[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1411759.1411775acmconferencesArticle/Chapter ViewAbstractPublication PageshotmobileConference Proceedingsconference-collections
research-article

Location-based trust for mobile user-generated content: applications, challenges and implementations

Published: 25 February 2008 Publication History

Abstract

The recent explosion in shared media content and sensed data produced by mobile end-users is challenging well-established principles and assumptions in data trust models. A fundamental issue we address in this paper is how to establish some trust level in the authenticity of content created by untrusted mobile users. We advocate a secure localization and certification service that allows content producers to tag their content with with a spatial times-tamp indicating its physical location. At the same time, however, our approach preserves the privacy of producers by not exposing their identity to the potential content consumers. We provide a list of existing and possible applications that would profit from such a secure localization service and sketch possible implementations of the service, highlighting advantages and drawbacks.

References

[1]
S. Ahern, M. Davis, D. Eckles, S. King, M. Naaman, R. Nair, M. Spasojevic, and J. Yang. ZoneTag: Designing Context-Aware Mobile Media Capture to Increase Participation. In Workshop on Pervasive Image Capture and Sharing (PICS 2006), Ubicomp 2006., 2006.
[2]
I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. Survey on sensor networks. Communications Magazine, IEEE, 40:102--114, 2002.
[3]
ANSI. Trusted Time Stamps, American National Standard X9.95--2005, 2005.
[4]
Bit Torrent, http://www.bittorrent.com/.
[5]
C. Adams, P. Cain, D. Pinkas and R. Zuccherato. Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP), The Internet Engineering Taskforce RFC3161--2001, 2001.
[6]
S. Capkun and J. Hubaux. Secure positioning of wireless devices with application to sensor networks. In Proceedings of IEEE INFOCOM, Miama, FL, USA, March 2005.
[7]
Cell-Loc. http://www.cell-loc.com/.
[8]
E. Cooke, F. Jahanian, and D. Mcpherson. The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets. In Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI), pages 39--44, June 2006.
[9]
I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker. Digital Watermarking and Steganography, volume 1. Morgan Kaufmann, 2 edition, 2008.
[10]
D. E. Denning and P. F. MacDoran. Location-Based Authentication: Grounding Cyberspace for Better Security. In Elsevier Computer Fraud and Security, February 1996.
[11]
Digg. http://digg.com/.
[12]
J. Douceur. The sybil attack. In International Workshop on Peer-to-Peer Systems (IPTPS), Cambridge, MA, USA, 2002.
[13]
eBay, http://www.ebay.com.
[14]
Flickr. http://www.flickr.com/.
[15]
Geometrix MLC. http://www.geometrix911.com/.
[16]
A. Haeberlen, E. Flannery, A. M. Ladd, A. Rudys, D. S. Wallach, and L. E. Kavraki. Practical robust localization over large-scale 802.11 wireless networks. In Proceedings of ACM MOBICOM), Philadelphia, PA, USA, September 2004.
[17]
V. Otason, A. Varshavsky, A. LaMarca, and E. de Lara. Accurate GSM Indoor Localization. In Proceedings of UbiComp, pages 141--158, Tokio, Japan, September 2005.
[18]
B. Schneier. Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley, 1996.
[19]
TruePosition. What is trueposition cellular location system?, http://www.trueposition.com/. http://www.trueposition.com/intro.htm, 2001.
[20]
Weather Underground. http://www.wunderground.com/.
[21]
Wikipedia. http://wikipedia.org/.
[22]
M. Wu and B. Liu. Watermarking for image authentication. In In the proceedings of IEEE International Conference on Image Processing (ICIP'98), 1998.
[23]
M. Wu and B. Liu. Watermarking for image authentication. In International Conference on Image Processing (ICIP 98), Chicago, USA, October 1998.
[24]
M. Wu and B. Liu. Data Hiding in Image and Video: Part-I -- Fundamental Issues and Solutions. IEEE Trans. on Image Proc., 12:685--695, 2003.
[25]
M. Wu, H. Yu, and B. Liu. Data Hiding in Image and Video: Part-II -- Designs and Applications. IEEE Trans, on Image Proc., 12:696--705, 2003.
[26]
YouTube. http://www.youtube.com/.
[27]
P. R. Zimmermann. The Official PGP User's Guide. The MIT Press, 1995.

Cited By

View all
  • (2024)Viewer In-Consumption Engagement in Pro-Environmental Tourism Videos: A Video Analytics ApproachJournal of Travel Research10.1177/00472875231219634Online publication date: 10-Jan-2024
  • (2022)Towards Large-Scale and Privacy-Preserving Contact Tracing in COVID-19 Pandemic: A Blockchain PerspectiveIEEE Transactions on Network Science and Engineering10.1109/TNSE.2020.30309259:1(282-298)Online publication date: 1-Jan-2022
  • (2021)MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed ConsensusSensors10.3390/s2115509621:15(5096)Online publication date: 28-Jul-2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
HotMobile '08: Proceedings of the 9th workshop on Mobile computing systems and applications
February 2008
106 pages
ISBN:9781605581187
DOI:10.1145/1411759
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 February 2008

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Funding Sources

Conference

HotMobile08
Sponsor:
HotMobile08: Workshop on Mobile Computing Systems and Applications
February 25 - 26, 2008
California, Napa Valley

Acceptance Rates

Overall Acceptance Rate 96 of 345 submissions, 28%

Upcoming Conference

HOTMOBILE '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)29
  • Downloads (Last 6 weeks)6
Reflects downloads up to 11 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Viewer In-Consumption Engagement in Pro-Environmental Tourism Videos: A Video Analytics ApproachJournal of Travel Research10.1177/00472875231219634Online publication date: 10-Jan-2024
  • (2022)Towards Large-Scale and Privacy-Preserving Contact Tracing in COVID-19 Pandemic: A Blockchain PerspectiveIEEE Transactions on Network Science and Engineering10.1109/TNSE.2020.30309259:1(282-298)Online publication date: 1-Jan-2022
  • (2021)MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed ConsensusSensors10.3390/s2115509621:15(5096)Online publication date: 28-Jul-2021
  • (2021)User-Generated Content and Its Applications in Urban StudiesUrban Informatics10.1007/978-981-15-8983-6_29(523-539)Online publication date: 7-Apr-2021
  • (2020)Location Proof Systems for Smart Internet of Things: Requirements, Taxonomy, and Comparative AnalysisElectronics10.3390/electronics91117769:11(1776)Online publication date: 26-Oct-2020
  • (2020)C-14Proceedings of the 26th Annual International Conference on Mobile Computing and Networking10.1145/3372224.3419196(1-13)Online publication date: 16-Apr-2020
  • (2019)Crowd-Powered Sensing and Actuation in Smart Cities: Current Issues and Future DirectionsIEEE Wireless Communications10.1109/MWC.2019.180003026:2(86-92)Online publication date: Apr-2019
  • (2019)Location corroboration using passive observations of IEEE 802.11 Access Points2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)10.1109/CCNC.2019.8651873(1-7)Online publication date: Jan-2019
  • (2019)Incorporating nocturnal UAV side-view images with VIIRS data for accurate population estimation: a test at the urban administrative district scaleInternational Journal of Remote Sensing10.1080/01431161.2019.161565340:22(8528-8546)Online publication date: 14-May-2019
  • (2019)Multimedia Analysis on User-Generated Content for Safety-Oriented ApplicationsSocial Media Strategy in Policing10.1007/978-3-030-22002-0_9(161-175)Online publication date: 12-Oct-2019
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media