Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems
Middleware '01 Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg
Farsite: federated, available, and reliable storage for an incompletely trusted environment
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
An integrated experimental environment for distributed systems and networks
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Exploiting availability prediction in distributed systems
NSDI'06 Proceedings of the 3rd conference on Networked Systems Design & Implementation - Volume 3
NOYB: privacy in online social networks
Proceedings of the first workshop on Online social networks
FlyByNight: mitigating the privacy risks of social networking
Proceedings of the 7th ACM workshop on Privacy in the electronic society
Privacy preserving social networking through decentralization
WONS'09 Proceedings of the Sixth international conference on Wireless On-Demand Network Systems and Services
A case for P2P infrastructure for social networks - opportunities & challenges
WONS'09 Proceedings of the Sixth international conference on Wireless On-Demand Network Systems and Services
Lockr: better privacy for social networks
Proceedings of the 5th international conference on Emerging networking experiments and technologies
Cuckoo: towards decentralized, socio-aware online microblogging services and data measurements
Proceedings of the 2nd ACM International Workshop on Hot Topics in Planet-scale Measurement
I know what you will do next summer
ACM SIGCOMM Computer Communication Review
Re-Socializing Online Social Networks
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
Sharing social content from home: a measurement-driven feasibility study
Proceedings of the 21st international workshop on Network and operating systems support for digital audio and video
Prometheus: user-controlled P2P social data management for socially-aware applications
Proceedings of the ACM/IFIP/USENIX 11th International Conference on Middleware
Mailbook: privacy-protecting social networking via email
Proceedings of the Third International Conference on Internet Multimedia Computing and Service
LotusNet: Tunable privacy for distributed online social network services
Computer Communications
Privacy challenges in the online social networking era
Proceedings of the 8th Middleware Doctoral Symposium
SocialClouds: concept, security architecture and some mechanisms
INTRUST'09 Proceedings of the First international conference on Trusted Systems
Privacy, availability and economics in the Polaris mobile social network
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications
Scaling microblogging services with divergent traffic demands
Middleware'11 Proceedings of the 12th ACM/IFIP/USENIX international conference on Middleware
Scaling microblogging services with divergent traffic demands
Proceedings of the 12th International Middleware Conference
Building confederated web-based services with Priv.io
Proceedings of the first ACM conference on Online social networks
Understanding the locality effect in Twitter: measurement and analysis
Personal and Ubiquitous Computing
Hi-index | 0.00 |
Online Social Networks (OSNs) have become enormously popular. However, two aspects of many current OSNs have important implications with regards to privacy: their centralized nature and their acquisition of rights to users' data. Recent work has proposed decentralized OSNs as more privacy-preserving alternatives to the prevailing OSN model. We present three schemes for decentralized OSNs. In all three, each user stores his own personal data in his own machine, which we term a Virtual Individual Server (VIS). VISs self-organize into peer-to-peer overlay networks, one overlay per social group with which the VIS owner wishes to share information. The schemes differ in where VISs and data reside: (a) on a virtualized utility computing infrastructure in the cloud, (b) on desktop machines augmented with socially-informed data replication, and (c) on desktop machines during normal operation, with failover to a standby virtual machine in the cloud when the primary VIS becomes unavailable. We focus on tradeoffs between these schemes in the areas of privacy, cost, and availability.