2013
DOI: 10.1007/978-3-642-38980-1_27
|View full text |Cite
|
Sign up to set email alerts
|

CrowdShare: Secure Mobile Resource Sharing

Abstract: Mobile smart devices and services have become an integral part of our daily life. In this context there are many compelling scenarios for mobile device users to share resources. A popular example is tethering. However, sharing resources also raises privacy and security issues. In this paper, we present CrowdShare, a complete framework and its (Android) implementation for secure and private resource sharing among nearby devices. CrowdShare provides pseudonymity for users, accountability of resource usage, and t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
1
1

Relationship

5
2

Authors

Journals

citations
Cited by 14 publications
(22 citation statements)
references
References 5 publications
0
22
0
Order By: Relevance
“…Implementations of PSI protocols on smartphones such as [4,10,33] can be found in the literature, but they either do not achieve linear complexity or do not consider the offline/online setting, and hence are not suited for our scenario.…”
Section: Related Work On Psimentioning
confidence: 99%
“…Implementations of PSI protocols on smartphones such as [4,10,33] can be found in the literature, but they either do not achieve linear complexity or do not consider the offline/online setting, and hence are not suited for our scenario.…”
Section: Related Work On Psimentioning
confidence: 99%
“…We now present the implementation of Common Friends on Android, and its integration with an existing tethering application from our prior work [5].…”
Section: Methodsmentioning
confidence: 99%
“…Our proposed framework provides a clear and usable interface for application developers, enabling them to support access control decisions based on users' social proximity, independently of underlying cryptographic techniques. Finally, we integrate the Common Friends service into an existing application for sharing Internet connection [5], whereby users decide whether or not to share based on the existence of common friends. A comprehensive experimental evaluation attests to the practicality of proposed techniques.…”
Section: Introductionmentioning
confidence: 99%
“…Asokan et al [1] proposed a framework to safely share sensitive data among mobile devices, with the focus on the data privacy and user privacy. Huang et al [10] exploited the attribute-based encryption (ABE) to protect user's privacy in mobile systems.…”
Section: Related Workmentioning
confidence: 99%
“…It chooses a hash function H : {0, 1} * → G that will be modeled as a random oracle in the security proof. By calling the generation algorithm Gen F C on inputs N and L, this algorithm also generates a set of codewords Γ = {ω (1) , ..., ω (N ) }, where N denotes the maximum number of cloud users in this system and L denotes the length of each codeword. The public parameter and master secret key are set as…”
Section: The Lact Schemementioning
confidence: 99%