Every night, many smartphones are plugged into a power source for recharging the battery. Given the increasing computing capabilities of smartphones, these idle phones constitute a sizeable computing infrastructure. Therefore, for an enterprise which supplies its employees with smartphones, we argue that a computing infrastructure that leverages idle smartphones being charged overnight is an energy-efficient and cost-effective alternative to running certain tasks on traditional servers. While parallel execution models and schedulers exist for servers, smartphones face a unique set of technical challenges due to the heterogeneity in CPU clock speed, variability in network bandwidth, and lower availability than servers. In this paper, we address many of these challenges to develop CWC-a distributed computing infrastructure using smartphones. We implement and evaluate a prototype of CWC that employs a novel scheduling algorithm to minimize the makespan of a set of computing tasks. Our evaluations using a testbed of 18 Android phones show that CWC's scheduler yields a makespan that is 1.6x faster than other simpler approaches.
Abstract-Recently, there have been proposals to evade censors by using steganography to embed secret messages in images shared on public photo-sharing sites. However, establishing a covert channel in this manner is not straightforward. First, photo-sharing sites often process uploaded images, thus destroying any embedded message. Second, prior work assumes the existence of an out-of-band channel, using which the communicating users can exchange metadata or secret keys a priori; establishing such out-of-band channels, not monitored by censors, is difficult.In this paper, we address these issues to facilitate private communications on photo-sharing sites. In doing so, first, we conduct an in-depth measurement study of the feasibility of hiding data on four popular photo-sharing sites. Second, based on the understanding derived, we propose a novel approach for embedding secret messages in uploaded photos while preserving the integrity of such messages. We demonstrate that, despite the processing on photo-sharing sites, our approach ensures reliable covert communication, without increasing the likelihood of being detected via steganalysis. Lastly, we design and implement a scheme for bootstrapping private communications without an out-of-band channel, i.e., by exchanging keys via uploaded images.
User privacy has been an increasingly growing concern in online social networks (OSNs). While most OSNs today provide some form of privacy controls so that their users can protect their shared content from other users, these controls are typically not sufficiently expressive and/or do not provide fine-grained protection of information. In this paper, we consider the introduction of a new privacy control-group messaging on Twitter, with users having finegrained control over who can see their messages. Specifically, we demonstrate that such a privacy control can be offered to users of Twitter today without having to wait for Twitter to make changes to its system. We do so by designing and implementing Twitsper, a wrapper around Twitter that enables private group communication among existing Twitter users while preserving Twitter's commercial interests. Our design preserves the privacy of group information (i.e., who communicates with whom) both from the Twitsper server as well as from undesired Twitsper users. Furthermore, our evaluation shows that our implementation of Twitsper imposes minimal server-side bandwidth requirements and incurs low client-side energy consumption. Our Twitsper client for Androidbased devices has been downloaded by over 1000 users and its utility has been noted by several media articles.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.