Social Serendipity: Mobilizing Social Software
IEEE Pervasive Computing
Mobile Networks and Applications - Special issue: Wireless mobile wireless applications and services on WLAN hotspots
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
SmokeScreen: flexible privacy controls for presence-sharing
Proceedings of the 5th international conference on Mobile systems, applications and services
Preserving location privacy in wireless lans
Proceedings of the 5th international conference on Mobile systems, applications and services
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Provenance-aware storage systems
ATEC '06 Proceedings of the annual conference on USENIX '06 Annual Technical Conference
Preventing Location-Based Identity Inference in Anonymous Spatial Queries
IEEE Transactions on Knowledge and Data Engineering
Improving wireless privacy with an identifier-free link layer protocol
Proceedings of the 6th international conference on Mobile systems, applications, and services
Flowers or a robot army?: encouraging awareness & activity with personal, mobile displays
UbiComp '08 Proceedings of the 10th international conference on Ubiquitous computing
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel
Proceedings of the 14th ACM international conference on Mobile computing and networking
Location-based trust for mobile user-generated content: applications, challenges and implementations
Proceedings of the 9th workshop on Mobile computing systems and applications
SS'08 Proceedings of the 17th conference on Security symposium
We saw each other on the subway: secure, anonymous proximity-based missed connections
Proceedings of the 10th workshop on Mobile Computing Systems and Applications
Enabling new mobile applications with location proofs
Proceedings of the 10th workshop on Mobile Computing Systems and Applications
The case for browser provenance
TAPP'09 First workshop on on Theory and practice of provenance
SPATE: small-group PKI-less authenticated trust establishment
Proceedings of the 7th international conference on Mobile systems, applications, and services
On the effectiveness of secret key extraction from wireless signal strength in real environments
Proceedings of the 15th annual international conference on Mobile computing and networking
Information slicing: anonymity using unreliable overlays
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
A formal privacy system and its application to location based services
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Toward trustworthy mobile sensing
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
PROTECT: proximity-based trust-advisor using encounters for mobile societies
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
Trust no one: a decentralized matching service for privacy in location based services
Proceedings of the second ACM SIGCOMM workshop on Networking, systems, and applications on mobile handhelds
Secure encounter-based social networks: requirements, challenges, and designs
Proceedings of the 17th ACM conference on Computer and communications security
Privacy challenges in the online social networking era
Proceedings of the 8th Middleware Doctoral Symposium
FollowMe: enhancing mobile applications with open infrastructure sensing
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications
Adaptive user anonymity for mobile opportunistic networks
Proceedings of the seventh ACM international workshop on Challenged networks
Towards a generic framework for trustworthy spatial crowdsourcing
Proceedings of the 12th International ACM Workshop on Data Engineering for Wireless and Mobile Acess
Hi-index | 0.00 |
Conventional mobile social services such as Loopt and Google Latitude rely on two classes of trusted relationships: participants trust a centralized server to manage their location information and trust between users is based on existing social relationships. Unfortunately, these assumptions are not secure or general enough for many mobile social scenarios: centralized servers cannot always be relied upon to preserve data confidentiality, and users may want to use mobile social services to establish new relationships. To address these shortcomings, this paper describes SMILE, a privacy-preserving "missed-connections" service in which the service provider is untrusted and users are not assumed to have pre-established social relationships with each other. At a high-level, SMILE uses short-range wireless communication and standard cryptographic primitives to mimic the behavior of users in existing missed-connections services such as Craigslist: trust is founded solely on anonymous users' ability to prove to each other that they shared an encounter in the past. We have evaluated SMILE using protocol analysis, an informal study of Craigslist usage, and experiments with a prototype implementation and found it to be both privacy-preserving and feasible.