Nothing Special   »   [go: up one dir, main page]

skip to main content
poster

LoKI: location-based PKI for social networks

Published: 15 August 2011 Publication History

Abstract

Decentralized online social networks (OSNs) typically rely on the existence of a public key infrastructure (PKI), but certificate authorities (CAs) cannot scalably identify all of the members of an OSN. Our system, LoKI, uses the ubiquity of mobile devices to exchange secrets during real-world meetings that can be used for the purposes of identification in-band, allowing each user to easily discover the keys of many one-hop relationships in the OSN.
We measure the frequency of such real-world meetings among OSN users with data sets crawled from Facebook, Twitter, and Foursquare. We quantify the resources consumed on the mobile devices in terms of storage and battery based on traces that reveal the number of mobile devices expected to be seen under normal activity. Lastly, we describe a rendezvous service that enables background peer-to-peer (P2P) communication on non-rooted Android phones, which we believe to be a practical and necessary service for many mobile peer-to-peer systems.

References

[1]
R. Baden, N. Spring, and B. Bhattacharjee. Identifying close friends on the internet. In HotNets, 2009.
[2]
R. Baden, phet al. Persona: An online social network with user-defined privacy. In SIGCOMM, 2009.
[3]
A. Haeberlen, P. Kouznetsov, and P. Druschel. Peerreview: practical accountability for distributed systems. In SOSP, 2007.
[4]
D. P. Jablon. Strong password-only authenticated key exchange. SIGCOMM CCR, 1996.
[5]
A. Narayanan, et al. Location privacy via private proximity testing. In NDSS, 2011.
[6]
A. Shamir. How to share a secret. Commun. ACM, 1979.
[7]
A. Whitten, J. D. Tygar, A. Whitten, and J. D. Tygar. Usability of security: A case study. Tech. rep., Carnegie Mellon University, 1998.

Cited By

View all
  • (2014)MoP-2-MoP – Mobile Private MicrobloggingFinancial Cryptography and Data Security10.1007/978-3-662-45472-5_25(384-396)Online publication date: 9-Nov-2014

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM SIGCOMM Computer Communication Review
ACM SIGCOMM Computer Communication Review  Volume 41, Issue 4
SIGCOMM '11
August 2011
480 pages
ISSN:0146-4833
DOI:10.1145/2043164
Issue’s Table of Contents
  • cover image ACM Conferences
    SIGCOMM '11: Proceedings of the ACM SIGCOMM 2011 conference
    August 2011
    502 pages
    ISBN:9781450307970
    DOI:10.1145/2018436
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 August 2011
Published in SIGCOMM-CCR Volume 41, Issue 4

Check for updates

Author Tags

  1. location
  2. mobility
  3. online social networks
  4. public key infrastructure

Qualifiers

  • Poster

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)51
  • Downloads (Last 6 weeks)14
Reflects downloads up to 14 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2014)MoP-2-MoP – Mobile Private MicrobloggingFinancial Cryptography and Data Security10.1007/978-3-662-45472-5_25(384-396)Online publication date: 9-Nov-2014

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media