Skip to main content

Security and Privacy Issues in Mobile Social Networks

  • Chapter
  • First Online:
Security and Privacy Preserving in Social Networks

Part of the book series: Lecture Notes in Social Networks ((LNSN))

  • 2713 Accesses

Abstract

Mobile devices are becoming cheaper and resourceful, with more processing power and storage, multiple network interfaces, GPS and a variety of physical sensors, allowing the execution of sophisticated context-aware applications. Through the use of Mobile Social Networks (MSN), users may access, publish and share content generated by them at anytime and anywhere, enhancing their social interactions. MSN applications are characterized by the integration of context information to the social network content, enriching the existing applications and providing new services. On the other hand, the extensive use of context information leads to new privacy and security challenges, which is the scope of this chapter, which aims to describe the main concepts, research challenges and solutions for this area.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://m.facebook.com/.

  2. 2.

    https://mobile.twitter.com/.

  3. 3.

    http://instagr.am/.

  4. 4.

    https://www.google.com/latitude/.

  5. 5.

    https://foursquare.com/.

  6. 6.

    A Captcha is a type of challenge-response test used in computing as an attempt to ensure that the response is generated by a person (human being), not a machine.

  7. 7.

    http://www.flickr.com/.

  8. 8.

    Extensible Messaging and Presence Protocol—http://xmpp.org/.

  9. 9.

    http://www.igniterealtime.org/projects/openfire/.

  10. 10.

    http://www.igniterealtime.org/projects/smack/.

  11. 11.

    http://www.omg.org.

References

  1. An, J., Ko, Y., Lee, D.: A social relation aware routing protocol for mobile ad hoc networks. In: Proceedings of the IEEE International Conference on Pervasive Computing and Communications, PERCOM ’09, pp. 1–6. IEEE Computer Society, Oakland, CA (2009)

    Google Scholar 

  2. Anderson, J., Diaz, C., Bonneau, J., Stajano, F.: Privacy-enabling social networking over untrusted networks. In: Proceedings of the 2nd ACM Workshop on Online Social Networks, WOSN ’09, pp. 1–6. ACM, New York, NY (2009)

    Google Scholar 

  3. Andress, J.: The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. Syngress Media. Elsevier (2011)

    Google Scholar 

  4. Anthony, D., Henderson, T., Kotz, D.: Privacy in location aware computing environments. IEEE Pervasive Comput. 6(4), 64–72 (2007)

    Article  Google Scholar 

  5. Antoniou, Z., Kalofonos, D.: User-centered design of a secure p2p personal and social networking platform. In: Proceedings of the 3rd IASTED International Conference on Human Computer Interaction, HCI ’08, pp. 186–191. ACTA Press, Anaheim, CA (2008)

    Google Scholar 

  6. Ardagna, C.A., Cremonini, M., Damiani, E., di Vimercati, S.D.C., Samarati, P.: Privacy-enhanced location services information. In: Digital Privacy: Theory, Technologies and Practices, pp. 307–326. Auerbach Publications (Taylor and Francis Group) (2007)

    Google Scholar 

  7. Baden, R., Bender, A., Spring, N., Bhattacharjee, B., Starin, D.: Persona: an online social network with user-defined privacy. In: Proceedings of the ACM SIGCOMM 2009 conference on Data communication, SIGCOMM ’09, pp. 135–146. ACM, New York, NY (2009)

    Google Scholar 

  8. Baldauf, M., Dustdar, S., Rosenberg, F.: A survey on context-aware systems. Int. J. Ad Hoc Ubiquitous Comput. 2(4), 263–277 (2007)

    Article  Google Scholar 

  9. Beach, A., Gartrell, M., Akkala, S., Elston, J., Kelley, J., Nishimoto, K., Ray, B., Razgulin, S., Sundaresan, K., Surendar, B., Terada, M., Han, R.: Whozthat? evolving an ecosystem for context-aware mobile social networks. IEEE Netw. 22(4), 50–55 (2008)

    Article  Google Scholar 

  10. Beach, A., Gartrell, M., Han, R.: Solutions to security and privacy issues in mobile social networking. In: Proceedings of the International Conference on Computational Science and Engineering, CSE ’09, vol. 4, pp. 1036–1042 (2009)

    Google Scholar 

  11. Beach, A., Gartrell, M., Xing, X., Han, R., Lv, Q., Mishra, S., Seada, K.: Fusing mobile, sensor, and social data to fully enable context-aware computing. In: Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications, HotMobile ’10, pp. 60–65. ACM, New York, NY (2010)

