Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2018, Article ID 3182402, 22 pages
https://doi.org/10.1155/2018/3182402
Research Article

Exploiting Proximity-Based Mobile Apps for Large-Scale Location Privacy Probing

1Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
2School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China
3Department of Computing, The Hong Kong Polytechnic University, Hung Hom, Hong Kong
4MOE KLINNS Lab, Xi’an Jiaotong University, Xi’an, China
5Beijing One Scorpion Cyber Security Co., Ltd., Beijing, China

Correspondence should be addressed to Xiaobo Ma; nc.ude.utjx@sc.amx

Received 7 September 2017; Revised 17 December 2017; Accepted 27 December 2017; Published 14 February 2018

Academic Editor: Petros Nicopolitidis

Copyright © 2018 Shuang Zhao et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. Y. Zheng, “Tutorial on location-based social networks,” in Proceedings of the 21st international conference on World wide web, vol. 12, 2012.
  2. Foursquare Inc, https://foursquare.com/about.
  3. M. Hattersley, Google+ Companion, John Wiley & Sons, 2012.
  4. Statista Inc, Number of active wechat messenger accounts 2010–2015, http://www.statista.com/statistics/255778/number-of-active-wechat-messenger-accounts/.
  5. J. O'Dell, A Field Guide to Using Facebook Places, Aug 2012, http://mashable.com/2010/08/18/facebook-places-guide/#hxTFxQjU78qq.
  6. R. Rogers, J. Lombardo, Z. Mednieks, and B. Meike, Android Application Development: Programming with the Google SDK, O’Reilly Media, Inc., 2009.
  7. Baidu Inc, Baidu location sdk, http://api.map.baidu.com/lbsapi/cloud/geosdk.htm.
  8. W. Murphy and W. Hereman, Determination of a Position in Three Dimensions Using Trilateration and Approximate Distances, Department of Mathematical and Computer Sciences, Colorado School of Mines, Golden, Colorado, 1995.
  9. E. Lawrence, Fiddler: Web Debugging Proxy, 2007.
  10. K. Hickman and T. Elgamal, The ssl protocol, vol. 501, Netscape Communications Corp, 1995.
  11. N. Rudrappa, Defeating ssl certificate validation for android applications.
  12. Github. ios-ssl-kill-switch. https://github.com/iSECPartners/ios-ssl-kill-switch.
  13. Github. Android-ssl-trust-killer ssl kill switch, https://github.com/iSECPartners/Android-SSL-TrustKiller.
  14. C. Evans, C. Palmer, and R. Sleevi, “Public Key Pinning Extension for HTTP,” RFC Editor RFC7469, 2015. View at Publisher · View at Google Scholar
  15. N. Nurseitov, M. Paulson, R. Reynolds, and C. Izurieta, “Comparison of JSON and XML data interchange formats: A case study,” in Proceedings of the 22nd International Conference on Computer Applications in Industry and Engineering 2009, CAINE 2009, pp. 157–162, USA, November 2009. View at Scopus
  16. R. Winsniewski, Android–apktool: A tool for reverse engineering android apk files, 2012.
  17. B. Alll and C. Tumbleson, Dex2jar: Tools to work with android. dex and java. class files.
  18. E. Dupuy, Jd-gui: Yet another fast java decompiler, 2012, http://java.decompiler.free.fr/?q=jdgui/.
  19. Android Developers. Using the android emulator, 2012.
  20. Android Developers. Uiautomator, 2013.
  21. M. Ester, H. P. Kriegel, J. Sander, and X. Xu, “Density-based spatial clustering of applications with noise,” in Proceedings of the Int. Conf. Knowledge Discovery and Data Mining, vol. 240, 1996.
  22. P. Golle and K. Partridge, “On the anonymity of home/work location Pairs,” in Proceedings of the 7th International Conference on Pervasive Computing, pp. 390–397, Berlin, Germany, 2009. View at Publisher · View at Google Scholar
  23. S. Fahl, M. Harbach, T. Muders, M. Smith, L. Baumgärtner, and B. Freisleben, “Why Eve and Mallory love Android: An analysis of Android SSL (in)security,” in Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 2012, pp. 50–61, USA, October 2012. View at Publisher · View at Google Scholar · View at Scopus
  24. Q. Li and G. Cao, “Providing privacy-aware incentives in mobile sensing systems,” IEEE Transactions on Mobile Computing, vol. 15, no. 6, pp. 1485–1498, 2016. View at Publisher · View at Google Scholar · View at Scopus
