Work rhythms: analyzing visualizations of awareness histories of distributed groups
CSCW '02 Proceedings of the 2002 ACM conference on Computer supported cooperative work
Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Preserving Privacy in Environments with Location-Based Applications
IEEE Pervasive Computing
Notes on Data Base Operating Systems
Operating Systems, An Advanced Course
Who wants to know what when? privacy preference determinants in ubiquitous computing
CHI '03 Extended Abstracts on Human Factors in Computing Systems
Xen and the art of virtualization
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Exchange-Based Incentive Mechanisms for Peer-to-Peer File Sharing
ICDCS '04 Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'04)
Metadata creation system for mobile images
Proceedings of the 2nd international conference on Mobile systems, applications, and services
An architecture for privacy-sensitive ubiquitous computing
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
DIS '04 Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques
The evolution of storage systems
IBM Systems Journal
Location disclosure to social relations: why, when, & what people want to share
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
MMM2: mobile media metadata for media sharing
CHI '05 Extended Abstracts on Human Factors in Computing Systems
Social Serendipity: Mobilizing Social Software
IEEE Pervasive Computing
The Ubiquitous Camera: An In-Depth Study of Camera Phone Use
IEEE Pervasive Computing
Connections: using context to enhance file search
Proceedings of the twentieth ACM symposium on Operating systems principles
Information revelation and privacy in online social networks
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Reality mining: sensing complex social systems
Personal and Ubiquitous Computing
Mobile Networks and Applications - Special issue: Wireless mobile wireless applications and services on WLAN hotspots
Presence-Exchanges: Toward Sustainable Presence-Sharing
WMCSA '06 Proceedings of the Seventh IEEE Workshop on Mobile Computing Systems & Applications
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
NSDI'06 Proceedings of the 3rd conference on Networked Systems Design & Implementation - Volume 3
Place lab: device positioning using radio beacons in the wild
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Improving wireless privacy with an identifier-free link layer protocol
Proceedings of the 6th international conference on Mobile systems, applications, and services
Micro-Blog: sharing and querying content through mobile phones and social participation
Proceedings of the 6th international conference on Mobile systems, applications, and services
Proceedings of the 11th international symposium on Modeling, analysis and simulation of wireless and mobile systems
MobiSoC: a middleware for mobile social computing applications
Mobile Networks and Applications
Privacy-preserving 802.11 access-point discovery
Proceedings of the second ACM conference on Wireless network security
We saw each other on the subway: secure, anonymous proximity-based missed connections
Proceedings of the 10th workshop on Mobile Computing Systems and Applications
Experimenting in mobile social contexts using JellyNets
Proceedings of the 10th workshop on Mobile Computing Systems and Applications
Cooperative Techniques Supporting Sensor-Based People-Centric Inferencing
Pervasive '08 Proceedings of the 6th International Conference on Pervasive Computing
StarTrack: a framework for enabling track-based applications
Proceedings of the 7th international conference on Mobile systems, applications, and services
SMILE: encounter-based trust for mobile social services
Proceedings of the 16th ACM conference on Computer and communications security
Preserving privacy in location-based mobile social applications
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
CenceMe: injecting sensing presence into social networking applications
EuroSSC'07 Proceedings of the 2nd European conference on Smart sensing and context
Learning automaton based on-line discovery and tracking of spatio-temporal event patterns
PRICAI'10 Proceedings of the 11th Pacific Rim international conference on Trends in artificial intelligence
Privacy-friendly business models for location-based mobile
Journal of Theoretical and Applied Electronic Commerce Research
POSTER: Preserving privacy and accountability for personal devices
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Hi-index | 0.00 |
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both trusted social relations and untrusted strangers. In this paper, we present a system called SmokeScreen that provides flexible and power-efficient mechanisms for privacy management. Broadcasting clique signals, which can only be interpreted by other trusted users, enables sharing between social relations; broadcasting opaque identifiers (OIDs), which can only be resolved to an identity by a trusted broker, enables sharing between strangers. Computing these messages is power-efficient since they can be pre-computed with acceptable storage costs. In evaluating these mechanisms we first analyzed traces from an actual presence-sharing application. Four months of traces provide evidence of anonymous snooping, even among trusted users. We have also implemented our mechanisms on two devices and found the power demands of clique signals and OIDs to be reasonable. A mobile phone running our software can operate for several days on a single charge.