    Google Scholar 

  12. Beach, A., Raz, B., Buechley, L.: Touch me wear: Getting physical with social networks. In: Proceedings of the 2009 International Conference on Computational Science and Engineering, CSE ’09, vol. 4, pp. 960–965. IEEE Computer Society, Oakland, CA (2009)

    Google Scholar 

  13. Belapurkar, A., Chakrabarti, A., Ponnapalli, H., Varadarajan, N., Padmanabhuni, S., Sundarrajan, S.: Distributed Systems Security: Issues, Processes and Solutions. Wiley, (2009)

    Book  Google Scholar 

  14. Bilge, L., Strufe, T., Balzarotti, D., Kirda, E.: All your contacts are belong to us: automated identity theft attacks on social networks. In: Proceedings of the 18th international conference on World wide web, WWW ’09, pp. 551–560. ACM, New York, NY (2009)

    Google Scholar 

  15. Boix, E.G., Carreton, A.L., Scholliers, C., Van Cutsem, T., De Meuter, W., D’Hondt, T.: Flocks: enabling dynamic group interactions in mobile social networking applications. In: Proceedings of the 2011 ACM Symposium on Applied Computing, SAC ’11, pp. 425–432. ACM, New York, NY (2011)

    Google Scholar 

  16. Bottazzi, D., Montanari, R., Toninelli, A.: Context-aware middleware for anytime, anywhere social networks. IEEE Intell. Syst. 22(5), 23–32 (2007)

    Article  Google Scholar 

  17. Boyd, D., Ellison, N.B.: Social network sites: definition, history, and scholarship. J. Comput. Mediat. Comm. 13(1–2) (2007)

    Google Scholar 

  18. Breslin, J.G., Decker, S., Hauswirth, M., Hynes, G., Phuoc, D.L., Passant, A., Polleres, A., Rabsch, C., Reynolds, V.: Integrating social networks and sensor networks. In: Proceedings of the W3C Workshop on the Future of Social Networking (2009)

    Google Scholar 

  19. Carminati, B., Ferrari, E., Heatherly, R., Kantarcioglu, M., Thuraisingham, B.: Semantic web-based social network access control. Comput. Secur. 30(2–3), 108–115 (2011)

    Article  Google Scholar 

  20. Chang, E., Thomson, P., Dillon, T., Hussain, F.: The fuzzy and dynamic nature of trust. In: Proceedings of the 2nd international Conference on Trust, Privacy, and Security in Digital Business, TrustBus’05, pp. 161–174. Springer, Berlin, Heidelberg (2005)

    Google Scholar 

  21. Chen, G., Rahman, F.: Analyzing privacy designs of mobile social networking applications. In: Proceedings of the IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC ’08, vol. 2, pp. 83–88. IEEE Computer Society, Oakland, CA (2008)

    Google Scholar 

  22. Cutillo, L.A., Molva, R., Strufe, T.: Safebook: A privacy-preserving online social network leveraging on real-life trust. Comm. Mag. 47(12), 94–101 (2009)

    Article  Google Scholar 

  23. David, L., Vasconcelos, R., Alves, L., André, R., Baptista, G., Endler, M.: A communication middleware for scalable real-time mobile collaboration. In: WETICE, pp. 54–59 (2012)

    Google Scholar 

  24. Dey, A.K.: Understanding and using context. Pers. Ubiquitous Comput. 5(1), 4–7 (2001)

    Article  Google Scholar 

  25. Dong, W., Dave, V., Qiu, L., Zhang, Y.: Secure friend discovery in mobile social networks. In: Proceedings of 30th IEEE International Conference on Computer Communications, INFOCOM ’11, pp. 1647–1655. IEEE Computer Society, Oakland, CA (2011)

    Google Scholar 

  26. Douceur, J.R.: The sybil attack. In: Revised Papers from the First International Workshop on Peer-to-Peer Systems, IPTPS ’01, pp. 251–260. Springer, London (2002)

    Google Scholar 

  27. Endler, M., Skyrme, A., Schuster, D., Springer, T.: Defining situated social context for pervasive social computing. In: Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops ’11, pp. 519–524 (2011)

    Google Scholar 

  28. Fang, L., LeFevre, K.: Privacy wizards for social networking sites. In: Proceedings of the 19th International Conference on World Wide Web, WWW ’10, pp. 351–360. ACM, New York, NY (2010)

