End-to-End Secure and Privacy Preserving Mobile Chat Application

Raja Naeem Akram, Ryan K. L. Ko

Research output: Chapter in Book/Report/Conference proceedingPublished conference contribution

8 Citations (Scopus)

Abstract

Since the 1990s, two technologies have reshaped how we see and experience the world around us. These technologies are the Internet and mobile communication, especially smartphones. The Internet provides a cheap and convenient way to explore and communicate with distant people. A multitude of services have converged on the smartphone platform, and potentially the most notable is social networking. With increased interconnectivity and use of online services, concerns about consumers' security and privacy are growing. In this paper, we evaluate the security- and privacy-preserving features provided by existing mobile chat services. This paper also puts forwards a basic framework for an End-to-End (E2E) security and privacy-preserving mobile chat service and associated requirements. We implemented the proposal to provide proof-of-concept and evaluate the technical difficulty of satisfying the stipulated security and privacy requirements.
Original languageEnglish
Title of host publicationIFIP International Workshop on Information Security Theory and Practice
Subtitle of host publicationWISTP 2014: Information Security Theory and Practice. Securing the Internet of Things.
EditorsD Naccache, D. Sauveron
PublisherSpringer
Pages124-139
DOIs
Publication statusPublished - 1 Jun 2014

Publication series

NameLecture Notes in Computer Science
Volume8501

Bibliographical note

Akram R.N., Ko R.K.L. (2014) End-to-End Secure and Privacy Preserving Mobile Chat Application. In: Naccache D., Sauveron D. (eds) Information Security Theory and Practice. Securing the Internet of Things. WISTP 2014. Lecture Notes in Computer Science, vol 8501. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43826-8_9

Fingerprint

Dive into the research topics of 'End-to-End Secure and Privacy Preserving Mobile Chat Application'. Together they form a unique fingerprint.

Cite this