DECENT: A decentralized architecture for enforcing privacy in online social networks

@article{Jahid2011DECENTAD,
  title={DECENT: A decentralized architecture for enforcing privacy in online social networks},
  author={Sonia Jahid and Shirin Nilizadeh and Prateek Mittal and Nikita Borisov and Apu Kapadia},
  journal={2012 IEEE International Conference on Pervasive Computing and Communications Workshops},
  year={2011},
  pages={326-332}
}
A multitude of privacy breaches, both accidental and malicious, have prompted users to distrust centralized providers of online social networks (OSNs) and investigate decentralized solutions. We examine the design of a fully decentralized (peer-to-peer) OSN, with a special focus on privacy and security. In particular, we wish to protect the confidentiality, integrity, and availability of user content and the privacy of user relationships. We propose DECENT, an architecture for OSNs that uses a… 

Figures from this paper

Cachet: a decentralized architecture for privacy preserving social networking with caching

This paper proposes Cachet, an architecture that provides strong security and privacy guarantees while preserving the main functionality of online social networks, and demonstrates that decentralized architectures for privacy preserving social networking are feasible, and use of social contacts for object caching results in significant performance improvements.

A survey on privacy in decentralized online social networks

Content Privacy Enforcement Models in Decentralized Online Social Networks: State of Play, Solutions, Limitations, and Future Directions

This paper investigates and compares the principal content privacy enforcement models adopted by current DOSNs evaluating their suitability to support different types of privacy policies based on user groups and highlights the limitations of current approaches and shows future research directions.

Enhancing Security and Privacy in Online Social Networks

A cryptographic mechanism that ensures confidentiality, and efficiently supports the fine-grained access policies suitable for OSNs, and a decentralized architecture that benefits from the privacy provided by the cryptographic mechanism, and the structured data storage and availability of a distributed hash table are presented.

Access control in decentralized online social networks: Applying a policy-hiding cryptographic scheme and evaluating its performance

This work analyzes predicate encryption (PE) and proposes a univariate polynomial construction for access policies in PE that drastically increases performance of the scheme but leaks some part of the access policy to users with access rights.

Resource Efficient Privacy Preservation of Online Social Media Conversations

Her Hermes is presented, a decentralized OSN architecture designed explicitly with the goal of hiding sharing patterns while minimizing users’ costs, and demonstrates that it only adds minimal overhead to content sharing.

SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks

This work presents SilentWhispers, the first distributed, privacy-preserving credit network that does not require any ledger to protect the integrity of transactions and formalizes these properties as ideal functionalities in the universal composability framework and presents a secure realization based on a novel combination of secret-sharing-based multiparty computation and digital signature chains.

Cloud Assisted Personal Online Social Network

This study presents a privacy preserving decentralized Personal Online Social Network (POSN) platform that implements a cloud-backed peer-to-peer decentralized OSN using mobile devices and performs a feasibility study to assess whether storage clouds can provide speeds comparable to centralized popular OSNs at various locations.

Socially-aware distributed hash tables for decentralized online social networks

This work designs a socially-aware distributed hash table (DHTs) for efficient implementation of DOSNs and proposes a gossip-based algorithm to place users in a DHT, while maximizing the social awareness among them.
...

References

SHOWING 1-10 OF 34 REFERENCES

LotusNet: Tunable privacy for distributed online social network services

A Security API for Distributed Social Networks

A cryptographic framework to achieve access control, privacy of social relations, secrecy of resources, and anonymity of users in social networks, which constitutes an ideal plug-in for decentralized social networks.

Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network

  • L. A. CutilloR. MolvaT. Strufe
  • Computer Science
    2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops
  • 2009
This paper shows the feasibility of “Safebook”, the proposal for the provision of a competitive social networking service, which solves vulnerabilities by its decentralized design, leveraging on the real life relationships of its users and means of cryptography.

EASiER: encryption-based access control in social networks with efficient revocation

EASiER is proposed, an architecture that supports fine-grained access control policies and dynamic group membership by using attribute-based encryption and makes it possible to remove access from a user without issuing new keys to other users or re-encrypting existing ciphertexts.

xBook: Redesigning Privacy Control in Social Networking Platforms

This work presents a novel framework for building privacy-preserving social networking applications that retains the functionality offered by the current social networks and uses information flow models to control what untrusted applications can do with the information they receive.

Persona: an online social network with user-defined privacy

This work presents Persona, an OSN where users dictate who may access their information, and describes an implementation of Persona that replicates Facebook applications and shows how Persona provides the functionality of existing online social networks with additional privacy benefits.

An identity-based approach to secure P2P applications with Likir

Likir (Layered Identity-based Kademlia-like Infrastructure) is the solution for implementing a secure Peer-to-Peer network based on a Distributed Hash Table and placing the emphasis on user identity results in a highly secure distributed framework which is very fitting for privacy-aware and efficient implementation of identity-based applications.

PeerSoN: P2P social networking: early experiences and insights

This paper describes the description of the prototype built for the P2P infrastructure for social networks, as a first step without the encryption part, and shares early experiences from the prototype and insights gained since first outlining the challenges and possibilities of decentralized alternatives to OSNs.

Secure routing for structured peer-to-peer overlay networks

This paper studies attacks aimed at preventing correct message delivery in structured peer-to-peer overlays and presents defenses to these attacks, and describes and evaluates techniques that allow nodes to join the overlay, to maintain routing state, and to forward messages securely in the presence of malicious nodes.

Information revelation and privacy in online social networks

This paper analyzes the online behavior of more than 4,000 Carnegie Mellon University students who have joined a popular social networking site catered to colleges and evaluates the amount of information they disclose and study their usage of the site's privacy settings.