CrowdShare: Secure Mobile Resource Sharing
نویسندگان
چکیده
Mobile smart devices and services have become an integral part of our daily life. In this context there are many compelling scenarios for mobile device users to share resources. A popular example is tethering. However, resource sharing also raises privacy and security concerns. In this paper, we present CrowdShare, a complete framework and its (Android) implementation for secure and private resource sharing among nearby devices. CrowdShare provides pseudonymity for users, accountability of resource usage, and the possibility of specifying access control in terms of social network relationships. The latter, denoted FoF Finder service, allows two devices, to determine in a privacy-preserving manner whether their owners are friends of each other or have common friends. FoF Finder service is an independent software module that encapsulates secure usage of privacy-preserving set intersection protocols. It is designed to be used easily by developers to secure other applications. Further, CrowdShare preserves secure connectivity between nearby devices even in the absence of the mobile infrastructure. We have implemented CrowdShare including FoF Finder service on Android devices and report good performance results and preliminary user evaluations.
منابع مشابه
Secure Resource Sharing in Ad hoc Networks
Mobile and wireless devices become more popular and their capabilities increase as well. At the same time, most of the today’s PC power is unused, as a study of the Gartner Group indicates. Grid computing and P2P systems take advantage of this fact and provide unused resources to other nodes within the network, but mobile scenarios or ad hoc networks are often left out. This paper presents a co...
متن کاملAn Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks
Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...
متن کاملPolicy Model for Sharing Network Slices in 5G Core Network
As mobile data traffic increases, and the number of services provided by the mobile network increases, service load flows as well, which requires changing in the principles, models, and strategies for media transmission streams serving to guarantee the given nature of giving a wide scope of services in Flexible and cost-effective. Right now, the fundamental question remains what number of netwo...
متن کاملRole-Based Secure Inter-operation and Resource Usage Management in Mobile Grid Systems
Dynamic inter-domain collaborations and resource sharing comprise two key characteristics of mobile Grid systems. However, interdomain collaborations have proven to be vulnerable to conflicts that can lead to privilege escalation. These conflicts are detectable in interoperation policies, and occur due to cross-domain role relationships. In addition, resource sharing requires to be enhanced wit...
متن کاملComputationally secure multiple secret sharing: models, schemes, and formal security analysis
A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013