Using the Middle to Meddle with Mobile

نویسندگان

  • Ashwin Rao
  • Arash Molavi Kakhki
  • Abbas Razaghpanah
  • Amy Tang
  • Shen Wang
  • Justine Sherry
  • Phillipa Gill
  • Arvind Krishnamurthy
  • Arnaud Legout
  • Alan Mislove
  • David Choffnes
چکیده

Researchers and mobile users have little visibility into the network traffic generated by mobile devices and have poor control over how, when, and where that traffic is sent and handled. This paper presents Meddle, a platform that leverages VPNs and software middleboxes to improve transparency and control for Internet traffic from mobile systems. Meddle provides a practical way to interpose on all of a device’s Internet traffic, while providing clear incentives, privacy guarantees, and ease of deployment to end users. We discuss the design and implementation of our system, and evaluate its effectiveness with measurements from an IRB-approved user measurement study. We demonstrate the potential of this platform using case studies of applications built atop Meddle; namely, controlling privacy leaks and detecting ISP interference with Internet traffic.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving transparency and end-user control in mobile. (Amélioration de la transparence et du contrôle par l'utilisateur dans les réseaux mobiles)

Mobile devices are increasingly becoming the primary device to access the Internet. Despite this thriving popularity, the current mobile ecosystem is largely opaque because of the vested monetary interests of its key players: mobile OS providers, creators of mobile applications, stores for mobile applications and media content, and ISPs. This problem of opaqueness is further aggravated by the l...

متن کامل

Android Apps: What are they doing with your precious Internet?

Increasing numbers of people use mobile devices to transmit personal information. Privacy consequently becomes an important issue. With the current Android permissions system, users may grant broad Internet access to an application, but are unable to see how exactly that access is used. We define a “well-behaved” application as one that: 1. only uses necessary resources, 2. contacts only necess...

متن کامل

Improving Mobile Grid Performance Using Fuzzy Job Replica Count Determiner

Grid computing is a term referring to the combination of computer resources from multiple administrative domains to reach a common computational platform. Mobile Computing is a Generic word that introduces using of movable, handheld devices with wireless communication, for processing data. Mobile Computing focused on providing access to data, information, services and communications anywhere an...

متن کامل

Improving Mobile Grid Performance Using Fuzzy Job Replica Count Determiner

Grid computing is a term referring to the combination of computer resources from multiple administrative domains to reach a common computational platform. Mobile Computing is a Generic word that introduces using of movable, handheld devices with wireless communication, for processing data. Mobile Computing focused on providing access to data, information, services and communications anywhere an...

متن کامل

Analyse Power Consumption by Mobile Applications Using Fuzzy Clustering Approach

With the advancements in mobile technology and its utilization in every facet of life, mobile popularity has enhanced exponentially. The biggest constraint in the utility of mobile devices is that they are powered with batteries. Optimizing mobile’s size and weight is always the choice of designer, which led limited size and capacity of battery used in mobile phone. In this paper analysis of th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013