Social Authentication and Untrusted Clouds for Secure Location Sharing?
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 4)Publication Date: 2014-04-30
Authors : Priyanka K. Shinde; Nitin R. Chopde;
Page : 664-670
Keywords : Key Management; Location Tracking; Presence Systems; Privacy; Security;
Abstract
Recently, many location-sharing services (LSSs) have emerged that share data collected using mobile devices. However, research has shown that many users are uncomfortable with LSS operators managing their location histories and that the ease with which contextual data can be shared with unintended audiences can lead to regrets that sometimes outweigh the benefits of these systems. In an effort to address these issues, we have developed SLS: a secure location sharing system that combines location-limited channels, multi-channel key establishment, and untrusted cloud storage to hide user locations from LSS operators while also limiting unintended audience sharing. In addition to describing the key agreement and location-sharing protocols used by SLS, we discuss an iOS implementation of SLS that enables location sharing at tuneable granularity through an intuitive policy interface on the users’ mobile device.
Other Latest Articles
- Survey on Network Based Intrusion Detection System in MANET?
- Human Computer Interaction: Analysis and Journey through Eras?
- ISONET: HARDWARE BASED JOB QUEUE MANAGEMENT FOR MANY CORE ARCHITECTURES
- System-function physical training
- Effect of physical rehabilitation for musculoskeletal system and the immune system of adolescents with disorders of posture
Last modified: 2014-04-23 18:06:51