Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
P2P '08 Proceedings of the 2008 Eighth International Conference on Peer-to-Peer Computing
Safe and private data sharing with turtle: friends team-up and beat the system
SP'04 Proceedings of the 12th international conference on Security Protocols
PeerSoN: P2P social networking: early experiences and insights
Proceedings of the Second ACM EuroSys Workshop on Social Network Systems
Virtual individual servers as privacy-preserving proxies for mobile devices
Proceedings of the 1st ACM workshop on Networking, systems, and applications for mobile handhelds
Privacy, cost, and availability tradeoffs in decentralized OSNs
Proceedings of the 2nd ACM workshop on Online social networks
Lockr: better privacy for social networks
Proceedings of the 5th international conference on Emerging networking experiments and technologies
A first step towards user assisted online social networks
Proceedings of the 3rd Workshop on Social Network Systems
IEEE Transactions on Information Technology in Biomedicine
Secure collaborative social networks
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Distributed data usage control for web applications: a social network implementation
Proceedings of the first ACM conference on Data and application security and privacy
Re-Socializing Online Social Networks
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
Trust your social network according to satisfaction, reputation and privacy
Proceedings of the Third International Workshop on Reliability, Availability, and Security
Prometheus: user-controlled P2P social data management for socially-aware applications
Proceedings of the ACM/IFIP/USENIX 11th International Conference on Middleware
Pythia: a privacy aware, peer-to-peer network for social search
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
LotusNet: Tunable privacy for distributed online social network services
Computer Communications
SocialClouds: concept, security architecture and some mechanisms
INTRUST'09 Proceedings of the First international conference on Trusted Systems
PoX: Protecting users from malicious Facebook applications
Computer Communications
Enabling decentralised microblogging through P2PVPNs
International Journal of Security and Networks
Hi-index | 0.00 |
The recent surge in popularity of on-line social network applications raises serious concerns about the security and privacy of their users. Beyond usual vulnerabilities that threaten any distributed application over Internet, on-line social networks raise specific privacy concerns due their inherent handling of personal data. In this paper we point to the centralized architecture of existing on-line social networks as the key privacy issue and suggest a solution that aims at avoiding any centralized control. Our solution is an on-line social network based on a peer-to-peer architecture. Thanks to its fully distributed nature, the peer-to-peer architecture inherently avoids centralized control by any potentially malicious service provider. In order to cope with the lack of trust and lack of cooperation that are akin to peer-to-peer systems and to assure basic privacy among the users of the social network, our solution leverages the trust relationships that are part of the social network application itself. Privacy in basic data access and exchange operations within the social network is achieved thanks to a simple anonymization technique based on multi-hop routing among nodes that trust each other in the social network. Similarly cooperation among peer nodes is enforced based on hop-by-hop trust relationships derived from the social network.