energy-efficient transmission
Network scalability

Samaritan Cloud

Team Members:

Abhishek SamantaFangfei ZhouRavi Sundaram

Background:

People often have the need for assistance from strangers in remote locations. Consider the following requests: please tell the marathon runner with bib #123 I will wait at the finish line; did I leave my keychain on campus? is there a brown puppy roaming in the playground? In this paper we propose, not just a new architecture, but, in fact, a new cloud based service - SamaritanCloud - the goal is to provide a way for people to connect with others (possibly strangers) in a remote location and obtain (physical) help from them. SamaritanCloud is deployed as cell phone application, users submit their requests to the cloud which coordinates users’ requests and efficiently find possible candidates to respond to the request. Such a service will require efficient technical solutions to problems such as scalability, privacy, reputation etc to overcome the social barriers of soliciting help from strangers. We focus primarily on the technical aspects of scalability and privacy (matching people with strangers in a secure and private way) so that the need for help and the ability/desire to assist are disclosed safely.

Since the emergence of online social networks (OSNs), people have sought help from their social contacts. The most common method to seek for help on social network sites, e.g, Facebook, Twitter, or “strangers helping strangers” [1], is post - an user posts his/her question or request on his/her social network page or a relative group page and waits for response, which is very similar to subscribing to an email list and broadcast questions except exposing more privacy. This and other methods proposed so far ([1]-[24])have some disadvantages including loss of privacy (in terms of both location as well as the nature of the help sought) and high response times.

Goal:

The main goal of this project is to propose a scalable mobile infrastructure that enables a group of mobile and geographically-dispersed personal computing devices to form a cloud for the purpose of privately sharing relevant locality-specific information.

Publication:

Abhishek Samanta, Fangfei Zhou, Ravi Sundaram. SamaritanCloud: Secure and Scalable Infrastructure for enabling Location-based Services in IFIP Networking 2013

References:

[1] “Strangers helping strangers,” http://www.facebook.com/SHStrangers.
[2] “Yelp,” http://www.yelp.com/
[3] “Facebook places,” http://www.facebook.com/facebookplaces.
[4] “Gowalla,” http://gowalla.com/.
[5] “Foursquare,” https://foursquare.com/.
[6] D. Stackpole Dynamic geosocial networking , Patent US 2008/0 140 650 A1, 06 12, 2008.
[7] Q. Huang and Y. Liu. On geo-social network services, in Geoinformatics, 2009.
[8] A. Cooper and T. Hardie, Geopriv: creating building blocks for managing location privacy on the internet, in IETF Journal, 2002.
[9] G. Myles, A. Friday, and N. Davies. Preserving privacy in environments with location-based applications , in Pervasive Computing, IEEE, 2003.
[10] H. Kido, Y. Yanagisawa, and T. Satoh. An anonymous communication technique using dummies for location-based services , in Proceedings of IEEE International Conference on Pervasive Service, 2005.
[11] A. R. Beresford and F. Stajano Location privacy in pervasive computing, in IEEE Pervasive Computing, 2003.
[12] K. P. Tang, P. Keyani, J. Fogarty, and J. I. Hong. Putting people in their place: An anonymous and privacy-sensitive approach to collecting sensed data in location-based applications , in Proceedings of the SIGCHI conference on Human Factors in Computing Systems, 2006.
[13] M. Gruteser and X. Liu. Protecting privacy in continuous location-tracking applications , in IEEE security and privacy, 2004.
[14] M. Duckham and L. Kulik. A formal model of obfuscation and negotiation for location privacy , in Pervasive, 2005.
[15] M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloacking , in Proceedings of the International Conference on MobiSys, 2003.
[16] B. Gedik and L. Liu. A customizable k-anonymity model for protecting location privacy , in Proceeding of the International Conference on Distributed Computing Systems, 2005.
[17] M. F. Mokbel, C.-Y. Chow, and W. G. Aref. The new casper: a privacy-aware location-based database server, in IEEE 23rd International Conference on Data Engineering, 2007.
[18] J. I. Hong and J. A. Landay. An architecture for privacy-sensitive ubiquitous computing, in Proceedings of the International Conference on Mobile Systems, 2004.
[19] S. Goldwasser and S. Micali. Probabilistic encryption & how to play mental poker keeping secret all partial information, in Proceedings of the fourteenth annual ACM symposium on Theory of computing, STOC ’82. ACM, 1982.
[20] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms, in Information Theory, IEEE Transactions on, vol. 31, no. 4, pp. 469 – 472, jul 1985.
[21] C. Gentry. Fully homomorphic encryption using ideal lattices, in Proceedings of the 41st annual ACM symposium on Theory of computing, STOC ’09. ACM, 2009.
[23] K. Lauter, M. Naehrig, and V. Vaikuntanathan. Can homomorphic encryption be practical?, in Proceedings of the 3rd ACM workshop on Cloud computing security workshop, CCSW ’11. ACM, 2011.
[24] C. Raiciu and D. S. Rosenblum. Enabling confidentiality in content-based publish/subscribe infrastructures, in Securecomm and Workshops, 2006.
[25] R. S. Michael Mitzenmacher, Andrea W. Richa. The power of two random choices: A survey of techniques and results, in Handbook of Randomized Computing. Kluwer, 2000, pp. 255–312.