Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3307334.3326101acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
research-article
Open access

enClosure: Group Communication via Encounter Closures

Published: 12 June 2019 Publication History

Abstract

New applications enabled by personal smart devices and the Internet-of-Things (IoT) require communication in the context of periods of spatial co-location. Examples of this encounter-based communication (EbC) include social exchange among individuals who shared an experience, and interaction among personal and IoT devices that provide location-based services. Existing EbC systems are limited to communication among participants that share a direct encounter. This paper is inspired by two insights: (1) encounters also enable group communication among devices connected by paths in the encounter graph that is contextual, spontaneous, secure, and does not require users to reveal identifying or linkable information; and (2) addressing communication partners using encounter closures subject to causal, spatial, and temporal constraints enables powerful new forms of group communication. We present the design of enClosure, a service providing group communication based on encounter closures for mobile and IoT applications, and a prototype implementation for Android and the Microsoft Embedded Social Cloud platform. Using real-world traces, we show that enClosure provides a privacy-preserving, secure platform for a wide range of group communication applications ranging from connecting attendees of a large event and virtual guest books to disseminating health risk warnings, lost-and-found, and tracing missing persons.

References

[1]
Airdrop. https://support.apple.com/en-us/HT204144, 2011. Accessed: 2018-01--21.
[2]
Android Beam. https://developer.android.com/guide/topics/connectivity/nfc/nfc.html#p2p, 2011. Accessed: 2018-01--21.
[3]
ShareIt. http://www.ushareit.com/, 2014. Accessed: 2018-01--21.
[4]
FilesGo. https://filesgo.google.com/, 2017. Accessed: 2018-01--21.
[5]
P. Aditya, V. Erdélyi, M. Lentz, E. Shi, B. Bhattacharjee, and P. Druschel. Encore: Private, context-based communication for mobile social apps. In Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys '14, pages 135--148, New York, NY, USA, 2014. ACM.
[6]
R. Allen and S. Cervenka. Travelers who landed in Detroit, Newark, Memphis pop up with measles. https://eu.freep.com/story/news/nation-now/2018/03/14/detroit-traveler-measles/425446002/. Accessed: 2019-04--15.
[7]
ARM. ARM Trustzone. https://www.arm.com/products/security-on-arm/trustzone. Accessed: 2018-01--21.
[8]
G. Ateniese, K. Fu, M. Green, and S. Hohenberger. Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur., 9(1):1--30, Feb. 2006.
[9]
V. Brik, S. Banerjee, M. Gruteser, and S. Oh. Wireless Device Identification with Radiometric Signatures. In Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, 2008.
[10]
R. Canetti, C. Dwork, M. Naor, and R. Ostrovsky. Deniable encryption. In Annual International Cryptology Conference, pages 90--104. Springer, 1997.
[11]
R. Canetti and S. Hohenberger. Chosen-ciphertext secure proxy re-encryption. In Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS '07, pages 185--194, New York, NY, USA, 2007. ACM.
[12]
A. C. Champion, B. Zhang, J. Teng, and Z. Yang. D-card: A distributed mobile phone based system for relaying verified friendships. In Computer Communications Workshops (INFOCOM WKSHPS), 2011 IEEE Conference on, pages 696--701. IEEE, 2011.
[13]
E. Cho, S. A. Myers, and J. Leskovec. Friendship and mobility: User movement in location-based social networks. In Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '11, pages 1082--1090, New York, NY, USA, 2011. ACM.
[14]
E. Commission. Commission launches EIC horizon prize for early warning for epidemics. https://ec.europa.eu/info/news/commission-launches-eic-horizon-prize-early-warning-epidemics-2018-apr-26_en. Accessed: 2019-04--15.
[15]
L. P. Cox, A. Dalton, and V. Marupadi. Smokescreen: Flexible privacy controls for presence-sharing. In Proceedings of the 5th International Conference on Mobile Systems, Applications and Services, MobiSys '07, pages 233--245, New York, NY, USA, 2007. ACM.
[16]
C. Diot, M. Martin, and N. Erik. Haggle project, 2004.
[17]
B. Distl and S. Neuhaus. Social power for privacy protected opportunistic networks. In 2015 7th International Conference on Communication Systems and Networks (COMSNETS), pages 1--8, Jan 2015.
[18]
W. Dong, V. Dave, L. Qiu, and Y. Zhang. Secure friend discovery in mobile social networks. In INFOCOM, 2011 Proceedings IEEE, pages 1647--1655. IEEE, 2011.
[19]
N. Eagle and A. Pentland. Social serendipity: mobilizing social software. IEEE Pervasive Computing, 4(2):28--34, Jan 2005.
[20]
K. Fall. A delay-tolerant network architecture for challenged internets. In Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM '03, pages 27--34, 2003.
[21]
Google. Alarmmanager | android developers. https://developer.android.com/reference/androidapp/AlarmManager.html. Accessed: 2019-04--15.
[22]
M. Green and G. Ateniese. Identity-based proxy re-encryption. In Applied Cryptography and Network Security, pages 288--306. Springer, 2007.
[23]
J. Hall, M. Barbeau, and E. Kranakis. Detection of Transient in Radio Frequency Fingerprinting Using Signal Phase. In Proceedings of the IASTED International Conference on Wireless and Optical Communications (WOC), 2003.
[24]
Y. Kawai and K. Takashima. Fully-anonymous functional proxy-re-encryption. IACR Cryptology EPrint Archive, 2013:318, 2013.
[25]
M. Kim, J. Lim, H. Yu, K. Kim, Y. Kim, and S.-B. Lee. Viewmap: Sharing private in-vehicle dashcam videos. In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17), pages 163--176, 2017.
[26]
M. Klonowski, P. Kubiak, and M. Kutyłowski. Practical deniable encryption. In International Conference on Current Trends in Theory and Practice of Computer Science, pages 599--609. Springer, 2008.
[27]
M. Lentz, V. Erdélyi, P. Aditya, E. Shi, B. Bhattacharjee, and P. Druschel. SDDR: Light-weight, secure mobile encounters. In Proceedings of the 23rd USENIX Conference on Security Symposium, SEC'14, pages 925--940, Berkeley, CA, USA, 2014. USENIX Association.
[28]
M. Li, S. Yu, N. Cao, and W. Lou. Privacy-preserving distributed profile matching in proximity-based mobile social networks. IEEE Transactions on Wireless Communications, 12(5):2024--2033, May 2013.
[29]
J. Manweiler, R. Scudellari, and L. P. Cox. Smile: Encounter-based trust for mobile social services. In Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09, pages 246--255, New York, NY, USA, 2009. ACM.
[30]
L. McNamara, C. Mascolo, and L. Capra. Media sharing based on colocation prediction in urban transport. In Proceedings of the 14th ACM international conference on Mobile computing and networking, pages 58--69. ACM, 2008.
[31]
A. Mohaien, D. F. Kune, E. Y. Vasserman, M. Kim, and Y. Kim. Secure encounter-based mobile social networks: Requirements, designs, and tradeoffs. IEEE Transactions on Dependable and Secure Computing, 10(6):380--393, Nov 2013.
[32]
A.-K. Pietil"ainen, E. Oliver, J. LeBrun, G. Varghese, and C. Diot. Mobiclique: Middleware for mobile social networking. In Proceedings of the 2Nd ACM Workshop on Online Social Networks, WOSN '09, pages 49--54, New York, NY, USA, 2009. ACM.
[33]
K. Redmond. Measles: New york city officials issue health warning after australian tourist leaves highly infectious virus trail. https://eu.usatoday.com/story/news/health/2018/02/27/measles-officials-issue-health-warning-after-australian-tourist-leaves-highly-infectious-virus-trail/376336002/. Accessed: 2019-04--15.
[34]
Y. Yang, L. Wu, G. Yin, L. Li, and H. Zhao. A survey on security and privacy issues in internet-of-things. IEEE Internet of Things Journal, 4(5), Oct 2017.
[35]
Z. Yang, B. Zhang, J. Dai, A. C. Champion, D. Xuan, and D. Li. E-smalltalker: A distributed mobile system for social networking in physical proximity. In 2010 IEEE 30th International Conference on Distributed Computing Systems, pages 468--477, June 2010.

