Security Elements in Distributed Mobile Architectures

Vlad Petre

Abstract


The mobile phones have emerged in order to overcome the basic need of human beings for being in contact one with each other. In time, the functionalities of such devices have evolved. And so, the users have started to use more and more online social services like Facebook™, Twitter™ or Foursquare™, in order to keep in touch more easily. Unfortunately, the current information exchange models come with a high risk when it comes to sensitive areas like keeping the users’ data private and protecting the intimacy of the users. The purpose of this paper is to make an audit of such a mobile distributed architecture – a real time location based mobile social network that aims at helping its users to remain in permanent contact with their beloved ones.

Keywords


Android, social network, geolocation, real time, security, audit, mobile distributed architecture

Full Text:

PDF

References


Facebook. Facebook Mobile: 100 Million and Growing. https://www.facebook.com/blog/blog.php?post=297879717130 , accessed on 08.05.2013.

Catalin Boja, Mihai Doinea, Usability Vs. Security In Mobile Applications, Proceedings of the 12th International Conference on INFORMATICS in ECONOMY (IE 2013), Education, Research & Business Technologies, Bucharest, Romania, 2013, pp. 138-142

Gorumors. Most Accessed Social Network From Mobile Phones. http://gorumors.com/crunchies/most-accessed-social-network-from-mobile-phones/ , accessed on 08.05.2013.

Daniel Plohmann, Paul Imhoff. Localization (GPS, GSM, WLAN). XP Course, Universitaet Bonn, 2007.

Daniele Quercia, Neal Lathia, Francesco Calabrese, Giusy Di Lorenzo and Jon Crowcroft. Recommending Social Events from Mobile Phone Location Data. 2010.

Stéphane Distinguin, Pierre-Yves Platini and Amaury de Buchet. Social network websites: best practices from leading services. Fabernovel Consulting, 2007.

P. Mitra and K. Baid. Targeted advertising for online social networks. Department of Computer Science & Engineering, Indian Institute of Technology, 2009.

OAuth Group, OAuth 2.0 Protocol, http://oauth.net/2/


Refbacks

  • There are currently no refbacks.


Journal of Mobile, Embedded and Distributed Systems (JMEDS) ISSN: 2067 – 4074 (online)