A privacy-preserving scheme for online social networks with efficient revocation
INFOCOM'10 Proceedings of the 29th conference on Information communications
Cuckoo: towards decentralized, socio-aware online microblogging services and data measurements
Proceedings of the 2nd ACM International Workshop on Hot Topics in Planet-scale Measurement
Profile popularity in a business-oriented online social network
Proceedings of the 3rd Workshop on Social Network Systems
Virtual private social networks
Proceedings of the first ACM conference on Data and application security and privacy
Measuring profile distance in online social networks
Proceedings of the International Conference on Web Intelligence, Mining and Semantics
Vulnerability in socially-informed peer-to-peer systems
Proceedings of the 4th Workshop on Social Network Systems
Defamation-free networks through user-centered data control:
STM'10 Proceedings of the 6th international conference on Security and trust management
Research challenges towards the Future Internet
Computer Communications
Privacy-aware and scalable content dissemination in distributed social networks
ISWC'11 Proceedings of the 10th international conference on The semantic web - Volume Part II
Privacy preserving picture sharing: enforcing usage control in distributed on-line social networks
Proceedings of the Fifth Workshop on Social Network Systems
Towards robust and scalable peer-to-peer social networks
Proceedings of the Fifth Workshop on Social Network Systems
Online social network platforms: toward a model-backed security evaluation
Proceedings of the 1st Workshop on Privacy and Security in Online Social Media
Scaling microblogging services with divergent traffic demands
Middleware'11 Proceedings of the 12th ACM/IFIP/USENIX international conference on Middleware
TrustSplit: usable confidentiality for social network messaging
Proceedings of the 23rd ACM conference on Hypertext and social media
Cryptographic treatment of private user profiles
FC'11 Proceedings of the 2011 international conference on Financial Cryptography and Data Security
Social networking with frientegrity: privacy and integrity with an untrusted provider
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Enabling mobile distributed social networking on smartphones
Proceedings of the 15th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
Mobile social networks: state-of-the-art and a new vision
International Journal of Communication Systems
NordSec'12 Proceedings of the 17th Nordic conference on Secure IT Systems
Scaling microblogging services with divergent traffic demands
Proceedings of the 12th International Middleware Conference
For some eyes only: protecting online information sharing
Proceedings of the third ACM conference on Data and application security and privacy
C4PS - helping facebookers manage their privacy settings
SocInfo'12 Proceedings of the 4th international conference on Social Informatics
Modeling Social Network Interaction Graphs
ASONAM '12 Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
An Analysis of Query Forwarding Strategies for Secure and Privacy-Preserving Social Networks
ASONAM '12 Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
Building confederated web-based services with Priv.io
Proceedings of the first ACM conference on Online social networks
Virtual private social networks and a facebook implementation
ACM Transactions on the Web (TWEB)
Open Social Networking for Online Collaboration
International Journal of e-Collaboration
Open Social Networking for Online Collaboration
International Journal of e-Collaboration
Supporting Social Networks With Agent-Based Services
International Journal of Virtual Communities and Social Networking
Crypto-Book: an architecture for privacy preserving online identities
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks
Mobile peer-to-peer approach for social computing services in distributed environment
Proceedings of the Fourth Symposium on Information and Communication Technology
Editorial: Computer communications: Present status and future challenges
Computer Communications
On the interplay between data redundancy and retrieval times in P2P storage systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.25 |
Online social network applications severely suffer from various security and privacy exposures. This article suggests a new approach to tackle these security and privacy problems with a special emphasis on the privacy of users with respect to the application provider in addition to defense against intruders or malicious users. In order to ensure users' privacy in the face of potential privacy violations by the provider, the suggested approach adopts a decentralized architecture relying on cooperation among a number of independent parties that are also the users of the online social network application. The second strong point of the suggested approach is to capitalize on the trust relationships that are part of social networks in real life in order to cope with the problem of building trusted and privacy- preserving mechanisms as part of the online application. The combination of these design principles is Safebook, a decentralized and privacy- preserving online social network application. Based on the two design principles, decentralization and exploiting real-life trust, various mechanisms for privacy and security are integrated into Safebook in order to provide data storage and data management functions that preserve users' privacy, data integrity, and availability. Preliminary evaluations of Safebook show that a realistic compromise between privacy and performance is feasible.