Cited By

View all
  • (2022)EventChainProceedings of the 23rd ACM/IFIP International Middleware Conference10.1145/3528535.3565243(174-187)Online publication date: 7-Nov-2022
  • (2022)Eddystone-EID: Secure and Private Infrastructural Protocol for BLE BeaconsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2022.321407417(3877-3889)Online publication date: 2022
  • (2021)Intel Software Guard Extensions in Internet of Things Scenarios: A Systematic Mapping Study2021 8th International Conference on Future Internet of Things and Cloud (FiCloud)10.1109/FiCloud49777.2021.00056(342-349)Online publication date: Aug-2021

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MobiSys '19: Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services
June 2019
736 pages
ISBN:9781450366618
DOI:10.1145/3307334
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 June 2019

Check for updates

Author Tags

  1. encounter-based communication
  2. group communication
  3. internet-of-things (iot)
  4. mobile computing
  5. privacy

Qualifiers

  • Research-article

Funding Sources

Conference

MobiSys '19
Sponsor:

Acceptance Rates

Overall Acceptance Rate 274 of 1,679 submissions, 16%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)424
  • Downloads (Last 6 weeks)62
Reflects downloads up to 10 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2022)EventChainProceedings of the 23rd ACM/IFIP International Middleware Conference10.1145/3528535.3565243(174-187)Online publication date: 7-Nov-2022
  • (2022)Eddystone-EID: Secure and Private Infrastructural Protocol for BLE BeaconsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2022.321407417(3877-3889)Online publication date: 2022
  • (2021)Intel Software Guard Extensions in Internet of Things Scenarios: A Systematic Mapping Study2021 8th International Conference on Future Internet of Things and Cloud (FiCloud)10.1109/FiCloud49777.2021.00056(342-349)Online publication date: Aug-2021

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media