Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1555816.1555819acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
research-article

xShare: supporting impromptu sharing of mobile phones

Published: 22 June 2009 Publication History

Abstract

Loaded with personal data, e.g. photos, contacts, and call history, mobile phones are truly personal devices. Yet it is often necessary or desirable to share our phones with others. This is especially true as mobile phones are integrating features conventionally provided by other dedicated devices, from MP3 players to games consoles. Unfortunately, when we lend our phones to others, we give away complete access because existing phones assume a single user and provide little protection for private data and applications. In this work, we present xShare, a protection solution to address this problem. xShare allows phone owners to rapidly specify what they want to share and place the phone into a restricted mode where only the data and applications intended for sharing can be accessed.
We first present findings from two motivational user studies based on which we provide the design requirements of xShare. We then present the design of xShare based on file-level access control. We describe the implementation of xShare on Windows Mobile and report a comprehensive usability evaluation of the implementation, including mea-surements and user studies. The evaluation demonstrates that our xShare implementation has negligible overhead for interactive phone usage, is extremely favored by mobile users, and provides robust protection against attacks by experienced Windows Mobile users and developers.

References

[1]
A. Brush and K. Inkpen, "Yours, Mine and Ours? Sharing and Use of Technology in Domestic Environments," in Proc. of Ubiquitous Computing 2007, pp. 109--126, 2007.
[2]
A. L. Chavan and D. Gorney, "The Dilemma of the Shared Mobile Phone-Culture Strain and Product Design in Emerging Economies," ACM Interactions, vol. 15, pp. 34--39, 2008.
[3]
M. Hall, "Create a Windows CE Image That Boots to Kiosk Mode", http://msdn.microsoft.com/en-us/libraryaa446914.aspx.
[4]
R. Hull, B. Kumar, D. Lieuwen, P. Patel-Schneider, A. Sahuguet, S. Varadarajan, and A. Vyas, "Enabling Context-aware and Privacy-Conscious User Data Sharing," in Proc. of IEEE Int. Conf. Mobile Data Management, 2004.
[5]
G. C. Hunt and D. Brubacher, "Detours: Binary Interception of Win32 Functions," in Proc. of Conf. USENIX Windows NT Symposium, Seattle, WA, USA: USENIX Association, 1999.
[6]
S. Jain, F. Shafique, V. Djeric, and A. Goel, "Application-level Isolation and Recovery with Solitude," in Proc. of the 3rd ACM SIGOPS/EuroSys European Conf. on Computer Systems, Glasgow, Scotland UK: ACM, 2008.
[7]
P. H. Kamp and R. N. M. Watson, "Jails: Confining the Omnipotent Root," in Proc. of the 2nd International SANE Conf., 2000.
[8]
Z. Liang, V. N. Venkatakrishnan, and R. Sekar, "Isolated Program Execution: an Application Transparent Approach for Executing Untrusted Programs," in Proc. of 19th Annual Computer Security Applications Conf., 2003.
[9]
B. des Ligneris, "Virtualization of Linux Based Computers: the Linux-VServer Project," in Proc. of 19th International Symposium on High Performance Computing Systems and Applications, pp. 340--346, 2005.
[10]
J. S. Olson, J. Grudin, and EricHorvitz, "A Study of Preferences for Sharing and Privacy," in Proc. of Extended Abstracts on Human Factors in Computing Systems, Portland, OR, USA: ACM, 2005.
[11]
T. Pering, D. H. Nguyen, J. Light, and R. Want, "Face-to-Face Media Sharing Using Wireless Mobile Devices," in Proc. of IEEE Int. Symp. Multimedia: IEEE Computer Society, 2005.
[12]
D. Price and A. Tucker, "Solaris Zones: Operating System Support for Consolidating Commercial Workloads," in Proc. of the 18th USENIX Conf. on System Administration Atlanta, GA: USENIX Association, 2004.
[13]
S. Soltesz, H. Pötzl, M. E. Fiuczynski, A. Bavier, and L. Peterson, "Container-based Operating System Virtualization: a Scalable, High-Performance Alternative to Hypervisors," ACM SIGOPS Operating Systems Review vol. 41, pp. 275--287, 2007.
[14]
A. Voida, R. E. Grinter, N. Ducheneaut, W. K. Edwards, and M. W. Newman, "Listening in: Practices Surrounding iTunes Music Sharing," in Proc. of the SIGCHI Conf. on Human Factors in Computing Systems, Portland, OR, USA: ACM, 2005.
[15]
Y. Yu, F. Guo, S. Nanda, L.-c. Lam, and T.-c. Chiueh, "A Feather-Weight Virtual Machine for Windows Applications," in Proc. of the 2nd International Conf. on Virtual Execution Environments, Ottawa, Ontario, Canada: ACM, 2006.
[16]
Spb Software House, "Spb Kiosk Engine," http://www.spbsoftwarehouse.com/products/kioskengine.
[17]
VMware Corporation, "VMware Mobile Virtualization Platform", http://www.vmware.com/technology/mobile/.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MobiSys '09: Proceedings of the 7th international conference on Mobile systems, applications, and services
June 2009
370 pages
ISBN:9781605585666
DOI:10.1145/1555816
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 June 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. mobile phone
  2. privacy
  3. sharing
  4. virtualization

Qualifiers

  • Research-article

Conference

Mobisys '09
Sponsor:

Acceptance Rates

Overall Acceptance Rate 274 of 1,679 submissions, 16%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)13
  • Downloads (Last 6 weeks)1
Reflects downloads up to 24 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A Closer Look at Access Control in Multi-User Voice SystemsIEEE Access10.1109/ACCESS.2024.337914112(40933-40946)Online publication date: 2024
  • (2022)Sharing without scaringProceedings of the Eighteenth USENIX Conference on Usable Privacy and Security10.5555/3563609.3563645(671-685)Online publication date: 8-Aug-2022
  • (2022)CalicoProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/35503236:3(1-32)Online publication date: 7-Sep-2022
  • (2020)KratosProceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3395351.3399358(1-12)Online publication date: 8-Jul-2020
  • (2019)Understanding Motivators, Constraints, and Practices of Sharing Internet of ThingsProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/33289153:2(1-21)Online publication date: 21-Jun-2019
  • (2018)Exploring Relationship-aware Dynamic Message Screening for Mobile MessengersProceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers10.1145/3267305.3267673(134-137)Online publication date: 8-Oct-2018
  • (2018)Using Touch-screen Gestures for Just-in-time Privacy ProvisioningProceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers10.1145/3267305.3267643(219-222)Online publication date: 8-Oct-2018
  • (2018)PrivacyShieldProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/32142792:2(1-38)Online publication date: 5-Jul-2018
  • (2018)“A Stalker's Paradise”Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems10.1145/3173574.3174241(1-13)Online publication date: 21-Apr-2018
  • (2017)Enabling Multi-user Controls in Smart Home DevicesProceedings of the 2017 Workshop on Internet of Things Security and Privacy10.1145/3139937.3139941(49-54)Online publication date: 3-Nov-2017
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media