End-to-End Secure and Privacy Preserving Mobile Chat Application

نویسندگان

  • Raja Naeem Akram
  • Ryan K. L. Ko
چکیده

Since the 1990s, two technologies have reshaped how we see and experience the world around us. These technologies are the Internet and mobile communication, especially smartphones. The Internet provides a cheap and convenient way to explore and communicate with distant people. A multitude of services have converged on the smartphone platform, and potentially the most notable is social networking. With increased interconnectivity and use of online services, concerns about consumers' security and privacy are growing. In this paper, we evaluate the securityand privacy-preserving features provided by existing mobile chat services. This paper also puts forwards a basic framework for an End-to-End (E2E) security and privacy-preserving mobile chat service and associated requirements. We implemented the proposal to provide proof-of-concept and evaluate the technical di culty of satisfying the stipulated security and privacy requirements.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CONIKS: A Privacy-Preserving Consistent Key Service for Secure End-to-End Communication

Recent revelations about government surveillance have significantly increased the demand for end-to-end secure communications. However, key management remains a major barrier to adoption. Current systems are often either vulnerable to a malicious or coerced key directory or they make unrealistic assumptions about user behavior, for example, that users will verify key fingerprints out of band. W...

متن کامل

MILC: A secure and privacy-preserving mobile instant locator with chatting

The key issue for any mobile application or service is the way it is delivered and experienced by users, who eventually may decide to keep it on their software portfolio or not. Without doubt, security and privacy have both a crucial role to play towards this goal. Very recently, Gartner has identified the top ten of consumer mobile applications that are expected to dominate the market in the n...

متن کامل

Privacy preserving context transfer schemes for 4G networks

In the near future, wireless heterogeneous networks are expected to interconnect in an all-IP architecture. An open issue towards this direction is the uninterrupted continuation of the received services during handover between networks employing different access technologies. In this context, Mobile IP (MIP) is a protocol that allows fast and secure handovers. However, MIP per se cannot handle...

متن کامل

Privacy-Preserving Location-Based Service Scheme for Mobile Sensing Data †

With the wide use of mobile sensing application, more and more location-embedded data are collected and stored in mobile clouds, such as iCloud, Samsung cloud, etc. Using these data, the cloud service provider (CSP) can provide location-based service (LBS) for users. However, the mobile cloud is untrustworthy. The privacy concerns force the sensitive locations to be stored on the mobile cloud i...

متن کامل

SEAZOR: A Robust Privacy-Preserving Secure Anonymous Zone Routing in Military Wireless Ad Hoc Networks

This paper proposes a robust privacy-preserving secure anonymous zone routing protocol for military tactical networks. Since much of works have been focused on secure anonymous communications in either reactive protocols or proactive protocols, no research has been dedicated to the secure anonymous hybrid routing protocol. In particular, we propose the hybrid routing location-centric communicat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014