    Google Scholar 

  29. Ford, B., Strauss, J., Lesniewski-Laas, C., Rhea, S., Kaashoek, F., Morris, R.: Persistent personal names for globally connected mobile devices. In: Proceedings of the 7th Symposium on Operating Systems Design and Implementation, OSDI ’06, pp. 233–248. USENIX Association (2006)

    Google Scholar 

  30. Friedland, G., Sommer, R.: Cybercasing the joint: on the privacy implications of geo-tagging. In: Proceedings of the 5th USENIX Conference on Hot Topics in Security, HotSec’10, pp. 1–8. USENIX Association (2010)

    Google Scholar 

  31. Gao, H., Hu, J., Huang, T., Wang, J., Chen, Y.: Security issues in online social networks. IEEE Internet Comput. 15(4), 56–63 (2011)

    Article  Google Scholar 

  32. Gerlicher, A.R.S.: Developing collaborative xml editing systems. Ph.D. thesis, London, UK (2007)

    Google Scholar 

  33. Grier, C., Thomas, K., Paxson, V., Zhang, M.: @spam: the underground on 140 characters or less. In: Proceedings of the 17th ACM conference on Computer and communications security, CCS ’10, pp. 27–37. ACM, New York, NY (2010)

    Google Scholar 

  34. Guha, S., Tang, K., Francis, P.: Noyb: privacy in online social networks. In: Proceedings of the first workshop on Online social networks, WOSN ’08, pp. 49–54. ACM, New York, NY (2008)

    Google Scholar 

  35. Gupta, A., Kalra, A., Boston, D., Borcea, C.: Mobisoc: a middleware for mobile social computing applications. Mobile Network Appl. 14(1), 35–52 (2009)

    Article  Google Scholar 

  36. He, W., Liu, X., Ren, M.: Location cheating: A security challenge to location-based social network services. In: Proceedings of the 31st International Conference on Distributed Computing Systems, ICDCS ’11, pp. 740–749. IEEE Computer Society, Oakland, CA (2011)

    Google Scholar 

  37. Huang, Q., Liu, Y.: On geo-social network services. In: Proceedings of the 17th International Conference on Geoinformatics, pp. 1–6 (2009)

    Google Scholar 

  38. Joshi, P., Kuo, C.C.J.: Security and privacy in online social networks: A survey. In: Proceedings of the IEEE International Conference on Multimedia and Expo, ICME ’11, pp. 1–6. IEEE Computer Society, Oakland, CA (2011)

    Google Scholar 

  39. Kaes, C.: Xmpp extension protocol – definition of jabber identifiers (jids). Tech. Rep. XEP-0029, XMPP Standards Foundation (2003). URL http://xmpp.org/extensions/xep-0029.pdf

  40. Kalofonos, D.N.: Mynetsec: Intuitive security for peer-to-peer (p2p) personal and social networking services. Tech. Rep. NRC-TR-2007-014, Nokia Research Center Cambridge (2007). URL http://research.nokia.com/files/tr/NRC-TR-2007-014.pdf

  41. Kalofonos, D.N., Antoniou, Z., Reynolds, F.D., Van-Kleek, M., Strauss, J., Wisner, P.: Mynet: A platform for secure p2p personal and social networking services. In: Proceedings of the 6th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom ’08, pp. 135–146 (2008)

    Google Scholar 

  42. Karam, A., Mohamed, N.: Middleware for mobile social networks: A survey. In: Proceedings of the 45th Hawaii International Conference on System Sciences, pp. 1482–1490 (2012)

    Google Scholar 

  43. Kayastha, N., Niyato, D., Wang, P., Hossain, E.: Applications, architectures, and protocol design issues for mobile social networks: A survey. Proc. IEEE 99(12), 2130–2158 (2011)

    Article  Google Scholar 

  44. Kern, S., Braun, P., Rossak, W.: Mobisoft: an agent-based middleware for social-mobile applications. In: Lecture Notes in Computer Science including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics – Proceedings of the International Conference On the Move to Meaningful Internet Systems, OTM’06, pp. 984–993. Springer, Berlin, Heidelberg (2006)

    Google Scholar 

  45. Lee, R., Nia, R., Hsu, J., Levitt, K.N., Rowe, J., Wu, S.F., Ye, S.: Design and implementation of faith, an experimental system to intercept and manipulate online social informatics. In: Proceedings of the 2011 International Conference on Advances in Social Networks Analysis and Mining, ASONAM ’11, pp. 195–202. IEEE Computer Society, Washington, DC (2011)

