing systems. Ph.D. thesis, London, UK (2007)
Grier, C., Thomas, K., Paxson, V., Zhang, M.: @spam: the underground on 140 characters or less. In: Proceedings of the 17th ACM conference on Computer and communications security, CCS ’10, pp. 27–37. ACM, New York, NY (2010)
Guha, S., Tang, K., Francis, P.: Noyb: privacy in online social networks. In: Proceedings of the first workshop on Online social networks, WOSN ’08, pp. 49–54. ACM, New York, NY (2008)
Gupta, A., Kalra, A., Boston, D., Borcea, C.: Mobisoc: a middleware for mobile social computing applications. Mobile Network Appl. 14(1), 35–52 (2009)
He, W., Liu, X., Ren, M.: Location cheating: A security challenge to location-based social network services. In: Proceedings of the 31st International Conference on Distributed Computing Systems, ICDCS ’11, pp. 740–749. IEEE Computer Society, Oakland, CA (2011)
Huang, Q., Liu, Y.: On geo-social network services. In: Proceedings of the 17th International Conference on Geoinformatics, pp. 1–6 (2009)
Joshi, P., Kuo, C.C.J.: Security and privacy in online social networks: A survey. In: Proceedings of the IEEE International Conference on Multimedia and Expo, ICME ’11, pp. 1–6. IEEE Computer Society, Oakland, CA (2011)
Kaes, C.: Xmpp extension protocol – definition of jabber identifiers (jids). Tech. Rep. XEP-0029, XMPP Standards Foundation (2003). URL http://xmpp.org/extensions/xep-0029.pdf
Kalofonos, D.N.: Mynetsec: Intuitive security for peer-to-peer (p2p) personal and social networking services. Tech. Rep. NRC-TR-2007-014, Nokia Research Center Cambridge (2007). URL http://research.nokia.com/files/tr/NRC-TR-2007-014.pdf
Kalofonos, D.N., Antoniou, Z., Reynolds, F.D., Van-Kleek, M., Strauss, J., Wisner, P.: Mynet: A platform for secure p2p personal and social networking services. In: Proceedings of the 6th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom ’08, pp. 135–146 (2008)
Karam, A., Mohamed, N.: Middleware for mobile social networks: A survey. In: Proceedings of the 45th Hawaii International Conference on System Sciences, pp. 1482–1490 (2012)
Kayastha, N., Niyato, D., Wang, P., Hossain, E.: Applications, architectures, and protocol design issues for mobile social networks: A survey. Proc. IEEE 99(12), 2130–2158 (2011)
Kern, S., Braun, P., Rossak, W.: Mobisoft: an agent-based middleware for social-mobile applications. In: Lecture Notes in Computer Science including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics – Proceedings of the International Conference On the Move to Meaningful Internet Systems, OTM’06, pp. 984–993. Springer, Berlin, Heidelberg (2006)
Lee, R., Nia, R., Hsu, J., Levitt, K.N., Rowe, J., Wu, S.F., Ye, S.: Design and implementation of faith, an experimental system to intercept and manipulate online social informatics. In: Proceedings of the 2011 International Conference on Advances in Social Networks Analysis and Mining, ASONAM ’11, pp. 195–202. IEEE Computer Society, Washington, DC (2011)
Li, J., Li, Q.: Decentralized self-management of trust for mobile ad hoc social networks. Int. J. Comput. Netw. Comm. 3(6), 1–17 (2011)
Lübke, R.: Ein framework zur entwicklung mobiler social software auf basis von android. Ph.D. thesis, Dresden, Germany (2011)
Lubke, R., Schuster, D., Schill, A.: Mobilisgroups: Location-based group formation in mobile social networks. In: Proceedings of the 9th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2011, 21–25 March 2011, Seattle, WA, USA, Workshop Proceedings, pp. 502–507. IEEE, Oakland, CA (2011)
Lucas, M.M., Borisov, N.: Flybynight: mitigating the privacy risks of social networking. In: Proceedings of the 7th ACM workshop on Privacy in the electronic society, WPES ’08, pp. 1–8. ACM, New York, NY (2008)
Luo, W., Xie, Q., Hengartner, U.: Facecloak: An architecture for user privacy on social networking sites. In: Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 03, CSE ’09, pp. 26–33. IEEE Computer Society, Washington, DC (2009)
Macropol, K., Singh, A.K.: Content-based modeling and prediction of information dissemination. In: ASONAM, pp. 21–28 (2011)
Mao, H., Shuai, X., Kapadia, A.: Loose tweets: an analysis of privacy leaks on twitter. In: Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, WPES ’11, pp. 1–12. ACM, New York, NY (2011)
Mascetti, S., Bettini, C., Freni, D.: Longitude: centralized privacy-preserving computation of users’ proximity. In: Proceedings of the 6th VLDB Workshop on Secure Data Management, SDM ’09, pp. 142–157. Springer, New York (2009)
Meeder, B., Kelley, P.G., Tam, J., Cranor, L.F.: Rt @iwantprivacy: Widespread violation of privacy settings in the twitter social network. In: Web 2.0 Security & Privacy, W2SP ’10 (2010)
Mármol, F.G., Pérez, G.M.: Security threats scenarios in trust and reputation models for distributed systems. Comput. Secur. 28(7), 545–556 (2009)
Miluzzo, E., Lane, N.D., Fodor, K., Peterson, R., Lu, H., Musolesi, M., Eisenman, S.B., Zheng, X., Campbell, A.T.: Sensing meets mobile social networks: The design, implementation and evaluation of the CenceMe application. In: Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems (SenSys ’08), pp. 337–350. ACM, Raleigh (2008)
Norris, R.: Xmpp extension protocol – ssl/tls integration. Tech. Rep. XEP-0035, XMPP Standards Foundation (2003). URL http://xmpp.org/extensions/xep-0035.pdf
Oyomno, W., Jäppinen, P., Kerttula, E.: Privacy implications of context-aware services. In: Proceedings of the 4th International ICST Conference on Communication System Software and Middleware, COMSWARE ’09, pp. 17:1–17:9. ACM, New York, NY (2009)
Pietiläinen, A.K., Oliver, E., LeBrun, J., Varghese, G., Diot, C.: Mobiclique: middleware for mobile social networking. In: Proceedings of the 2nd ACM workshop on Online social networks, WOSN ’09, pp. 49–54. ACM, New York, NY (2009)
Poslad, S.: Ubiquitous Computing: Smart Devices, Environments and Interactions. Wiley (2009)
Qureshi, B., Min, G., Kouvatsos, D.: A framework for building trust based communities in p2p mobile social networks. In: Proceedings of the 10th IEEE International Conference on Computer and Information Technology, CIT ’10, pp. 567–574. IEEE Computer Society, Oakland, CA (2010)
Rahman, F., Hoque, M.E., Kawsar, F.A., Ahamed, S.I.: Preserve your privacy with pco: A privacy sensitive architecture for context obfuscation for pervasive e-community based applications. In: SocialCom/PASSAT, pp. 41–48 (2010)
Rana, J., Kristiansson, J., Hallberg, J., Synnes, K.: Challenges for mobile social networking applications. In: Proceedings of the International ICST Conference on Communications Infrastructure, Systems and Applications in Europe, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 16, pp. 275–285. Springer, Berlin, Heidelberg (2009)
Schiller, J., Voisard, A.: Location-Based Services. Elsevier Morgan Kaufann Publishers (2004)
Schuster, D., Koren, I., Springer, T., Hering, D., Söllner, B., Endler, M., Schill, A.: Creating applications for real-time collaboration with XMPP and Android on Mobile devices. Handbook of Research on Mobile Software Engineering: Design, Implementation and Emergent Applications. IGI Global (2012)
Schuster, D., Rosi, A., Mamei, M., Springer, T., Endler, M., Zambonelli, F.: Pervasive social context - taxonomy and survey. ACM Trans. Intell. Syst. Tech. 9(4), 1–22 (2012)
Singh, K., Bhola, S., Lee, W.: xbook: redesigning privacy control in social networking platforms. In: Proceedings of the 18th Conference on USENIX Security Symposium, SSYM’09, pp. 249–266. USENIX Association, Berkeley, CA (2009)
Stutzman, F., Kramer-Duffield, J.: Friends only: examining a privacy-enhancing behavior in facebook. In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI ’10, pp. 1553–1562. ACM, New York, NY (2010)
Teles, A., Pinheiro, D., Gonçalves, J., Batista, R., Silva, F., Pinheiro, V., Haeusler, E.,, Endler, M.: Mobilehealthnet: A middleware for mobile social networks in m-health. In: Proceedings of the 3rd International Conference on Wireless Mobile Communication and Healthcare, MobiHealth ’12 (2012)
Tootoonchian, A., Saroiu, S., Ganjali, Y., Wolman, A.: Lockr: better privacy for social networks. In: Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies, CoNEXT ’09, pp. 169–180. ACM, New York, NY (2009)
Vicente, C.R., Freni, D., Bettini, C., Jensen, C.S.: Location-related privacy in geo-social networks. IEEE Internet Comput. 15(3), 20–27 (2011)
Wasserman, S., Faust, K.: Structural Analysis in the Social Sciences, 1st edn. Cambridge University Press, Cambridge (1994)
Xu, W., Zhang, F., Zhu, S.: Toward worm detection in online social networks. In: Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC ’10, pp. 11–20. ACM, New York, NY (2010)
Zhang, C., Sun, J., Zhu, X., Fang, Y.: Privacy and security for online social networks: challenges and opportunities. IEEE Netw. 24(4), 13–18 (2010)
Zhang, D., Wang, Z., Guo, B., Zhou, X., Raychoudhury, V.: A dynamic community creation mechanism in opportunistic mobile social networks. In: Proceedings of the IEEE 3rd International Conference on Social Computing, SocialCom/PASSAT ’11, pp. 509–514 (2011)
Šikšnys, L., Thomsen, J.R., Šaltenis, S., Yiu, M.L.: Private and flexible proximity detection in mobile social networks. In: Proceedings of the 11th International Conference on Mobile Data Management, SDM ’10, pp. 75–84 (2010)
Acknowledgements
The authors would like to thank FAPEMA (State of Maranhão Research Agency) for the support of this work, grant APP-00932/10, and Jesseildo Gonçalves for his review and suggestions specially concerning the text describing the middleware support for MSNs.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag GmbH Wien
About this chapter
Cite this chapter
Teles, A., Silva, F.J., Batista, R. (2013). Security and Privacy Issues in Mobile Social Networks. In: Chbeir, R., Al Bouna, B. (eds) Security and Privacy Preserving in Social Networks. Lecture Notes in Social Networks. Springer, Vienna. https://doi.org/10.1007/978-3-7091-0894-9_9
Download citation
DOI: https://doi.org/10.1007/978-3-7091-0894-9_9
Published:
Publisher Name: Springer, Vienna
Print ISBN: 978-3-7091-0893-2
Online ISBN: 978-3-7091-0894-9
eBook Packages: Computer ScienceComputer Science (R0)