SmokeScreen
- 13 June 2007
- proceedings article
- Published by Association for Computing Machinery (ACM)
- p. 233-245
- https://doi.org/10.1145/1247660.1247688
Abstract
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both trusted social relations and untrusted strangers. In this paper, we present a system called SmokeScreen that provides flexible and power-efficient mechanisms for privacy management. Broadcasting clique signals, which can only be interpreted by other trusted users, enables sharing between social relations; broadcasting opaque identifiers (OIDs), which can only be resolved to an identity by a trusted broker, enables sharing between strangers. Computing these messages is power-efficient since they can be pre-computed with acceptable storage costs. In evaluating these mechanisms we first analyzed traces from an actual presence-sharing application. Four months of traces provide evidence of anonymous snooping, even among trusted users. We have also implemented our mechanisms on two devices and found the power demands of clique signals and OIDs to be reasonable. A mobile phone running our software can operate for several days on a single charge.Keywords
This publication has 24 references indexed in Scilit:
- Reality mining: sensing complex social systemsPersonal and Ubiquitous Computing, 2005
- ConnectionsPublished by Association for Computing Machinery (ACM) ,2005
- Enhancing Location Privacy in Wireless LAN Through Disposable Interface Identifiers: A Quantitative AnalysisMobile Networks and Applications, 2005
- Social Serendipity: Mobilizing Social SoftwareIEEE Pervasive Computing, 2005
- The Ubiquitous Camera: An In-Depth Study of Camera Phone UseIEEE Pervasive Computing, 2005
- Place Lab: Device Positioning Using Radio Beacons in the WildPublished by Springer Nature ,2005
- The ContextCam: Automated Point of Capture Video AnnotationPublished by Springer Nature ,2004
- Efficient Private Matching and Set IntersectionPublished by Springer Nature ,2004
- Anonymous Usage of Location-Based Services Through Spatial and Temporal CloakingPublished by Association for Computing Machinery (ACM) ,2003
- Preserving privacy in environments with location-based applicationsIEEE Pervasive Computing, 2003