Advances in Computer Science and Information Technology. Computer Science and Engineering. Second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings, Part II

Research Article

SecureWear: A Framework for Securing Mobile Social Networks

Download
206 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-27308-7_55,
        author={Baishakhi Ray and Richard Han},
        title={SecureWear: A Framework for Securing Mobile Social Networks},
        proceedings={Advances in Computer Science and Information Technology. Computer Science and Engineering. Second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings, Part II},
        proceedings_a={CCSIT PATR II},
        year={2012},
        month={11},
        keywords={mobile computing social network security privacy wearable device},
        doi={10.1007/978-3-642-27308-7_55}
    }
    
  • Baishakhi Ray
    Richard Han
    Year: 2012
    SecureWear: A Framework for Securing Mobile Social Networks
    CCSIT PATR II
    Springer
    DOI: 10.1007/978-3-642-27308-7_55
Baishakhi Ray1,*, Richard Han1,*
  • 1: University of Colorado
*Contact email: baishakhi.ray@gmail.com, rhan@cs.colorado.edu

Abstract

With the rising popularity of social networks, people have started accessing social networking sites from anywhere, any time, and from a variety of devices. Exploiting this ubiquity, the social networking data of an individual can be coupled with her geographical location to build different context aware applications. However, the existing infrastructure to share this personalized data forces users to compromise their privacy. In this paper, we present a secure framework, which allows interaction of social network information with location-based services, without compromising user privacy and security. Through exchanging an encrypted nonce ID (EID) associated with a verified user location, our framework allows location-based services to query its vicinity for relevant information without disclosing user identity. We further argue that, this kind of framework should be adopted as a common security framework for mobile-social interaction to meet privacy requirements.