Abstract
Mobile users can obtain a wide range of services by maintaining associations, and sharing location and social context, with service providers. But multiple associations are cumbersome to maintain, and sharing private information with untrusted providers is risky. Using a trusted broker to mediate interactions by managing interfaces, user identities, context, social network links, policies, and enabling cross-domain associations, results in more privacy and reduced management burden for users, as we show in this paper. We also describe the prototype implementations of two practically useful applications that require awareness of participants’ location and social context: (i) targeted advertising, and (ii) social network-assisted online purchases.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Airtel Money, http://airtelmoney.in
Boku, http://www.boku.com
Buecker, A., et al.: Flexible Policy Management for IT Security Services Using IBM Tivoli Security Policy Manager. IBM Red Paper Publication REDP-451200 (March 17, 2009)
Cimpian, E., Mocan, A., Stollberg, M.: Mediation Enabled Semantic Web Services Usage. In: Mizoguchi, R., Shi, Z.-Z., Giunchiglia, F. (eds.) ASWC 2006. LNCS, vol. 4185, pp. 459–473. Springer, Heidelberg (2006)
Dahlberg, T., Mallat, N., Ondrus, J., Zmijewska, A.: Past, Present and Future of Mobile Payments Research: A Literature Review. Journal: Electronic Commerce Research and Applications 7(2), 165–181 (2008)
Fauvet, M.C., Aït-Bachir, A.: An Automaton-based Approach for Web Service Mediation. In: Proceedings of the 13th ISPE International Conference on Concurrent Engineering (ISPE CE 2006), Antibes, France, September 18-22 (2006)
Google Wallet, http://www.google.com/wallet
Guha, S., Cheng, B., Francis, P.: Privad: Practical Privacy in Online Advertising. In: 8th Usenix Conf. on Network Systems Design and Implementation (NSDI), Boston, MA (March 2011)
Haidar, D.A., Cuppens-Boulahia, N., Cuppens, F., Debar, H.: Access Negotiation within XACML Architecture. In: Proceedings of the Second Joint Conference on Security in Networks Architectures and Security of Information Systems (SARSSI), Annecy, France (June 2007)
Hammer-Lahav, E., et al.: The Oauth 2.0 Authorization Protocol (January 2011), http://tools.ietf.org/pdf/draft-ietf-oauth-v2-12.pdf
Integration Layer, http://www.opengroup.org/soa/source-book/soa_refarch/integration.htm
Krishnamurthy, B., Wills, C.E.: On the Leakage of Personally Identifiable Information via Online Social Networks. SIGCOMM Comput. Comm. Rev. 40(1), 112–117 (2010)
Loreto, S., Mecklin, T., Opsenica, M., Rissanen, H.M.: Service Broker Architecture: Location Business Case and Mashups. Comm. Mag. 47(4), 97–103 (2009)
Maler, R., Reed, D.: The Venn of Identity: Options and Issues in Federated Identity Management. IEEE Security and Privacy 6(2), 16–23 (2008)
Mas, I., Morawczynski, O.: Designing Mobile Money Services: Lessons from M-PESA. Innovations 4(2), 77–92 (2009)
Mobile Pay USA, http://www.mobilepayusa.com
Ramakrishna, V., Reiher, P., Kleinrock, L.: Distributed Policy Resolution Through Negotiation in Ubiquitous Computing Environments. In: Proceedings of IEEE PerCom 2009, Galveston, TX (March 2009)
Server-Side Authentication, http://developers.facebook.com/docs/authentication/server-side/
Square Inc. (US), https://squareup.com
Verma, M.: XML Security: Control Information Access with XACML, http://www.ibm.com/developerworks/xml/library/x-xacml/
Westerinen, A., et al.: RFC 3198: Terminology for Policy-Based Management (November 2001), http://www.ietf.org/rfc/rfc3198
Gupta, A., Kalra, A., Boston, D., Borcea, C.: MobiSoC: A Middleware for Mobile Social Computing Applications. Mobile Networks and Applications Journal 14(1), 35–52 (2009)
Open Identity Exchange, http://openidentityexchange.org/what-is-a-trust-framework
Conect.Me Trust Framework, https://connect.me/trust
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Ramakrishna, V., Kumar, A., Mukherjea, S. (2013). Privacy Preserving Social Mobile Applications. In: Zheng, K., Li, M., Jiang, H. (eds) Mobile and Ubiquitous Systems: Computing, Networking, and Services. MobiQuitous 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 120. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40238-8_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-40238-8_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40237-1
Online ISBN: 978-3-642-40238-8
eBook Packages: Computer ScienceComputer Science (R0)