Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Communications of the ACM
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Mixminion: Design of a Type III Anonymous Remailer Protocol
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Adaptive query routing in peer web search
WWW '05 Special interest tracks and posters of the 14th international conference on World Wide Web
A Distributed Approach to Node Clustering in Decentralized Peer-to-Peer Networks
IEEE Transactions on Parallel and Distributed Systems
P5: a protocol for scalable anonymous communication
Journal of Computer Security
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Knowledge sharing and yahoo answers: everyone knows something
Proceedings of the 17th international conference on World Wide Web
Computer Networks: The International Journal of Computer and Telecommunications Networking
Learning how: the search for craft knowledge on the internet
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Anonymous opinion exchange over untrusted social networks
Proceedings of the Second ACM EuroSys Workshop on Social Network Systems
Privacy preserving social networking through decentralization
WONS'09 Proceedings of the Sixth international conference on Wireless On-Demand Network Systems and Services
Bifrost: A Novel Anonymous Communication System with DHT
PDCAT '09 Proceedings of the 2009 International Conference on Parallel and Distributed Computing, Applications and Technologies
The anatomy of a large-scale social search engine
Proceedings of the 19th international conference on World wide web
Privacy-preserving P2P data sharing with OneSwarm
Proceedings of the ACM SIGCOMM 2010 conference
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
Cachet: a decentralized architecture for privacy preserving social networking with caching
Proceedings of the 8th international conference on Emerging networking experiments and technologies
Hi-index | 0.00 |
Emerging "live social search" systems such as Aardvark.com allow users to pose questions to their social network in real time. People can thus obtain answers from real humans for questions that prove too complex for web searches. Centralized systems that broker such queries and answers, however, do not provide adequate privacy. The success of these systems will be limited since users may avoid asking or answering questions related to sensitive topics such as health, political activism, or even innocuous questions which may make the querier seem ignorant. Since social search systems leverage the structure of the social network to better match askers and answerers, standard ideas that hide this structure such as "connect to Aardvark via Tor" fall short. Thus new techniques are needed to preserve the privacy of askers and answerers beyond the currently understood anonymity techniques. We explore the new and unique challenges for privacy, and propose Pythia, a decentralized architecture based on "controlled flooding" to enable privacy-enhanced social search that retains some degree of social network structure.