Location-sharing Model in Mobile Social Networks with Privacy Guarantee

Tiago Antonio, Sergio Donizetti Zorzo

Abstract

Mobile social networks allow users to access, publish, and share information with friends, family, or groups of friends by using mobile devices. Location is one kind of information frequently shared. By using location-sharing on a social network, users allow service providers to register this information and use it to offer products and services based on the geographic area. Many users consider offers a personal gain, but for others, it causes concerns with security and privacy. These concerns can eliminate the use of mobile social networks. This paper presents a model of a mobile social network with a privacy guarantee. The model enables the user to set rules determining when, where, and with whom (friends or a group of friends) location information will be shared. Moreover, the model provides levels of privacy with anonymity techniques which hide the user’s high-accuracy current location before it is shared. To validate the model, a mobile social network prototype, MSNPrivacy (Mobile Social Network with Privacy), was developed for Android. Tests were carried out aiming to measure MSNPrivacy’s performance. The results verify that the rules and privacy levels in place provide an acceptable delay, and the model can be applied in real applications.

References

  1. http://www.statisticbrain.com/social-networking-statis tics/; last access: August, 2014.
  2. Toch, E., Cranshaw, J., Hankes-Drielsma, P., Springfield, J.; Gage, P., Cranor, L.; Hong, J., Sadeh, N., 2010. Locaccino: A Privacy-centric Location-sharing Application. In 12th ACM International Conference Adjunct Papers on Ubiquitous Computing, pp. 381- 382.
  3. Benisch, M.; Kelley, P. G., Sadeh, N., Cranor, L. F., 2011. Capturing Location-Privacy Preferences: Quantifying Accuracy and User-Burden Tradeoffs, In Personal and Ubiquitous Computing; vol. 15, pp. 679-694, 2011.
  4. Toch, E., Cranshaw, J., Drielsma, P. H., Tsai, J. Y., Kelley, P. G., Springfield, J., Cranor, L., Hong, J.; Sadeh, N., 2010. Empirical Models of Privacy in Location-sharing. In 12th ACM International Conference on Ubiquitous Computing, pp. 129-138.
  5. Smith, I., Consolvo, S., Lamarca, A., Hightower, J., Scott, J., Sohn, T., Hughes, J., Iachello, G., Abowd, G. D., 2005. Social Disclosure of Place: From Location Technology to Communication Practices. In Third International Conference on Pervasive Computing, pp. 134-151.
  6. Ribeiro, F. N., Zorzo, S. D., 2009. LPBS - Location Privacy Based System. In IEEE Symposium on Computers and Communications, pp. 374-379.
  7. Shin, K. G., Ju, X., Chen, Z., Hu, X., 2012. Privacy Protection for Users of Location-Based Services. In IEEE Wireless Communications, vol. 19, pp. 30-39.
  8. Harrison B., Dey, A., 2009. What Have You Done With Location-Based Services Lately?. In IEEE Pervasive Computing, vol. 8, pp. 66-70.
  9. Bilogrevic, I., Huguenin, K., Agir, B., Jadliwala, M., Hubaux, J. P, 2013. Adaptive Information-sharing for Privacy-aware Mobile Social Networks. In 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, pp. 657-666.
  10. Xu, F., He, J., Wright, M., Xu, J., 2010. Privacy Protection in Location-Sharing Services. In International Conference on Computer Application and System Modeling, ICCASM.
  11. Android; http://www.android.com; Last access: November, 2013.
  12. Dierks, T., Rescorla, E., 2013. The Transport Layer Security (TLS) Protocol. RFC (Request for Comments) 4346. Available: http://www.ietf.org/ rfc/rfc4346.txt. Last access: November, 2013.
  13. Leon, P. et al. Why Johnny can't opt out: a usability evaluation of tools to limit online behavioral advertising. In: SIGCHI Conference on Human Factors in Computing Systems. New York, NY, USA. Pages 589-598. 2012
  14. Hochbaum, D. S., Shmoys, D. B., 1985. A Best Possible Heuristic for the K-center Problem. Math. of Oper. res., Vol. 10, No. 2, pp. 180-184.
  15. Smart, S. W., 1977. TextBook on Spherical Astronomy., 6. ed., England: Cambridge University Press, 415 p.
  16. Williams. Ed. Aviation Formulary 1.44. Available: http://williams.best.vwh.net/avform.htm#LL; Last access: November, 2013.
  17. Gao, H. et al. Security issues in online social networks. In: IEEE Internet Computing, 15(4), pp. 56-63. 2011
Download


Paper Citation


in Harvard Style

Antonio T. and Donizetti Zorzo S. (2015). Location-sharing Model in Mobile Social Networks with Privacy Guarantee . In Proceedings of the 17th International Conference on Enterprise Information Systems - Volume 3: ICEIS, ISBN 978-989-758-098-7, pages 44-54. DOI: 10.5220/0005383200440054


in Bibtex Style

@conference{iceis15,
author={Tiago Antonio and Sergio Donizetti Zorzo},
title={Location-sharing Model in Mobile Social Networks with Privacy Guarantee},
booktitle={Proceedings of the 17th International Conference on Enterprise Information Systems - Volume 3: ICEIS,},
year={2015},
pages={44-54},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005383200440054},
isbn={978-989-758-098-7},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 17th International Conference on Enterprise Information Systems - Volume 3: ICEIS,
TI - Location-sharing Model in Mobile Social Networks with Privacy Guarantee
SN - 978-989-758-098-7
AU - Antonio T.
AU - Donizetti Zorzo S.
PY - 2015
SP - 44
EP - 54
DO - 10.5220/0005383200440054