The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.12 - December (2010 vol.9)
pp: 1682-1696
Yunxin Liu , Shanghai Jiao Tong University, Shanghai
Ahmad Rahmati , Rice University, Houston
Hyukjae Jang , KAIST, Daejeon
Yuanhe Huang , Tsinghua University, Beijing
Lin Zhong , Rice University, Houston
Yongguang Zhang , Microsoft Research Asia, Beijing
Shensheng Zhang , Shanghai Jiao Tong University, Shanghai
ABSTRACT
Mobile phones are truly personal devices loaded with personal data such as photos, contacts, and call history. Yet it is often necessary or desirable to share our phones with others. This is especially true as mobile phones are integrating features conventionally provided by other dedicated devices, from MP3 players to games consoles. Yet existing phones assume a single user and provide little protection for private data and applications when a phone is shared. That is, when we lend our phones to others, we give away complete access. In this work, we present xShare, a protection solution to address this problem. xShare allows phone owners to rapidly specify what they want to share and place the phone into a restricted mode where only the data and applications intended for sharing can be accessed. We first present two formative user studies and derive the design requirements of xShare. We then offer the design of xShare based on file-level access control. We describe the implementation of xShare on Windows Mobile and report a comprehensive evaluation, including performance measurements, usability, and a one-month field trial.
INDEX TERMS
Mobile phone, sharing, privacy, virtualization.
CITATION
Yunxin Liu, Ahmad Rahmati, Hyukjae Jang, Yuanhe Huang, Lin Zhong, Yongguang Zhang, Shensheng Zhang, "Design, Realization, and Evaluation of xShare for Impromptu Sharing of Mobile Phones", IEEE Transactions on Mobile Computing, vol.9, no. 12, pp. 1682-1696, December 2010, doi:10.1109/TMC.2010.162
REFERENCES
[1] A. Brush and K. Inkpen, “Yours, Mine and Ours? Sharing and Use of Technology in Domestic Environments,” Proc. Int'l Conf. Ubiquitous Computing, pp. 109-126, 2007.
[2] A.L. Chavan and D. Gorney, “The Dilemma of the Shared MobilePhone—Culture Strain and Product Design in Emerging Economies,” ACM Interactions, vol. 15, pp. 34-39, 2008.
[3] M. Hall, “Create a Windows CE Image that Boots to Kiosk Mode,” http://msdn.microsoft.com/en-uslibraryaa446914.aspx , 2009.
[4] R. Hull, B. Kumar, D. Lieuwen, P. Patel-Schneider, A. Sahuguet, S. Varadarajan, and A. Vyas, “Enabling Context-Aware and Privacy-Conscious User Data Sharing,” Proc. IEEE Int'l Conf. Mobile Data Management, 2004.
[5] G.C. Hunt and D. Brubacher, “Detours: Binary Interception of Win32 Functions,” Proc. Conf. USENIX Windows NT Symp., 1999.
[6] S. Jain, F. Shafique, V. Djeric, and A. Goel, “Application-Level Isolation and Recovery with Solitude,” Proc. Third ACM SIGOPS/EuroSys European Conf. Computer Systems, 2008.
[7] P.H. Kamp and R.N.M. Watson, “Jails: Confining the Omnipotent Root,” Proc. Second Int'l SANE Conf., 2000.
[8] A.K. Karlson, A.J.B. Brush, and S. Schechter, “Can I Borrow Your Phone?: Understanding Concerns When Sharing Mobile Phones,” Proc. SIGCHI, 2009.
[9] B. Lampson, “Computer Security in the Real World,” Proc. Ann. Computer Security Applications Conf., 2000.
[10] Z. Liang, V.N. Venkatakrishnan, and R. Sekar, “Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs,” Proc. 19th Ann. Computer Security Applications Conf., 2003.
[11] B. des Ligneris, “Virtualization of Linux Based Computers: The Linux-VServer Project,” Proc. 19th Int'l Symp. High Performance Computing Systems and Applications, pp. 340-346, 2005.
[12] J.S. Olson, J. Grudin, and EricHorvitz, “A Study of Preferences for Sharing and Privacy,” Proc. Extended Abstracts on Human Factors in Computing Systems, 2005.
[13] T. Pering, D.H. Nguyen, J. Light, and R. Want, “Face-to-Face Media Sharing Using Wireless Mobile Devices,” Proc. IEEE Int'l Symp. Multimedia, 2005.
[14] D. Price and A. Tucker, “Solaris Zones: Operating System Support for Consolidating Commercial Workloads,” Proc. 18th USENIX Conf. System Administration, 2004.
[15] S. Soltesz, H. Pötzl, M.E. Fiuczynski, A. Bavier, and L. Peterson, “Container-Based Operating System Virtualization: A Scalable, High-Performance Alternative to Hypervisors,” ACM SIGOPS Operating Systems Rev., vol. 41, pp. 275-287, 2007.
[16] A. Voida, R.E. Grinter, N. Ducheneaut, W.K. Edwards, and M.W. Newman, “Listening In: Practices Surrounding iTunes Music Sharing,” Proc. SIGCHI, 2005.
[17] Y. Yu, F. Guo, S. Nanda, L.-c. Lam, and T.-c. Chiueh, “A Feather-Weight Virtual Machine for Windows Applications,” Proc. Second Int'l Conf. Virtual Execution Environments, 2006.
[18] Likert Scale, http://en.wikipedia.org/wikiLikert_scale , 2010.
[19] Parents Using Smartphones to Entertain Bored Kids, CNN Living with Technology, http://www.cnn.com/2010/TECH/04/26/smartphones.kids index.html?hpt= Mid, 2010.
[20] SPB Software House, “SPB Kiosk Engine,” http://www.spb softwarehouse.com/products kioskengine, 2010.
[21] VMware Corporation, “VMware Mobile Virtualization Platform,” http://www.vmware.com/technologymobile, 2010.
18 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool