Security Elements in Distributed Mobile Architectures

Authors

  • Vlad Petre The Bucharest University of Economic Studies

Keywords:

Android, social network, geolocation, real time, security, audit, mobile distributed architecture

Abstract

The mobile phones have emerged in order to overcome the basic need of human beings for being in contact one with each other. In time, the functionalities of such devices have evolved. And so, the users have started to use more and more online social services like Facebook™, Twitter™ or Foursquare™, in order to keep in touch more easily. Unfortunately, the current information exchange models come with a high risk when it comes to sensitive areas like keeping the users’ data private and protecting the intimacy of the users. The purpose of this paper is to make an audit of such a mobile distributed architecture – a real time location based mobile social network that aims at helping its users to remain in permanent contact with their beloved ones.

Author Biography

Vlad Petre, The Bucharest University of Economic Studies

IT&C Security Master Program

Department of Economic Informatics and Cybernetics

References

Facebook. Facebook Mobile: 100 Million and Growing. https://www.facebook.com/blog/blog.php?post=297879717130 , accessed on 08.05.2013.

Catalin Boja, Mihai Doinea, Usability Vs. Security In Mobile Applications, Proceedings of the 12th International Conference on INFORMATICS in ECONOMY (IE 2013), Education, Research & Business Technologies, Bucharest, Romania, 2013, pp. 138-142

Gorumors. Most Accessed Social Network From Mobile Phones. http://gorumors.com/crunchies/most-accessed-social-network-from-mobile-phones/ , accessed on 08.05.2013.

Daniel Plohmann, Paul Imhoff. Localization (GPS, GSM, WLAN). XP Course, Universitaet Bonn, 2007.

Daniele Quercia, Neal Lathia, Francesco Calabrese, Giusy Di Lorenzo and Jon Crowcroft. Recommending Social Events from Mobile Phone Location Data. 2010.

Stéphane Distinguin, Pierre-Yves Platini and Amaury de Buchet. Social network websites: best practices from leading services. Fabernovel Consulting, 2007.

P. Mitra and K. Baid. Targeted advertising for online social networks. Department of Computer Science & Engineering, Indian Institute of Technology, 2009.

OAuth Group, OAuth 2.0 Protocol, http://oauth.net/2/

Downloads

Published

2014-03-30

How to Cite

Petre, V. (2014). Security Elements in Distributed Mobile Architectures. Journal of Mobile, Embedded and Distributed Systems, 6(1), 24-29. Retrieved from http://jmeds.eu/index.php/jmeds/article/view/Security_Elements_in_Distributed_Mobile_Architectures