Abstract
Scandals on online social networking have greatly raised privacy concerns regarding the massive amount of personal information stored on social networking platforms. The privacy issues are rooted in the current design of online social networking. On one hand, users have to share their personal information with social networking service providers for networking purposes. On the other hand, the sharing essentially allows the service providers to own the data, and the sharing may result in various privacy issues due to the business model of the service providers. In this paper, we propose RemoraBook to solve the privacy issues in online social networking with Remora Computing, inspired by remora fishes known for traveling effortlessly by attaching themselves to large marine animals such as sharks. Remora Computing enables RemoraBook users to utilize facilities available from service providers to build social networks without sharing information to service providers. The networking function and messaging function of RemoraBook are implemented based on Facebook and Gmail facilities respectively. Our extensive experiments on RemoraBook show that social networks can be reliably built in RemoraBook without significant degradation on usability.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Alice should not be concerned with sharing her Facebook username and password with the RemoraBook application because the data in her Facebook profile can be filled randomly and her actual data in the RemoraBook profile is encrypted and hidden in profiles pictures of her Facebook account.
References
Walsh, S.: The Top 10 Social Media Sites and Platforms. https://www.searchenginejournal.com/social-media/social-media-platforms/. Accessed 2 Feb 2024
Mason, P.: Facebook’s Data-sharing Deals Exposed. https://www.bbc.com/news/technology-46618582. Accessed 12 Apr 2020
Hern, A.: How to Check Whether Facebook Shared Your Data with Cambridge Analytica. https://www.theguardian.com/technology/2018/apr/10/facebook-notify-users-data-harvested-cambridge-analytica. Accessed 12 Apr 2020
Rosenberg, M., Confessore, N., Cadwalladr, C.: How Trump Consultants Exploited the Facebook Data of Millions. https://www.nytimes.com/2018/03/17/us/politics/cambridge-analytica-trump-campaign.html. Accessed 2 Apr 2020
Wikipedia Contributors. Facebook-Cambridge Analytica Data Scandal Wikipedia, The Free Encyclopedia. https://en.wikipedia.org/w/index.php?title=Facebook. Accessed 10 May 2020
Ralph, G., Alessandro, A., John Heinz, H.: Information revelation and privacy in Online Social Networks (The Facebook Case). In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society (WPES 2005), pp. 71–80 (2005)
Acquisti, A., Gross, R.: Imagined communities: awareness, information sharing, and privacy on the Facebook. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 36–58. Springer, Heidelberg (2006). https://doi.org/10.1007/11957454_3
Krishnamurthy, B., Wills, C.E. (eds.) Characterizing Privacy in Online Social Networks. Association for Computing Machinery (2008)
Krishnamurthy, B., Craig, W.: On the leakage of personally identifiable information via Online Social Networks. Comput. Commun. Rev. 40, 112–117 (2010)
He, J., Chu, W., Liu, Z.: Inferring Privacy Information from Social Networks, vol. 3975, pp. 154–165 (2006)
Lindamood, J., Heatherly, R., Kantarcioglu, M., Thuraisingham, B.M.: Inferring Private Information Using Social Network Data, pp. 1145–1146. Association for Computing Machinery (2009)
Elena, Z., Lise, G.: To join or not to join: the illusion of privacy in Social Networks with mixed public and private user profiles. IN: Proceedings of the 18th International Conference on World Wide Web, pp. 531–540 (2009)
Humbert, M., Studer, T., Grossglauser, M., Hubaux, J.-P.: Nowhere to hide: navigating around privacy in Online Social Networks. In: ESORICS, pp. 682–699 (2013)
Chaabane, A., Acs, G., Kaafar, M.A.: You are what you like! Information leakage through users’ interests. In: Proceedings of the Annual Network and Distributed System Security Symposium (2012). http://www.csd.uoc.gr/~hy558/papers/leakage_ndss.pdf
Yamada, A., Kim, T.H.-J., Perrig, A.: Exploiting privacy policy conflicts in Online Social Networks (CMU-CyLab-12-005), pp. 1–9 (2012)
Ratan, D., Cong, T., Keith, R., Nitesh, S.: Estimating age privacy leakage in Online Social Networks. In: Proceedings of the IEEE INFOCOM, pp. 2836–2840 (2012)
Wagner, K.: This is how Facebook uses your data for ad targeting. https://www.vox.com/2018/4/11/17177842/facebook-advertising-ads-explained-mark-zuckerberg. Accessed 11 Mar 2020
Zuckerberg, M.: Facebook. https://www.facebook.com/help/336320879782850/?helpref=hc_fnav. Accessed 11 Mar 2020
ScrapersnBots. (2018). https://www.youtube.com/watch?v=FtBaioon0aA. Accessed 24 Apr 2020
Roger, D., Nick, M., Paul, S.: Tor: the second generation onion router. In: Proceedings of the 13th Conference on USENIX Security Symposium, vol. 13, Series SSYM 2004, p. 21. USENIX Association, USA (2004)
Samyuktha, S.: Remorabook: privacy-preserving mobile social networking based on remora computing remora computing. Cleveland State University, Master Thesis (2020). https://engagedscholarship.csuohio.edu/etdarchive/1217/
Sevenline, O.U.: Facebook cheat sheet: all image sizes, dimensions, and templates (2020). https://www.dreamgrow.com/facebook-cheat-sheet-sizes-and-dimensions. Accessed 11 Mar 2020
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2025 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Kodumuri, S., Zhu, Y. (2025). Remorabook: Privacy-Preserving Mobile Social Networking Based on Remora Computing. In: Cai, Z., Takabi, D., Guo, S., Zou, Y. (eds) Wireless Artificial Intelligent Computing Systems and Applications. WASA 2024. Lecture Notes in Computer Science, vol 14998. Springer, Cham. https://doi.org/10.1007/978-3-031-71467-2_23
Download citation
DOI: https://doi.org/10.1007/978-3-031-71467-2_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-71466-5
Online ISBN: 978-3-031-71467-2
eBook Packages: Computer ScienceComputer Science (R0)