High availability, scalable storage, dynamic peer networks: pick two
HOTOS'03 Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9
Ciphertext-Policy Attribute-Based Encryption
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
Measurement and analysis of online social networks
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
WI '07 Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence
Organizing and sharing distributed personal web-service data
Proceedings of the 17th international conference on World Wide Web
Growth of the flickr social network
Proceedings of the first workshop on Online social networks
Lockr: social access control for web 2.0
Proceedings of the first workshop on Online social networks
NOYB: privacy in online social networks
Proceedings of the first workshop on Online social networks
Securing frame communication in browsers
SS'08 Proceedings of the 17th conference on Security symposium
Browser security: lessons from Google Chrome
Communications of the ACM - A Blind Person's Interaction with Technology
PeerSoN: P2P social networking: early experiences and insights
Proceedings of the Second ACM EuroSys Workshop on Social Network Systems
Persona: an online social network with user-defined privacy
Proceedings of the ACM SIGCOMM 2009 conference on Data communication
Privacy-enabling social networking over untrusted networks
Proceedings of the 2nd ACM workshop on Online social networks
Privacy, cost, and availability tradeoffs in decentralized OSNs
Proceedings of the 2nd ACM workshop on Online social networks
Lockr: better privacy for social networks
Proceedings of the 5th international conference on Emerging networking experiments and technologies
Suggesting friends using the implicit social graph
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
Separating web applications from user data storage with BSTORE
WebApps'10 Proceedings of the 2010 USENIX conference on Web application development
Detecting and characterizing social spam campaigns
IMC '10 Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
Finding a needle in Haystack: facebook's photo storage
OSDI'10 Proceedings of the 9th USENIX conference on Operating systems design and implementation
Sharing social content from home: a measurement-driven feasibility study
Proceedings of the 21st international workshop on Network and operating systems support for digital audio and video
Emscripten: an LLVM-to-JavaScript compiler
Proceedings of the ACM international conference companion on Object oriented programming systems languages and applications companion
Privacy, availability and economics in the Polaris mobile social network
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications
Contrail: enabling decentralized social networks on smartphones
Middleware'11 Proceedings of the 12th ACM/IFIP/USENIX international conference on Middleware
Confidant: protecting OSN data without locking it up
Middleware'11 Proceedings of the 12th ACM/IFIP/USENIX international conference on Middleware
Safebook: A privacy-preserving online social network leveraging on real-life trust
IEEE Communications Magazine
Keeping information safe from social networking apps
Proceedings of the 2012 ACM workshop on Workshop on online social networks
TreeHouse: JavaScript sandboxes to helpWeb developers help themselves
USENIX ATC'12 Proceedings of the 2012 USENIX conference on Annual Technical Conference
Privilege separation in HTML5 applications
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Virtual browser: a virtualized browser to sandbox third-party JavaScripts with enhanced security
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
Hi-index | 0.00 |
With the increasing popularity of Web-based services, users today have access to a broad range of free sites, including social networking, microblogging, and content sharing sites. In order to offer a service for free, service providers typically monetize user content, selling results to third parties such as advertisers. As a result, users have little control over their data or privacy. A number of alternative approaches to architecting today's Web-based services have been proposed, but they suffer from limitations such as relying the creation and installation of additional client-side software, providing insufficient reliability, or imposing an excessive monetary cost on users. In this paper, we present Priv.io, a new approach to building Web-based services that offers users greater control and privacy over their data. We leverage the fact that today, users can purchase storage, bandwidth, and messaging from cloud providers at fine granularity: In Priv.io, each user provides the resources necessary to support their use of the service using cloud providers such as Amazon Web Services. Users still access the service using a Web browser, all computation is done within users' browsers, and Priv.io provides rich and secure support for third-party applications. An implementation demonstrates that Priv.io works today with unmodified versions of common Web browsers on both desktop and mobile devices, is both practical and feasible, and is cheap enough for the vast majority users.