    Google Scholar 

  46. Li, J., Li, Q.: Decentralized self-management of trust for mobile ad hoc social networks. Int. J. Comput. Netw. Comm. 3(6), 1–17 (2011)

    Google Scholar 

  47. Lübke, R.: Ein framework zur entwicklung mobiler social software auf basis von android. Ph.D. thesis, Dresden, Germany (2011)

    Google Scholar 

  48. Lubke, R., Schuster, D., Schill, A.: Mobilisgroups: Location-based group formation in mobile social networks. In: Proceedings of the 9th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2011, 21–25 March 2011, Seattle, WA, USA, Workshop Proceedings, pp. 502–507. IEEE, Oakland, CA (2011)

    Google Scholar 

  49. Lucas, M.M., Borisov, N.: Flybynight: mitigating the privacy risks of social networking. In: Proceedings of the 7th ACM workshop on Privacy in the electronic society, WPES ’08, pp. 1–8. ACM, New York, NY (2008)

    Google Scholar 

  50. Luo, W., Xie, Q., Hengartner, U.: Facecloak: An architecture for user privacy on social networking sites. In: Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 03, CSE ’09, pp. 26–33. IEEE Computer Society, Washington, DC (2009)

    Google Scholar 

  51. Macropol, K., Singh, A.K.: Content-based modeling and prediction of information dissemination. In: ASONAM, pp. 21–28 (2011)

    Google Scholar 

  52. Mao, H., Shuai, X., Kapadia, A.: Loose tweets: an analysis of privacy leaks on twitter. In: Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, WPES ’11, pp. 1–12. ACM, New York, NY (2011)

    Google Scholar 

  53. Mascetti, S., Bettini, C., Freni, D.: Longitude: centralized privacy-preserving computation of users’ proximity. In: Proceedings of the 6th VLDB Workshop on Secure Data Management, SDM ’09, pp. 142–157. Springer, New York (2009)

    Google Scholar 

  54. Meeder, B., Kelley, P.G., Tam, J., Cranor, L.F.: Rt @iwantprivacy: Widespread violation of privacy settings in the twitter social network. In: Web 2.0 Security & Privacy, W2SP ’10 (2010)

    Google Scholar 

  55. Mármol, F.G., Pérez, G.M.: Security threats scenarios in trust and reputation models for distributed systems. Comput. Secur. 28(7), 545–556 (2009)

    Article  Google Scholar 

  56. Miluzzo, E., Lane, N.D., Fodor, K., Peterson, R., Lu, H., Musolesi, M., Eisenman, S.B., Zheng, X., Campbell, A.T.: Sensing meets mobile social networks: The design, implementation and evaluation of the CenceMe application. In: Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems (SenSys ’08), pp. 337–350. ACM, Raleigh (2008)

    Google Scholar 

  57. Norris, R.: Xmpp extension protocol – ssl/tls integration. Tech. Rep. XEP-0035, XMPP Standards Foundation (2003). URL http://xmpp.org/extensions/xep-0035.pdf

  58. Oyomno, W., Jäppinen, P., Kerttula, E.: Privacy implications of context-aware services. In: Proceedings of the 4th International ICST Conference on Communication System Software and Middleware, COMSWARE ’09, pp. 17:1–17:9. ACM, New York, NY (2009)

    Google Scholar 

  59. Pietiläinen, A.K., Oliver, E., LeBrun, J., Varghese, G., Diot, C.: Mobiclique: middleware for mobile social networking. In: Proceedings of the 2nd ACM workshop on Online social networks, WOSN ’09, pp. 49–54. ACM, New York, NY (2009)

    Google Scholar 

  60. Poslad, S.: Ubiquitous Computing: Smart Devices, Environments and Interactions. Wiley (2009)

    Book  Google Scholar 

  61. Qureshi, B., Min, G., Kouvatsos, D.: A framework for building trust based communities in p2p mobile social networks. In: Proceedings of the 10th IEEE International Conference on Computer and Information Technology, CIT ’10, pp. 567–574. IEEE Computer Society, Oakland, CA (2010)

    Google Scholar 

  62. Rahman, F., Hoque, M.E., Kawsar, F.A., Ahamed, S.I.: Preserve your privacy with pco: A privacy sensitive architecture for context obfuscation for pervasive e-community based applications. In: SocialCom/PASSAT, pp. 41–48 (2010)

