TY - GEN
T1 - SecureWear
T2 - 2nd International Conference on Computer Science and Information Technology, CCSIT 2012
AU - Ray, Baishakhi
AU - Han, Richard
PY - 2012
Y1 - 2012
N2 - With the rising popularity of social networks, people have started accessing social networking sites from anywhere, any time, and from a variety of devices. Exploiting this ubiquity, the social networking data of an individual can be coupled with her geographical location to build different context aware applications. However, the existing infrastructure to share this personalized data forces users to compromise their privacy. In this paper, we present a secure framework, which allows interaction of social network information with location-based services, without compromising user privacy and security. Through exchanging an encrypted nonce ID (EID) associated with a verified user location, our framework allows location-based services to query its vicinity for relevant information without disclosing user identity. We further argue that, this kind of framework should be adopted as a common security framework for mobile-social interaction to meet privacy requirements.
AB - With the rising popularity of social networks, people have started accessing social networking sites from anywhere, any time, and from a variety of devices. Exploiting this ubiquity, the social networking data of an individual can be coupled with her geographical location to build different context aware applications. However, the existing infrastructure to share this personalized data forces users to compromise their privacy. In this paper, we present a secure framework, which allows interaction of social network information with location-based services, without compromising user privacy and security. Through exchanging an encrypted nonce ID (EID) associated with a verified user location, our framework allows location-based services to query its vicinity for relevant information without disclosing user identity. We further argue that, this kind of framework should be adopted as a common security framework for mobile-social interaction to meet privacy requirements.
KW - Mobile computing
KW - Privacy
KW - Security
KW - Social network
KW - Wearable device
UR - http://www.scopus.com/inward/record.url?scp=84888415271&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-27308-7_55
DO - 10.1007/978-3-642-27308-7_55
M3 - Conference proceeding contribution
AN - SCOPUS:84888415271
SN - 9783642273070
T3 - Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
SP - 515
EP - 524
BT - Advances in Computer Science and Information Technology
A2 - Meghanathan, Natarajan
A2 - Chaki, Nabendu
A2 - Nagamalai, Dhinaharan
PB - Springer-VDI-Verlag GmbH & Co. KG
CY - Heidelberg, Germany
Y2 - 2 January 2012 through 4 January 2012
ER -