PeerSoN: P2P social networking: early experiences and insights
Proceedings of the Second ACM EuroSys Workshop on Social Network Systems
Distributed Automatic Configuration of Complex IPsec-Infrastructures
Journal of Network and Systems Management
Efficiency of social connection-based routing in P2P VoIP networks
COMSNETS'10 Proceedings of the 2nd international conference on COMmunication systems and NETworks
SocialVPN: Enabling wide-area collaboration with integrated social and overlay networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A survey on automatic configuration of virtual private networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Trans-Social networks for distributed processing
IFIP'12 Proceedings of the 11th international IFIP TC 6 conference on Networking - Volume Part I
Virtual private social networks and a facebook implementation
ACM Transactions on the Web (TWEB)
Hi-index | 0.00 |
In this paper we introduce Social VPNs, a novel system architecture which leverages existing social networking infrastructures to enable ad-hoc VPNs which are self-configuring, self-managing, yet maintain security against untrusted parties. The key principles in our approach are: (1) self-configuring virtual network overlays enable seamless bi-directional IP-layer connectivity among parties linked by means of social connections; (2) social networking infrastructures greatly facilitate the establishment of trust relationships among parties, and these can be seamlessly integrated with existing public-key cryptography implementations to authenticate and encrypt traffic flows on overlay links end-to-end; and (3) knowledge of social connections can be used to improve the performance of overlay routing. This paper describes the architecture of such Social VPNs and a prototype implementation which integrates the Facebook API, IP-over-P2P virtual networks, and the IPsec security infrastructure in a virtual router. We demonstrate the ability of the prototype to support existing, unmodified TCP/IP applications while transparently dealing with the increasingly common case of users connected to the Internet through Network Address Translators (NATs), and present qualitative and quantitative analysis of its functionality and performance.