Smokescreen: Flexible Privacy Controls for Presence-Sharing

Smokescreen: Flexible Privacy Controls for Presence-Sharing

SmokeScreen: Flexible Privacy Controls for Presence-Sharing Landon P. Cox, Angela Dalton, and Varun Marupadi Department of Computer Science, Duke University Durham, NC, USA [email protected], [email protected], [email protected] ABSTRACT 1. INTRODUCTION Presence-sharing is an emerging platform for mobile applications, Presence-sharing is a cooperative service provided by indepen- but presence-privacy remains a challenge. Privacy controls must dent, mobile participants periodically broadcasting their identity be flexible enough to allow sharing between both trusted social re- via short-range wireless technology such as BlueTooth or WiFi. In lations and untrusted strangers. In this paper, we present a sys- combination with location services like GPS and PlaceLab [23], tem called SmokeScreen that provides flexible and power-efficient these networks provide a promising platform for emerging mobile mechanisms for privacy management. and pervasive applications. Examples include automatic tagging of Broadcasting clique signals, which can only be interpreted by mobile data (e.g. digital images or lecture notes) to support file other trusted users, enables sharing between social relations; broad- search [7], mobile social networks [10], and messaging services casting opaque identifiers (OIDs), which can only be resolved to like the “missed connections” feature of CraigsList [7]. an identity by a trusted broker, enables sharing between strangers. Presence-sharing is an attractive alternative to more traditional Computing these messages is power-efficient since they can be pre- pervasive computing architectures because of its low cost, decen- computed with acceptable storage costs. tralized approach, and ease of deployment. For example, projects In evaluating these mechanisms we first analyzed traces from an such as the ContextCam [34] can be used to automatically tag digi- actual presence-sharing application. Four months of traces provide tal images, but require a large investment in sensor and RFID tech- evidence of anonymous snooping, even among trusted users. We nologies. have also implemented our mechanisms on two devices and found Despite the advantages of presence-sharing, privacy protection the power demands of clique signals and OIDs to be reasonable. A remains an important unmet challenge. Mobile users are unlikely to mobile phone running our software can operate for several days on participate if anonymous strangers can roam through a crowd col- a single charge. lecting identities or marketers can surreptitiously compile users’ lo- cation histories. Operating in a decentralized wireless environment Categories and Subject Descriptors makes managing presence-privacy particularly difficult. Wireless broadcasts can be heard by anyone, including unwanted snoopers. D.4.4 [Operating Systems]: Communications ManagementNet- Thus, broadcasts must be constructed so as to only reveal identify- work communication; D.4.6 [Operating Systems]: Security and ing information to a subset of users. Protection—Access Control; D.4.7 [Operating Systems]: Orga- A simple protocol that meets this requirement is one in which nization and DesignDistributed systems; D.4.8 [Operating Sys- members of a trusted group initially negotiate a secret symmetric tems]: PerformanceMeasurements; K.6.5 [Management of Com- key. To later reveal themselves, members broadcast their identity puting and Information Systems]: Security and Protection and a nonce encrypted with the secret key. Message recipients use their secret key to verify that the decrypted content matches a mem- Keywords ber of the group. The drawback of this approach is that it is inflexi- ble: users cannot tune their access control policy to their social en- Location privacy, mobile computing, pervasive computing, presence- vironment nor can they safely share their presence with strangers. sharing, social networks For example, in a file-tagging service users may want to restrict sharing to social relations such as friends, family members, and co- General Terms workers. However, trust in location privacy is a function of fluid so- Human Factors, Measurement, Security cial dynamics and users must be able to adjust their access control policies accordingly. Studies of attitudes toward location privacy have revealed adults who trust their co-workers with their location during business hours but not otherwise [6], teenage girls who trust their parents except when they are socializing with friends [27], and spouses who trust each other except when shopping [6]. Permission to make digital or hard copies of all or part of this work for In addition, restricting presence to established social relations personal or classroom use is granted without fee provided that copies are cripples many useful presence-sharing applications. Within a mo- not made or distributed for profit or commercial advantage and that copies bile social network users will likely want to see the presence of both bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific friends and like-minded strangers. For missed connection messag- permission and/or a fee. ing, users must be able to send messages to people they have en- MobiSys ’ 07, June 11-14, 2007, San Juan, Puerto Rico, USA. countered but do not know. Copyright 2007 ACM 978-1-59593-614-1/07/0006 ...$5.00. 233 In this paper, we present a privacy management system called social network network provides similar opportunities to meet new SmokeScreen that addresses these issues though two complemen- people only in physical space rather than over the Internet. tary mechanisms. To enable flexible sharing between social re- Social Serendipity [10] typifies such a network. Each Serendip- lations, users broadcast clique signals which can be activated or ity user fills out a profile containing a small photograph, interests, deactivated depending on the social environment. To enable flexi- username, and list of friends. Serendipity also associates each pro- ble sharing between strangers, users also broadcast opaque identi- file with a BlueTooth MAC address and mobile phone number. In fiers (OIDs) which are time-, place-, and broadcaster-specific and social situations, a Serendipity server called BlueDar listens for can only be resolved to an identity via a centralized trusted bro- nearby BlueTooth devices and uses the devices’ MAC addresses to ker. Together these mechanisms allow users to both manage their look up their associated profiles. If there are co-located users with location-privacy and reap the full benefit of presence-sharing. Fur- overlapping interests, Serendipity sends a text message containing thermore, these mechanisms are power-efficient since devices can the profile of each user’s match along with a suggestion that they avoid broadcast-time cryptographic work by pre-computing and meet. Based on the profile’s photo, a user may then look for their comfortably storing 48 hours worth of future signals and OIDs. match in the room and introduce themselves. The rest of this paper is organized as follows: Section 2 moti- Finally, our prior work described how presence information can vates the need for flexible privacy controls by describing some rep- be used to support “missed connection” messaging among mobile resentative presence-sharing applications and summarizing a prior users [7]. The term “missed connection” is derived from a fea- study of user attitudes toward location privacy; Section 3 describes ture of the popular website CraigsList. This service allows users SmokeScreen’s trust and threat model; Section 4 describes Smoke- to post messages for people they encountered in the recent past but Screen’s design; Section 5 describes the SmokeScreen prototype; were unable to speak to at the time. Cities such as Boston, New Section 6 evaluates the prototype and examines users’ behavior in York and San Francisco generate hundreds of missed connections a deployed presence-sharing application; Section 7 and Section 8 on craigslist.com each day. Most postings are romantic inquiries, discuss related work and provides our conclusions, respectively. but there are also requests for lost items, such as “did anyone find the laptop I left in my taxi around 2PM,” and notifications of found 2. BACKGROUND AND CONTEXT items, such as “I found a set of keys at the coffeeshop.” While popular, this service is by no means ideal. First, users Presence-sharing is a cooperative service among mobile devices can never be sure if their message has been seen by the intended that provides applications with the identities of co-located users. recipient. Second, authenticating respondents can be difficult. It is More concretely, participants use discovery protocols such as those not uncommon to see messages in which a respondent is required provided by BlueTooth or WiFi to scan for other co-located devices. to provide some detail of the encounter, such as “You were my The set of discovered MAC addresses and device names can then waitress, please tell me what I ordered.” Presence-sharing along be mapped onto a set of identities by higher layers of software. with a trusted service mapping devices to profiles could improve For example, a simple presence-sharing scheme might consist of both problems. users including an email address in their mobile phone’s BlueTooth Users could record the identities of the devices they came into device name. contact with. Then based on the presence information recorded 2.1 Presence-sharing Applications during

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    13 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us