    Google Scholar 

  63. Rana, J., Kristiansson, J., Hallberg, J., Synnes, K.: Challenges for mobile social networking applications. In: Proceedings of the International ICST Conference on Communications Infrastructure, Systems and Applications in Europe, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 16, pp. 275–285. Springer, Berlin, Heidelberg (2009)

    Google Scholar 

  64. Schiller, J., Voisard, A.: Location-Based Services. Elsevier Morgan Kaufann Publishers (2004)

    Google Scholar 

  65. Schuster, D., Koren, I., Springer, T., Hering, D., Söllner, B., Endler, M., Schill, A.: Creating applications for real-time collaboration with XMPP and Android on Mobile devices. Handbook of Research on Mobile Software Engineering: Design, Implementation and Emergent Applications. IGI Global (2012)

    Google Scholar 

  66. Schuster, D., Rosi, A., Mamei, M., Springer, T., Endler, M., Zambonelli, F.: Pervasive social context - taxonomy and survey. ACM Trans. Intell. Syst. Tech. 9(4), 1–22 (2012)

    Google Scholar 

  67. Singh, K., Bhola, S., Lee, W.: xbook: redesigning privacy control in social networking platforms. In: Proceedings of the 18th Conference on USENIX Security Symposium, SSYM’09, pp. 249–266. USENIX Association, Berkeley, CA (2009)

    Google Scholar 

  68. Stutzman, F., Kramer-Duffield, J.: Friends only: examining a privacy-enhancing behavior in facebook. In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI ’10, pp. 1553–1562. ACM, New York, NY (2010)

    Google Scholar 

  69. Teles, A., Pinheiro, D., Gonçalves, J., Batista, R., Silva, F., Pinheiro, V., Haeusler, E.,, Endler, M.: Mobilehealthnet: A middleware for mobile social networks in m-health. In: Proceedings of the 3rd International Conference on Wireless Mobile Communication and Healthcare, MobiHealth ’12 (2012)

    Google Scholar 

  70. Tootoonchian, A., Saroiu, S., Ganjali, Y., Wolman, A.: Lockr: better privacy for social networks. In: Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies, CoNEXT ’09, pp. 169–180. ACM, New York, NY (2009)

    Google Scholar 

  71. Vicente, C.R., Freni, D., Bettini, C., Jensen, C.S.: Location-related privacy in geo-social networks. IEEE Internet Comput. 15(3), 20–27 (2011)

    Article  Google Scholar 

  72. Wasserman, S., Faust, K.: Structural Analysis in the Social Sciences, 1st edn. Cambridge University Press, Cambridge (1994)

    Google Scholar 

  73. Xu, W., Zhang, F., Zhu, S.: Toward worm detection in online social networks. In: Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC ’10, pp. 11–20. ACM, New York, NY (2010)

    Google Scholar 

  74. Zhang, C., Sun, J., Zhu, X., Fang, Y.: Privacy and security for online social networks: challenges and opportunities. IEEE Netw. 24(4), 13–18 (2010)

    Article  Google Scholar 

  75. Zhang, D., Wang, Z., Guo, B., Zhou, X., Raychoudhury, V.: A dynamic community creation mechanism in opportunistic mobile social networks. In: Proceedings of the IEEE 3rd International Conference on Social Computing, SocialCom/PASSAT ’11, pp. 509–514 (2011)

    Google Scholar 

  76. Šikšnys, L., Thomsen, J.R., Šaltenis, S., Yiu, M.L.: Private and flexible proximity detection in mobile social networks. In: Proceedings of the 11th International Conference on Mobile Data Management, SDM ’10, pp. 75–84 (2010)

    Google Scholar 

Download references

Acknowledgements

The authors would like to thank FAPEMA (State of Maranhão Research Agency) for the support of this work, grant APP-00932/10, and Jesseildo Gonçalves for his review and suggestions specially concerning the text describing the middleware support for MSNs.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ariel Teles .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag GmbH Wien

About this chapter

Cite this chapter

Teles, A., Silva, F.J., Batista, R. (2013). Security and Privacy Issues in Mobile Social Networks. In: Chbeir, R., Al Bouna, B. (eds) Security and Privacy Preserving in Social Networks. Lecture Notes in Social Networks. Springer, Vienna. https://doi.org/10.1007/978-3-7091-0894-9_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-7091-0894-9_9

  • Published:

  • Publisher Name: Springer, Vienna

  • Print ISBN: 978-3-7091-0893-2

  • Online ISBN: 978-3-7091-0894-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics