I Know Where You All Are! Exploiting Mobile Social Apps for Large-Scale Location Privacy Probing View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2016-06-30

AUTHORS

Shuang Zhao , Xiapu Luo , Bo Bai , Xiaobo Ma , Wei Zou , Xinliang Qiu , Man Ho Au

ABSTRACT

Mobile social apps have been changing the way people interact with each other in the physical world. To help people extend their social networks, Location-Based Social Network (LBSN) apps (e.g., Wechat, SayHi, Momo) that encourage people to make friends with nearby strangers have gained their popularity recently. They provide a “Nearby” feature for a user to find other users near him/her. While seeing other users, the user, as well as his/her coarse-grained relative location, will also be visible in the “Nearby” feature of other users. Leveraging this observation, in this paper, we model the location probing attacks, and propose three approaches to perform large-scale such attacks on LBSN apps. Moreover, we apply the new approaches in the risk assessment of eight popular LBSN apps, each of which has millions of installation. The results demonstrate the severity of such attacks. More precisely, our approaches can collect a huge volume of users’ location information effectively and automatically, which can be exploited to invade users’ privacy. This study sheds light on the research of protecting users’ private location information. More... »

PAGES

3-19

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-319-40253-6_1

DOI

http://dx.doi.org/10.1007/978-3-319-40253-6_1

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1052490331


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information Systems", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Beijing Key Laboratory of Network Security and Protection Technology, Beijing, China", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China", 
            "Beijing Key Laboratory of Network Security and Protection Technology, Beijing, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Zhao", 
        "givenName": "Shuang", 
        "id": "sg:person.0671022567.52", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0671022567.52"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "The Hong Kong Polytechnic University Shenzhen Research Institute, Shenzhen, China", 
          "id": "http://www.grid.ac/institutes/grid.16890.36", 
          "name": [
            "Department of Computing, The Hong Kong Polytechnic University, Hung Hom, Hong Kong", 
            "The Hong Kong Polytechnic University Shenzhen Research Institute, Shenzhen, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Luo", 
        "givenName": "Xiapu", 
        "id": "sg:person.012147326730.30", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012147326730.30"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Beijing Key Laboratory of Network Security and Protection Technology, Beijing, China", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China", 
            "Beijing Key Laboratory of Network Security and Protection Technology, Beijing, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Bai", 
        "givenName": "Bo", 
        "id": "sg:person.016057020251.04", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016057020251.04"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "The Hong Kong Polytechnic University Shenzhen Research Institute, Shenzhen, China", 
          "id": "http://www.grid.ac/institutes/grid.16890.36", 
          "name": [
            "MOE KLINNS Lab, Xi\u2019an Jiaotong University, Xi\u2019an, China", 
            "Department of Computing, The Hong Kong Polytechnic University, Hung Hom, Hong Kong", 
            "The Hong Kong Polytechnic University Shenzhen Research Institute, Shenzhen, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Ma", 
        "givenName": "Xiaobo", 
        "id": "sg:person.015130076215.46", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015130076215.46"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Beijing Key Laboratory of Network Security and Protection Technology, Beijing, China", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China", 
            "Beijing Key Laboratory of Network Security and Protection Technology, Beijing, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Zou", 
        "givenName": "Wei", 
        "id": "sg:person.012345512151.06", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012345512151.06"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Beijing Key Laboratory of Network Security and Protection Technology, Beijing, China", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China", 
            "Beijing Key Laboratory of Network Security and Protection Technology, Beijing, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Qiu", 
        "givenName": "Xinliang", 
        "id": "sg:person.014536033551.65", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014536033551.65"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "The Hong Kong Polytechnic University Shenzhen Research Institute, Shenzhen, China", 
          "id": "http://www.grid.ac/institutes/grid.16890.36", 
          "name": [
            "Department of Computing, The Hong Kong Polytechnic University, Hung Hom, Hong Kong", 
            "The Hong Kong Polytechnic University Shenzhen Research Institute, Shenzhen, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Au", 
        "givenName": "Man Ho", 
        "id": "sg:person.07615667465.59", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07615667465.59"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2016-06-30", 
    "datePublishedReg": "2016-06-30", 
    "description": "Mobile social apps have been changing the way people interact with each other in the physical world. To help people extend their social networks, Location-Based Social Network (LBSN) apps (e.g., Wechat, SayHi, Momo) that encourage people to make friends with nearby strangers have gained their popularity recently. They provide a \u201cNearby\u201d feature for a user to find other users near him/her. While seeing other users, the user, as well as his/her coarse-grained relative location, will also be visible in the \u201cNearby\u201d feature of other users. Leveraging this observation, in this paper, we model the location probing attacks, and propose three approaches to perform large-scale such attacks on LBSN apps. Moreover, we apply the new approaches in the risk assessment of eight popular LBSN apps, each of which has millions of installation. The results demonstrate the severity of such attacks. More precisely, our approaches can collect a huge volume of users\u2019 location information effectively and automatically, which can be exploited to invade users\u2019 privacy. This study sheds light on the research of protecting users\u2019 private location information.", 
    "editor": [
      {
        "familyName": "Liu", 
        "givenName": "Joseph K.", 
        "type": "Person"
      }, 
      {
        "familyName": "Steinfeld", 
        "givenName": "Ron", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-319-40253-6_1", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-319-40252-9", 
        "978-3-319-40253-6"
      ], 
      "name": "Information Security and Privacy", 
      "type": "Book"
    }, 
    "keywords": [
      "private location information", 
      "mobile social apps", 
      "such attacks", 
      "location information", 
      "users\u2019 private location information", 
      "social apps", 
      "millions of installations", 
      "social network apps", 
      "location privacy", 
      "huge volume", 
      "nearby strangers", 
      "physical world", 
      "users", 
      "social networks", 
      "apps", 
      "privacy", 
      "attacks", 
      "way people", 
      "new approach", 
      "information", 
      "relative location", 
      "network", 
      "features", 
      "popularity", 
      "location", 
      "millions", 
      "people", 
      "installation", 
      "world", 
      "research", 
      "risk assessment", 
      "results", 
      "friends", 
      "strangers", 
      "volume", 
      "assessment", 
      "observations", 
      "study", 
      "light", 
      "severity", 
      "approach", 
      "paper"
    ], 
    "name": "I Know Where You All Are! Exploiting Mobile Social Apps for Large-Scale Location Privacy Probing", 
    "pagination": "3-19", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1052490331"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-319-40253-6_1"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-319-40253-6_1", 
      "https://app.dimensions.ai/details/publication/pub.1052490331"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-09-02T16:12", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220902/entities/gbq_results/chapter/chapter_211.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-319-40253-6_1"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-40253-6_1'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-40253-6_1'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-40253-6_1'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-40253-6_1'


 

This table displays all metadata directly associated to this object as RDF triples.

154 TRIPLES      22 PREDICATES      66 URIs      59 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-319-40253-6_1 schema:about anzsrc-for:08
2 anzsrc-for:0806
3 schema:author N41a8657bb8ff4dbcaefd6e52efd06187
4 schema:datePublished 2016-06-30
5 schema:datePublishedReg 2016-06-30
6 schema:description Mobile social apps have been changing the way people interact with each other in the physical world. To help people extend their social networks, Location-Based Social Network (LBSN) apps (e.g., Wechat, SayHi, Momo) that encourage people to make friends with nearby strangers have gained their popularity recently. They provide a “Nearby” feature for a user to find other users near him/her. While seeing other users, the user, as well as his/her coarse-grained relative location, will also be visible in the “Nearby” feature of other users. Leveraging this observation, in this paper, we model the location probing attacks, and propose three approaches to perform large-scale such attacks on LBSN apps. Moreover, we apply the new approaches in the risk assessment of eight popular LBSN apps, each of which has millions of installation. The results demonstrate the severity of such attacks. More precisely, our approaches can collect a huge volume of users’ location information effectively and automatically, which can be exploited to invade users’ privacy. This study sheds light on the research of protecting users’ private location information.
7 schema:editor Ncf92eddec3244d7cb4817628518b3efa
8 schema:genre chapter
9 schema:isAccessibleForFree false
10 schema:isPartOf Ndaf2ce73eca649dfb524a0685b6aa755
11 schema:keywords approach
12 apps
13 assessment
14 attacks
15 features
16 friends
17 huge volume
18 information
19 installation
20 light
21 location
22 location information
23 location privacy
24 millions
25 millions of installations
26 mobile social apps
27 nearby strangers
28 network
29 new approach
30 observations
31 paper
32 people
33 physical world
34 popularity
35 privacy
36 private location information
37 relative location
38 research
39 results
40 risk assessment
41 severity
42 social apps
43 social network apps
44 social networks
45 strangers
46 study
47 such attacks
48 users
49 users’ private location information
50 volume
51 way people
52 world
53 schema:name I Know Where You All Are! Exploiting Mobile Social Apps for Large-Scale Location Privacy Probing
54 schema:pagination 3-19
55 schema:productId N67dcaded9ff44f13b57561f14f673390
56 Nb0d8afcaf6274c419809a340416de207
57 schema:publisher Nfd211401076e42f287f8d407206be0b8
58 schema:sameAs https://app.dimensions.ai/details/publication/pub.1052490331
59 https://doi.org/10.1007/978-3-319-40253-6_1
60 schema:sdDatePublished 2022-09-02T16:12
61 schema:sdLicense https://scigraph.springernature.com/explorer/license/
62 schema:sdPublisher N21dbe28a96564f1badd124b171e3f941
63 schema:url https://doi.org/10.1007/978-3-319-40253-6_1
64 sgo:license sg:explorer/license/
65 sgo:sdDataset chapters
66 rdf:type schema:Chapter
67 N201cb41d7bb84c9aa06344810ce30c9a rdf:first sg:person.015130076215.46
68 rdf:rest Na5f0c1762eb04f5ca9f4c5516911460e
69 N203ec55cd78846f8acc6880545a3db67 rdf:first sg:person.07615667465.59
70 rdf:rest rdf:nil
71 N21dbe28a96564f1badd124b171e3f941 schema:name Springer Nature - SN SciGraph project
72 rdf:type schema:Organization
73 N3fdd6697c3424f44a7c723d380529716 schema:familyName Steinfeld
74 schema:givenName Ron
75 rdf:type schema:Person
76 N41a8657bb8ff4dbcaefd6e52efd06187 rdf:first sg:person.0671022567.52
77 rdf:rest Na190f7cb664042f99d6aeae268a7e2ac
78 N67dcaded9ff44f13b57561f14f673390 schema:name doi
79 schema:value 10.1007/978-3-319-40253-6_1
80 rdf:type schema:PropertyValue
81 N86b21ddb11604232b2c60b4c2c1715e2 rdf:first sg:person.014536033551.65
82 rdf:rest N203ec55cd78846f8acc6880545a3db67
83 Na190f7cb664042f99d6aeae268a7e2ac rdf:first sg:person.012147326730.30
84 rdf:rest Ned4ff14adeab464c8da16ac5d74043ec
85 Na5f0c1762eb04f5ca9f4c5516911460e rdf:first sg:person.012345512151.06
86 rdf:rest N86b21ddb11604232b2c60b4c2c1715e2
87 Nb0d8afcaf6274c419809a340416de207 schema:name dimensions_id
88 schema:value pub.1052490331
89 rdf:type schema:PropertyValue
90 Nc75ef78c02e24288a76987910365654e rdf:first N3fdd6697c3424f44a7c723d380529716
91 rdf:rest rdf:nil
92 Ncf92eddec3244d7cb4817628518b3efa rdf:first Nf9e3bad4522f4856997a4a1ff4bc5387
93 rdf:rest Nc75ef78c02e24288a76987910365654e
94 Ndaf2ce73eca649dfb524a0685b6aa755 schema:isbn 978-3-319-40252-9
95 978-3-319-40253-6
96 schema:name Information Security and Privacy
97 rdf:type schema:Book
98 Ned4ff14adeab464c8da16ac5d74043ec rdf:first sg:person.016057020251.04
99 rdf:rest N201cb41d7bb84c9aa06344810ce30c9a
100 Nf9e3bad4522f4856997a4a1ff4bc5387 schema:familyName Liu
101 schema:givenName Joseph K.
102 rdf:type schema:Person
103 Nfd211401076e42f287f8d407206be0b8 schema:name Springer Nature
104 rdf:type schema:Organisation
105 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
106 schema:name Information and Computing Sciences
107 rdf:type schema:DefinedTerm
108 anzsrc-for:0806 schema:inDefinedTermSet anzsrc-for:
109 schema:name Information Systems
110 rdf:type schema:DefinedTerm
111 sg:person.012147326730.30 schema:affiliation grid-institutes:grid.16890.36
112 schema:familyName Luo
113 schema:givenName Xiapu
114 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012147326730.30
115 rdf:type schema:Person
116 sg:person.012345512151.06 schema:affiliation grid-institutes:None
117 schema:familyName Zou
118 schema:givenName Wei
119 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012345512151.06
120 rdf:type schema:Person
121 sg:person.014536033551.65 schema:affiliation grid-institutes:None
122 schema:familyName Qiu
123 schema:givenName Xinliang
124 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014536033551.65
125 rdf:type schema:Person
126 sg:person.015130076215.46 schema:affiliation grid-institutes:grid.16890.36
127 schema:familyName Ma
128 schema:givenName Xiaobo
129 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015130076215.46
130 rdf:type schema:Person
131 sg:person.016057020251.04 schema:affiliation grid-institutes:None
132 schema:familyName Bai
133 schema:givenName Bo
134 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016057020251.04
135 rdf:type schema:Person
136 sg:person.0671022567.52 schema:affiliation grid-institutes:None
137 schema:familyName Zhao
138 schema:givenName Shuang
139 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0671022567.52
140 rdf:type schema:Person
141 sg:person.07615667465.59 schema:affiliation grid-institutes:grid.16890.36
142 schema:familyName Au
143 schema:givenName Man Ho
144 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07615667465.59
145 rdf:type schema:Person
146 grid-institutes:None schema:alternateName Beijing Key Laboratory of Network Security and Protection Technology, Beijing, China
147 schema:name Beijing Key Laboratory of Network Security and Protection Technology, Beijing, China
148 Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
149 rdf:type schema:Organization
150 grid-institutes:grid.16890.36 schema:alternateName The Hong Kong Polytechnic University Shenzhen Research Institute, Shenzhen, China
151 schema:name Department of Computing, The Hong Kong Polytechnic University, Hung Hom, Hong Kong
152 MOE KLINNS Lab, Xi’an Jiaotong University, Xi’an, China
153 The Hong Kong Polytechnic University Shenzhen Research Institute, Shenzhen, China
154 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...