DECENT: A decentralized architecture for enforcing privacy in online social networks

  title={DECENT: A decentralized architecture for enforcing privacy in online social networks},
  author={Sonia Jahid and Shirin Nilizadeh and Prateek Mittal and Nikita Borisov and Apu Kapadia},
  journal={2012 IEEE International Conference on Pervasive Computing and Communications Workshops},
A multitude of privacy breaches, both accidental and malicious, have prompted users to distrust centralized providers of online social networks (OSNs) and investigate decentralized solutions. We examine the design of a fully decentralized (peer-to-peer) OSN, with a special focus on privacy and security. In particular, we wish to protect the confidentiality, integrity, and availability of user content and the privacy of user relationships. We propose DECENT, an architecture for OSNs that uses a… 

Figures from this paper

Enhancing Security and Privacy in Online Social Networks

A cryptographic mechanism that ensures confidentiality, and efficiently supports the fine-grained access policies suitable for OSNs, and a decentralized architecture that benefits from the privacy provided by the cryptographic mechanism, and the structured data storage and availability of a distributed hash table are presented.

Access control in decentralized online social networks: Applying a policy-hiding cryptographic scheme and evaluating its performance

This work analyzes predicate encryption (PE) and proposes a univariate polynomial construction for access policies in PE that drastically increases performance of the scheme but leaks some part of the access policy to users with access rights.

Resource Efficient Privacy Preservation of Online Social Media Conversations

Her Hermes is presented, a decentralized OSN architecture designed explicitly with the goal of hiding sharing patterns while minimizing users’ costs, and demonstrates that it only adds minimal overhead to content sharing.

SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks

This work presents SilentWhispers, the first distributed, privacy-preserving credit network that does not require any ledger to protect the integrity of transactions and formalizes these properties as ideal functionalities in the universal composability framework and presents a secure realization based on a novel combination of secret-sharing-based multiparty computation and digital signature chains.

Cloud Assisted Personal Online Social Network

This study presents a privacy preserving decentralized Personal Online Social Network (POSN) platform that implements a cloud-backed peer-to-peer decentralized OSN using mobile devices and performs a feasibility study to assess whether storage clouds can provide speeds comparable to centralized popular OSNs at various locations.

Socially-aware distributed hash tables for decentralized online social networks

This work designs a socially-aware distributed hash table (DHTs) for efficient implementation of DOSNs and proposes a gossip-based algorithm to place users in a DHT, while maximizing the social awareness among them.

Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider

Frientegrity, a framework for social networking applications that can be realized with an untrusted service provider, is presented and an access control mechanism that offers efficient revocation and scales logarithmically with the number of friends is introduced.

Relationship-based information sharing in cloud-based decentralized social networks

This paper extends the DSN framework so that users' data are securely stored in a public cloud data storage and shared according to relationship-based rules defined by owners, by at the same time supporting a privacy-preserving path finding.



LotusNet: Tunable privacy for distributed online social network services

A Security API for Distributed Social Networks

A cryptographic framework to achieve access control, privacy of social relations, secrecy of resources, and anonymity of users in social networks, which constitutes an ideal plug-in for decentralized social networks.

Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network

  • L. A. CutilloR. MolvaT. Strufe
  • Computer Science
    2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops
  • 2009
This paper shows the feasibility of “Safebook”, the proposal for the provision of a competitive social networking service, which solves vulnerabilities by its decentralized design, leveraging on the real life relationships of its users and means of cryptography.

EASiER: encryption-based access control in social networks with efficient revocation

EASiER is proposed, an architecture that supports fine-grained access control policies and dynamic group membership by using attribute-based encryption and makes it possible to remove access from a user without issuing new keys to other users or re-encrypting existing ciphertexts.

xBook: Redesigning Privacy Control in Social Networking Platforms

This work presents a novel framework for building privacy-preserving social networking applications that retains the functionality offered by the current social networks and uses information flow models to control what untrusted applications can do with the information they receive.

Persona: an online social network with user-defined privacy

This work presents Persona, an OSN where users dictate who may access their information, and describes an implementation of Persona that replicates Facebook applications and shows how Persona provides the functionality of existing online social networks with additional privacy benefits.

An identity-based approach to secure P2P applications with Likir

Likir (Layered Identity-based Kademlia-like Infrastructure) is the solution for implementing a secure Peer-to-Peer network based on a Distributed Hash Table and placing the emphasis on user identity results in a highly secure distributed framework which is very fitting for privacy-aware and efficient implementation of identity-based applications.

PeerSoN: P2P social networking: early experiences and insights

This paper describes the description of the prototype built for the P2P infrastructure for social networks, as a first step without the encryption part, and shares early experiences from the prototype and insights gained since first outlining the challenges and possibilities of decentralized alternatives to OSNs.

Secure routing for structured peer-to-peer overlay networks

This paper studies attacks aimed at preventing correct message delivery in structured peer-to-peer overlays and presents defenses to these attacks, and describes and evaluates techniques that allow nodes to join the overlay, to maintain routing state, and to forward messages securely in the presence of malicious nodes.

Information revelation and privacy in online social networks

This paper analyzes the online behavior of more than 4,000 Carnegie Mellon University students who have joined a popular social networking site catered to colleges and evaluates the amount of information they disclose and study their usage of the site's privacy settings.