Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System

@inproceedings{Popescu2004SafeAP,
  title={Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System},
  author={Bogdan C. Popescu and Bruno Crispo and Andrew S. Tanenbaum},
  booktitle={Security Protocols Workshop},
  year={2004}
}
In this paper we describe Turtle, a peer-to-peer architecture for safe sharing of sensitive data. The truly revolutionary aspect of Turtle rests in its novel way of dealing with trust issues: while existing peer-to-peer architectures with similar aims attempt to build trust relationships on top of the basic, trust-agnostic, peer-to-peer overlay, Turtle takes the opposite approach, and builds its overlay on top of pre-existent trust relationships among its users. This allows both data sender and… CONTINUE READING

Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-10 OF 98 CITATIONS

Membership-concealing overlay networks

  • ACM Conference on Computer and Communications Security
  • 2009
VIEW 5 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Privacy preserving social networking through decentralization

  • 2009 Sixth International Conference on Wireless On-Demand Network Systems and Services
  • 2009
VIEW 6 EXCERPTS
HIGHLY INFLUENCED

A Survey of Socially Aware Peer-to-Peer Systems

VIEW 3 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

A Social Network Based Reputation System for Cooperative P2P File Sharing

  • IEEE Transactions on Parallel and Distributed Systems
  • 2015
VIEW 9 EXCERPTS
CITES BACKGROUND, METHODS & RESULTS
HIGHLY INFLUENCED

Leveraging Peer Centrality in the Designof Socially-Informed Peer-to-Peer Systems

  • IEEE Transactions on Parallel and Distributed Systems
  • 2012
VIEW 5 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Inferring peer centrality in socially-informed peer-to-peer systems

  • 2011 IEEE International Conference on Peer-to-Peer Computing
  • 2011
VIEW 3 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Trust*: Using Local Guarantees to Extend the Reach of Trust

  • Security Protocols Workshop
  • 2009
VIEW 3 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Friend-to-Friend Computing - Instant Messaging Based Spontaneous Desktop Grid

  • 2008 Third International Conference on Internet and Web Applications and Services
  • 2008
VIEW 3 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2005
2018

CITATION STATISTICS

  • 12 Highly Influenced Citations