TITLE

Mobile common friends discovery with friendship ownership and replay-attack resistance

AUTHOR(S)
Chiou, Shin-Yan; Huang, Yao-Hsien
PUB. DATE
November 2013
SOURCE
Wireless Networks (10220038);Nov2013, Vol. 19 Issue 8, p1839
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Online social networking applications are nearly ubiquitous, but are currently limited to trusted infrastructure. For example, two unfamiliar users can exploit their social proximity to discover common friends, but otherwise face considerable difficulty in discovering of things they may have in common. However, social proximity depends on access personal data, raising concerns regarding potential data leakage from databases, the degree of trust in the particular social proximity, and user unwillingness to disclose the nature of personal friendships. Previous works have used mobile middleware to provide alternatives to hosting personal data in a fixed database, but these approaches still require users to divulge private information. Other approaches have used private-preserved decentralized online social networks to solve centralization and privacy issues, but these methods are still subject to other security problems such as mutual authentication, data-spoofing and replay attacks. This paper proposes the development of secure mobile common friends discovery methods to preserve the privacy of friendship data, establish mutual authentication between contact users, provide mutual proof of friendship, and provide protection against friendship spoofing and replay attacks. The proposed methods are shown to be secure and efficient, and are implemented in mobile phones that allow users to find common friends securely in seconds.
ACCESSION #
91257637

 

Related Articles

  • What's on your Facebook wall? Korris, Nejolla // Edmontonians;Spring2014, Vol. 25 Issue 1, p17 

    The article offers the author's insights on the safety of posting online, such as in the social networking site Facebook. She mentions a post on her Facebook wall that asked personal information, such as one's occupation, husband or wife's name, and the country or state one lives in. She offers...

  • El poder de autodeterminación de los datos personales en internet. Palacios González, M. Dolores // IDP: Revista de Internet, Derecho y Politica;may2012, Issue 14, p61 

    The details and scope of data protection in Europe are currently at a turning point. As a result of the appeal lodged with the Spanish National Court by Google group companies against a number of rulings handed down by the Spanish Data Protection Agency, which require the search engine to remove...

  • Time to get personal over data.  // New Scientist;10/5/2013, Vol. 220 Issue 2937, p5 

    The author discusses issues surrounding personal data on the internet and argues for greater awareness of the subject and an ability to control it.

  • EL FENÓMENO DE LAS REDES SOCIALES Y LOS CAMBIOS EN LA VIGENCIA DE LOS DERECHOS FUNDAMENTALES. GIL ANTÓN, ANA MARÍA // Revista de Derecho UNED;2012, Issue 10, p209 

    This research recollects in a synthetic way, one of the most relevant problems the society is facing today, as a consequence of the Internet phenomenon. The routes of social Networks in the daily relations and interactions are consolidating in such a way that is not only affecting the young...

  • Keeping safe on Cyber Monday. EDWARDS, GREG // Corridor Business Journal;11/30/2015, Vol. 12 Issue 19, p16 

    The author offers ways to keep one's Personally Identifiable Information (PII) safe in the coming holiday season which include avoiding phishing ads, staying aware, and watching out for holiday scams.

  • New EU rules will stop US snoops from getting your personal data.  // Computer Active;10/30/2013, Issue 409, p7 

    The article reports on the rules that the European parliament is expected to pass which aimed at blocking dubious transfers of personal data from European Union (EU) countries.

  • Privacy considerations and the modern employer. Williams, Timothy L. // InsideCounsel;Jan2015, Vol. 26 Issue 277, p35 

    The article presents insights from Timothy L. Williams of law firm FordHarrison LLP regarding the modern employer and privacy considerations for employee personal data and information.

  • Introduction. BONNEAU, Vincent; HENTEN, Anders; MANSELL, Robin; PÉREZ AMARAL, Teodosio // Communications & Strategies;2015 1st Quarter, Issue 97, p9 

    An introduction is presented in which the editors discus various reports within the issue on topics including the growth of the big data market, the protection of personal data and business opportunities relating to big data.

  • If Data Is Money, Why Don't Businesses Keep It Secure? Cooper, Tim; LaSalle, Ryan; Wei, Kuangyi // Harvard Business Review Digital Articles;2/10/2015, p2 

    The article discusses ways on how companies should manage their clients' personal data, including maintaining customer's trust to prevent them from stopping using the company, being aware of existing regulations that affect data cost-benefit analysis and collaborating with data rating agencies.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics