skip to main content
10.1145/3022227.3022324acmconferencesArticle/Chapter ViewAbstractPublication PagesicuimcConference Proceedingsconference-collections
research-article

Leveraging BLE and social trust to enable mobile in situ collaborations

Published: 05 January 2017 Publication History

Abstract

Collaborative computing, where co-located mobile devices collaborate to perform a large computing task has emerged as an important computing paradigm. Two key challenges in this paradigm are discovering nearby mobile devices that are willing to participate and establishing trusted connections. This paper presents a middleware layer called CoTrust that addresses these two important issues. CoTrust is comprised of a collaboration protocol for negotiation between a small group of co-located mobile devices over Bluetooth Low Energy (BLE). It incorporates a trust model to enable collaborators to assess the trust level of a collaboration based only on their observed interactions on the social network with their peers. A prototype implementation of CoTrust on Android smartphones demonstrates its feasibility, energy efficiency as well as good performance.

References

[1]
6 new facts about facebook. http://www.pewresearch.org/fact-tank/2014/02/03/6-new-facts-about-facebook/.
[2]
P. Aditya, V. Erdélyi, M. Lentz, E. Shi, B. Bhattacharjee, and P. Druschel. Encore: private, context-based communication for mobile social apps. In MobiSys, 2014.
[3]
K. Alanezi, X. Zhou, L. Chen, and S. Mishra. Panorama: A framework to support collaborative context monitoring on co-located mobile devices. In MobiCASE, 2015.
[4]
D. Blei, A. Ng, and M. Jordan. Latent dirichlet allocation. Journal of machine Learning research, 3(Jan):993--1022, 2003.
[5]
A. de Freitas and A. Dey. The group context framework: an extensible toolkit for opportunistic grouping and collaboration. In CSCW, 2015.
[6]
E. Gilbert and K. Karahalios. Predicting tie strength with social media. In CHI, 2009.
[7]
J. Golbeck. Computing and applying trust in web-based social networks. 2005.
[8]
Ó. Helgason, E. Yavuz, S. Kouyoumdjieva, L. Pajevic, and G. Karlsson. A mobile peer-to-peer system for opportunistic content-centric networking. In MobiHeld, 2010.
[9]
H. Hosseinmardi, S. Mattson, R. Rafiq, R. Han, Q. Lv, and S. Mishra. Analyzing labeled cyberbullying incidents on the instagram social network. In SocInfo, 2015.
[10]
M. Keally, G. Zhou, G. Xing, and J. Wu. Remora: Sensing resource sharing among smartphone-based body sensor networks. In IWQoS, 2013.
[11]
M. Kosinski, S. Matz, S. Gosling, V. Popov, and D. Stillwell. Facebook as a research tool for the social sciences: Opportunities, challenges, ethical considerations, and practical guidelines. American Psychologist, 70(6):543, 2015.
[12]
Y. Lee, Y. Ju, C. Min, S. Kang, I. Hwang, and J. Song. Comon: cooperative ambience monitoring platform with continuity and benefit awareness. In MobiSys, 2012.
[13]
M. Madejski, M. Johnson, and S. Bellovin. A study of privacy settings errors in an online social network. In PERCOM Workshops, 2012.
[14]
E. Miluzzo, C. Cornelius, A. Ramaswamy, T. Choudhury, Z. Liu, and A. Campbell. Darwin phones: the evolution of sensing and inference on mobile phones. In MobiSys, 2010.

Cited By

View all
  • (2021)Incorporating individual and group privacy preferences in the internet of thingsJournal of Ambient Intelligence and Humanized Computing10.1007/s12652-021-02959-713:4(1969-1984)Online publication date: 4-Mar-2021
  • (2018)Trustworthiness of Dynamic Moving Sensors for Secure Mobile Edge ComputingComputers10.3390/computers70400637:4(63)Online publication date: 16-Nov-2018
  • (2018)A Privacy Negotiation Mechanism for the Internet of Things2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00099(512-519)Online publication date: Aug-2018
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
IMCOM '17: Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication
January 2017
746 pages
ISBN:9781450348881
DOI:10.1145/3022227
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 05 January 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. BLE
  2. collaborative
  3. mobile
  4. trust

Qualifiers

  • Research-article

Conference

IMCOM '17
Sponsor:

Acceptance Rates

IMCOM '17 Paper Acceptance Rate 113 of 366 submissions, 31%;
Overall Acceptance Rate 213 of 621 submissions, 34%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 28 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2021)Incorporating individual and group privacy preferences in the internet of thingsJournal of Ambient Intelligence and Humanized Computing10.1007/s12652-021-02959-713:4(1969-1984)Online publication date: 4-Mar-2021
  • (2018)Trustworthiness of Dynamic Moving Sensors for Secure Mobile Edge ComputingComputers10.3390/computers70400637:4(63)Online publication date: 16-Nov-2018
  • (2018)A Privacy Negotiation Mechanism for the Internet of Things2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00099(512-519)Online publication date: Aug-2018
  • (2017)SenseLE: Exploiting Spatial Locality in Decentralized Sensing Environments2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC)10.1109/ISPA/IUCC.2017.00206(1356-1363)Online publication date: Dec-2017
  • (2017)Leveraging sensor data content to assure sensor device trustworthiness in Mobile Edge Computing2017 Second International Conference on Fog and Mobile Edge Computing (FMEC)10.1109/FMEC.2017.7946422(147-152)Online publication date: May-2017

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media