Principles of Database and Knowledge-Base Systems: Volume II: The New Technologies
Principles of Database and Knowledge-Base Systems: Volume II: The New Technologies
Logic and Data Bases
Declarative networking: language, execution and optimization
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Homeviews: peer-to-peer middleware for personal data sharing applications
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
EnsemBlue: integrating distributed storage and consumer electronics
OSDI '06 Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation - Volume 7
OpenID identity discovery with XRI and XRDS
Proceedings of the 7th symposium on Identity and trust on the Internet
NOYB: privacy in online social networks
Proceedings of the first workshop on Online social networks
Predicting tie strength with social media
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Persona: an online social network with user-defined privacy
Proceedings of the ACM SIGCOMM 2009 conference on Data communication
Lockr: better privacy for social networks
Proceedings of the 5th international conference on Emerging networking experiments and technologies
Personal data vaults: a locus of control for personal data streams
Proceedings of the 6th International COnference
Yarta: a middleware for managing mobile social ecosystems
GPC'11 Proceedings of the 6th international conference on Advances in grid and pervasive computing
Sensorsafe: a framework for privacy-preserving management of personal sensory information
SDM'11 Proceedings of the 8th VLDB international conference on Secure data management
Fast track article: Balancing behavioral privacy and information utility in sensory data flows
Pervasive and Mobile Computing
Social networking with frientegrity: privacy and integrity with an untrusted provider
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Enabling mobile distributed social networking on smartphones
Proceedings of the 15th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
Dynamic enforcement of knowledge-based security policies using probabilistic abstract interpretation
Journal of Computer Security
Hi-index | 0.01 |
This paper presents PrPl, a decentralized infrastructure that lets users participate in online social networking without loss of data ownership. PrPl, short for private-public, has a person-centric architecture--each individual uses a Personal-Cloud Butler service that provides a safe haven for one's personal digital assets and supports sharing with fine-grain access control. A user can choose to run the Butler on a home server, or use a paid or ad-supported vendor of his choice. Each Butler provides a federation of data storage; it keeps a semantic index to data that can reside, possibly encrypted, in other storage services. It uses the standard, decentralized OpenID management system, so users can use their established personas in accessing the data. One pre-requisite to the success of a platform is the availability of applications, which means that ease of application development is essential. We have developed a language called SociaLite, based on Datalog, that allows developers to use a simple declarative database query to access the large collection of private data served up by the Butlers in our social circle running under different administrative domains. We have developed a prototype of the PrPl infrastructure and implemented a number of simple social applications on the system. We found that the applications can be written in a small number of lines of code using SociaLite. Preliminary experimental results suggest that it is viable to enable sharing of private social data between close friends with a decentralized architecture.