Nothing Special   »   [go: up one dir, main page]

Skip to main content

Remorabook: Privacy-Preserving Mobile Social Networking Based on Remora Computing

  • Conference paper
  • First Online:
Wireless Artificial Intelligent Computing Systems and Applications (WASA 2024)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14998))

  • 8 Accesses

Abstract

Scandals on online social networking have greatly raised privacy concerns regarding the massive amount of personal information stored on social networking platforms. The privacy issues are rooted in the current design of online social networking. On one hand, users have to share their personal information with social networking service providers for networking purposes. On the other hand, the sharing essentially allows the service providers to own the data, and the sharing may result in various privacy issues due to the business model of the service providers. In this paper, we propose RemoraBook to solve the privacy issues in online social networking with Remora Computing, inspired by remora fishes known for traveling effortlessly by attaching themselves to large marine animals such as sharks. Remora Computing enables RemoraBook users to utilize facilities available from service providers to build social networks without sharing information to service providers. The networking function and messaging function of RemoraBook are implemented based on Facebook and Gmail facilities respectively. Our extensive experiments on RemoraBook show that social networks can be reliably built in RemoraBook without significant degradation on usability.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 74.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Alice should not be concerned with sharing her Facebook username and password with the RemoraBook application because the data in her Facebook profile can be filled randomly and her actual data in the RemoraBook profile is encrypted and hidden in profiles pictures of her Facebook account.

References

  1. Walsh, S.: The Top 10 Social Media Sites and Platforms. https://www.searchenginejournal.com/social-media/social-media-platforms/. Accessed 2 Feb 2024

  2. Mason, P.: Facebook’s Data-sharing Deals Exposed. https://www.bbc.com/news/technology-46618582. Accessed 12 Apr 2020

  3. Hern, A.: How to Check Whether Facebook Shared Your Data with Cambridge Analytica. https://www.theguardian.com/technology/2018/apr/10/facebook-notify-users-data-harvested-cambridge-analytica. Accessed 12 Apr 2020

  4. Rosenberg, M., Confessore, N., Cadwalladr, C.: How Trump Consultants Exploited the Facebook Data of Millions. https://www.nytimes.com/2018/03/17/us/politics/cambridge-analytica-trump-campaign.html. Accessed 2 Apr 2020

  5. Wikipedia Contributors. Facebook-Cambridge Analytica Data Scandal Wikipedia, The Free Encyclopedia. https://en.wikipedia.org/w/index.php?title=Facebook. Accessed 10 May 2020

  6. Ralph, G., Alessandro, A., John Heinz, H.: Information revelation and privacy in Online Social Networks (The Facebook Case). In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society (WPES 2005), pp. 71–80 (2005)

    Google Scholar 

  7. Acquisti, A., Gross, R.: Imagined communities: awareness, information sharing, and privacy on the Facebook. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 36–58. Springer, Heidelberg (2006). https://doi.org/10.1007/11957454_3

    Chapter  Google Scholar 

  8. Krishnamurthy, B., Wills, C.E. (eds.) Characterizing Privacy in Online Social Networks. Association for Computing Machinery (2008)

    Google Scholar 

  9. Krishnamurthy, B., Craig, W.: On the leakage of personally identifiable information via Online Social Networks. Comput. Commun. Rev. 40, 112–117 (2010)

    Google Scholar 

  10. He, J., Chu, W., Liu, Z.: Inferring Privacy Information from Social Networks, vol. 3975, pp. 154–165 (2006)

    Google Scholar 

  11. Lindamood, J., Heatherly, R., Kantarcioglu, M., Thuraisingham, B.M.: Inferring Private Information Using Social Network Data, pp. 1145–1146. Association for Computing Machinery (2009)

    Google Scholar 

  12. Elena, Z., Lise, G.: To join or not to join: the illusion of privacy in Social Networks with mixed public and private user profiles. IN: Proceedings of the 18th International Conference on World Wide Web, pp. 531–540 (2009)

    Google Scholar 

  13. Humbert, M., Studer, T., Grossglauser, M., Hubaux, J.-P.: Nowhere to hide: navigating around privacy in Online Social Networks. In: ESORICS, pp. 682–699 (2013)

    Google Scholar 

  14. Chaabane, A., Acs, G., Kaafar, M.A.: You are what you like! Information leakage through users’ interests. In: Proceedings of the Annual Network and Distributed System Security Symposium (2012). http://www.csd.uoc.gr/~hy558/papers/leakage_ndss.pdf

  15. Yamada, A., Kim, T.H.-J., Perrig, A.: Exploiting privacy policy conflicts in Online Social Networks (CMU-CyLab-12-005), pp. 1–9 (2012)

    Google Scholar 

  16. Ratan, D., Cong, T., Keith, R., Nitesh, S.: Estimating age privacy leakage in Online Social Networks. In: Proceedings of the IEEE INFOCOM, pp. 2836–2840 (2012)

    Google Scholar 

  17. Wagner, K.: This is how Facebook uses your data for ad targeting. https://www.vox.com/2018/4/11/17177842/facebook-advertising-ads-explained-mark-zuckerberg. Accessed 11 Mar 2020

  18. Zuckerberg, M.: Facebook. https://www.facebook.com/help/336320879782850/?helpref=hc_fnav. Accessed 11 Mar 2020

  19. ScrapersnBots. (2018). https://www.youtube.com/watch?v=FtBaioon0aA. Accessed 24 Apr 2020

  20. Roger, D., Nick, M., Paul, S.: Tor: the second generation onion router. In: Proceedings of the 13th Conference on USENIX Security Symposium, vol. 13, Series SSYM 2004, p. 21. USENIX Association, USA (2004)

    Google Scholar 

  21. Samyuktha, S.: Remorabook: privacy-preserving mobile social networking based on remora computing remora computing. Cleveland State University, Master Thesis (2020). https://engagedscholarship.csuohio.edu/etdarchive/1217/

  22. Sevenline, O.U.: Facebook cheat sheet: all image sizes, dimensions, and templates (2020). https://www.dreamgrow.com/facebook-cheat-sheet-sizes-and-dimensions. Accessed 11 Mar 2020

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ye Zhu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2025 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kodumuri, S., Zhu, Y. (2025). Remorabook: Privacy-Preserving Mobile Social Networking Based on Remora Computing. In: Cai, Z., Takabi, D., Guo, S., Zou, Y. (eds) Wireless Artificial Intelligent Computing Systems and Applications. WASA 2024. Lecture Notes in Computer Science, vol 14998. Springer, Cham. https://doi.org/10.1007/978-3-031-71467-2_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-71467-2_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-71466-5

  • Online ISBN: 978-3-031-71467-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics