8 CONCLUSION AND FUTURE
WORKS
Mobile devices represent a simple way to quickly
share information with other people and the use of
mobile social networks is a easy way to share
location.
When a user shares his location with friends and
family on a social network, he also allows this
information to be registered by the social network
itself, which then uses it to offer products and
services according to location. For many users, this
offer is seen as a benefit, but for many, privacy
concerns outweigh that benefit. These concerns can
reduce motivation to use social networks.
The privacy offered by the model through the
definition of rules and levels prevents users from
attacks mentioned in section 2. As the shared
location information are hidden throughout the
levels, malicious users do not get the information
real position and with high accuracy user. Thus,
hinders your identity is inferred by location. In
addition, the social network provider does not store
the history of shared locations and thus cannot to
trace the stream of the users. The other members of
the social network store all locations shared your
friends, however, is very difficult to get the user path
if it has set policies and levels for the share.
An interesting point to note is that the model
does not fully committed services and
recommendations offered by the social network,
therefore users allow their location to be shared
according to the rules. The location modified by
levels still belongs to the geographical area where
the user is. Thus, services and offers
recommendations based on geographic area can still
be made. But personalization is the user's
responsibility, since it allows its position to be
shared, services and recommendations made by the
social network will not be compromised.
The results show that the model has good
performance, despite the existence delays. Analysing
the worst case, the model runtime to process an
incoming request is on average 28 seconds. This
delay added to the implementation of the social
network is acceptable when compared to the average
time spent by the GPS to obtain the first location
that is 30 seconds. The test results also show that
delays generated by using the privacy techniques are
proportionate to the desired levels of privacy of user.
The results obtained in the evaluation of users
show three important points: First point is that users
believe that, for the use of mobile social networks,
supply and privacy safeguards is essential. The
second point is that most users approved the
efficiency of privacy techniques offered by the
model. However, despite the privacy of efficiency is
approved, the prototype needs improvements over its
usability.
Among the future works are: The need to move
employees algorithms in the privacy level 2 in order
to improve application performance; The way users
perform the privacy rules setting should be
optimized using the results of the usability study;
Evolve the prototype is makes it the closest to an
application of real mobile social network and,
finally, conduct a study to measure the configuration
preferences user privacy.
REFERENCES
http://www.statisticbrain.com/social-networking-statis
tics/; last access: August, 2014.
Toch, E., Cranshaw, J., Hankes-Drielsma, P., Springfield,
J.; Gage, P., Cranor, L.; Hong, J., Sadeh, N., 2010.
Locaccino: A Privacy-centric Location-sharing
Application. In 12th ACM International Conference
Adjunct Papers on Ubiquitous Computing, pp. 381-
382.
Benisch, M.; Kelley, P. G., Sadeh, N., Cranor, L. F., 2011.
Capturing Location-Privacy Preferences: Quantifying
Accuracy and User-Burden Tradeoffs, In Personal and
Ubiquitous Computing; vol. 15, pp. 679-694, 2011.
Toch, E., Cranshaw, J., Drielsma, P. H., Tsai, J. Y.,
Kelley, P. G., Springfield, J., Cranor, L., Hong, J.;
Sadeh, N., 2010. Empirical Models of Privacy in
Location-sharing. In 12th ACM International
Conference on Ubiquitous Computing, pp. 129-138.
Smith, I., Consolvo, S., Lamarca, A., Hightower, J., Scott,
J., Sohn, T., Hughes, J., Iachello, G., Abowd, G. D.,
2005. Social Disclosure of Place: From Location
Technology to Communication Practices. In Third
International Conference on Pervasive Computing, pp.
134-151.
Ribeiro, F. N., Zorzo, S. D., 2009. LPBS – Location
Privacy Based System. In IEEE Symposium on
Computers and Communications, pp. 374-379.
Shin, K. G., Ju, X., Chen, Z., Hu, X., 2012. Privacy
Protection for Users of Location-Based Services. In
IEEE Wireless Communications, vol. 19, pp. 30-39.
Harrison B., Dey, A., 2009. What Have You Done With
Location-Based Services Lately?. In IEEE Pervasive
Computing, vol. 8, pp. 66-70.
Bilogrevic, I., Huguenin, K., Agir, B., Jadliwala, M.,
Hubaux, J. P, 2013. Adaptive Information-sharing for
Privacy-aware Mobile Social Networks. In 2013 ACM
International Joint Conference on Pervasive and
Ubiquitous Computing, pp. 657-666.
Xu, F., He, J., Wright, M., Xu, J., 2010. Privacy Protection
in Location-Sharing Services. In International
Conference on Computer Application and System
Location-sharingModelinMobileSocialNetworkswithPrivacyGuarantee
53