  25. G. Wang, B. Wang, T. Wang, A. Nika, H. Zheng, and B. Y. Zhao, “Defending against sybil devices in crowdsourced mapping services,” in Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys '16, pp. 179–191, New York, NY, USA, June 2016. View at Publisher · View at Google Scholar · View at Scopus
  26. K. Fawaz and K. G. Shin, “Location privacy protection for smartphone users,” in Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS '14), pp. 239–250, USA, November 2014. View at Publisher · View at Google Scholar · View at Scopus
  27. T. Jeske, “Floating car data from smartphones: What google and waze know about you and how hackers can control traffic,” in Blackhat, 2013. View at Google Scholar
  28. M. Gruteser and D. Grunwald, “Anonymous usage of location-based services through spatial and temporal cloaking,” in Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, pp. 31–42, ACM, San Francisco, Calif, USA, May 2003. View at Publisher · View at Google Scholar
  29. M. Duckham and L. Kulik, “A formal model of obfuscation and negotiation for location privacy,” in Proceedings of International Conference of Pervasive Computing (LNCS '05), pp. 152–170, Munich, Germany, May 2005. View at Scopus
  30. S. Mascetti, C. Bettini, D. Freni, and X. S. Wang, “Spatial generalisation algorithms for LBS privacy preservation,” Journal of Location Based Services, vol. 1, no. 3, pp. 179–207, 2007. View at Publisher · View at Google Scholar · View at Scopus
  31. T. Xu and Y. Cai, “Feeling-based location privacy protection for location-based services,” in Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS '09), pp. 348–357, ACM, Chicago, Ill, USA, November 2009. View at Publisher · View at Google Scholar
  32. G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan, “Private queries in location based services: anonymizers are not necessary,” in Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD '08), pp. 121–132, ACM, 2008. View at Publisher · View at Google Scholar
  33. W. Dong, V. Dave, L. Qiu, and Y. Zhang, “Secure friend discovery in mobile social networks,” in Proceedings of the IEEE INFOCOM, pp. 1647–1655, April 2011. View at Publisher · View at Google Scholar · View at Scopus
  34. N. Li and G. Chen, “Analysis of a location-based social network,” in Proceedings of the 2009 IEEE International Conference on Social Computing, SocialCom 2009, pp. 263–270, Canada, August 2009. View at Publisher · View at Google Scholar · View at Scopus
  35. L. Jedrzejczyk, B. A. Price, A. K. Bandara, and B. Nuseibeh, “On the impact of real-time feedback on users' behaviour in mobile location-sharing applications,” in Proceedings of the the Sixth Symposium, p. 1, Redmond, Washington, July 2010. View at Publisher · View at Google Scholar
  36. M. Li, H. Zhu, Z. Gao et al., “All your Location are Belong to Us: Breaking mobile social networks for automated user location tracking,” in Proceedings of the 15th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2014, pp. 43–52, USA, August 2014. View at Publisher · View at Google Scholar · View at Scopus
  37. B. Carbunar, R. Sion, R. Potharaju, and M. Ehsan, “Private badges for geosocial networks,” IEEE Transactions on Mobile Computing, vol. 13, no. 10, pp. 2382–2396, 2014. View at Publisher · View at Google Scholar · View at Scopus
  38. E. Cho, S. A. Myers, and J. Leskovec, “Friendship and mobility: user movement in location-based social networks,” in Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1082–1090, ACM, August 2011. View at Publisher · View at Google Scholar · View at Scopus
  39. C. Zhiyuan, J. Caverlee, L. Kyumin, and D. Z. Sui, “Exploring millions of footprints in location sharing services,” ICWSM, vol. 2011, pp. 81–88, 2011. View at Google Scholar
  40. J. Friginal, S. Gambs, J. Guiochet, and M.-O. Killijian, “Towards privacy-driven design of a dynamic carpooling system,” Pervasive and Mobile Computing, vol. 14, pp. 71–82, 2014. View at Publisher · View at Google Scholar · View at Scopus
  41. U. M. Aïvodji, “Privacy enhancing technologies for ridesharing,” in Proceedings of the Student Forum of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016.