MILC: A secure and privacy-preserving mobile instant locator with chatting
نویسندگان
چکیده
The key issue for any mobile application or service is the way it is delivered and experienced by users, who eventually may decide to keep it on their software portfolio or not. Without doubt, security and privacy have both a crucial role to play towards this goal. Very recently, Gartner has identified the top ten of consumer mobile applications that are expected to dominate the market in the near future. Among them one can earmark location-based services in number 2 and mobile instant messaging in number 9. This paper presents a novel application namely MILC that blends both features. That is, MILC offers users the ability to chat, interchange geographic co-ordinates and make Splashes in real-time. At present, several implementations provide these services separately or jointly, but none of them offers real security and preserves the privacy of the end-users at the same time. On the contrary, MILC provides an acceptable level of security by utilizing both asymmetric and symmetric cryptography, and most importantly, put the user in control of her own personal information and her private sphere. The analysis and our contribution are threefold starting from the theoretical background, continuing to the technical part, and providing an evaluation of the MILC system. We present and discuss several issues, including the different services that MILC supports, system architecture, protocols, security, privacy etc. Using a prototype implemented in Google’s Android OS, we demonstrate that the proposed system is fast performing, secure, privacypreserving and potentially extensible.
منابع مشابه
Enhanced Remote Health Monitoring System with Secure and Privacy Preserving Authentication Services
Nowadays Mobile Phones or Smartphones are mainly used for communications and updating knowledge purposes, (i.e., voice calling, video calling, chatting with friends, relatives, browsing for news updates and so on). Mobile Phones or Smart Phones are not only used for Communications and also useful in many ways by using applications like healthcare monitoring, location finder, chatting applicatio...
متن کاملExpert and Non-Expert Attitudes towards (Secure) Instant Messaging
In this paper, we present results from an online survey with 1,510 participants and an interview study with 31 participants on (secure) mobile instant messaging. Our goal was to uncover how much of a role security and privacy played in people’s decisions to use a mobile instant messenger. In the interview study, we recruited a balanced sample of ITsecurity experts and non-experts, as well as an...
متن کاملPrivacy-Preserving Photo Sharing based on a Public Key Infrastructure
A significant number of pictures are posted to social media sites or exchanged through instant messaging and cloud-based sharing services. Most social media services o↵er a range of access control mechanisms to protect users privacy. As it is not in the best interest of many such services if their users restrict access to their shared pictures, most services keep users’ photos unprotected which...
متن کاملA Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملǫ-PPI: Locator Service in Information Networks with Personalized Privacy Preservation
In emerging information networks, having a privacy preserving index (or PPI) is critically important for locating information of interest for data sharing across autonomous providers while preserving privacy. An understudied problem for PPI techniques is how to provide controllable privacy preservation, given the innate difference of privacy concerns regarding different data owners. In this pap...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Information Systems Frontiers
دوره 14 شماره
صفحات -
تاریخ انتشار 2012