The devil is in the metadata — New privacy challenges in Decentralised Online Social Networks

@article{Greschbach2012TheDI,
  title={The devil is in the metadata — New privacy challenges in Decentralised Online Social Networks},
  author={Benjamin Greschbach and Gunnar Kreitz and Sonja Buchegger},
  journal={2012 IEEE International Conference on Pervasive Computing and Communications Workshops},
  year={2012},
  pages={333-339}
}
Decentralised Online Social Networks (DOSN) are evolving as a promising approach to mitigate design-inherent privacy flaws of logically centralised services such as Facebook, Google+ or Twitter. A common approach to build a DOSN is to use a peer-to-peer architecture. While the absence of a single point of data aggregation strikes the most powerful attacker from the list of adversaries, the decentralisation also removes some privacy protection afforded by the central party's intermediation of… 
Towards an Architecture-based Ensemble Methods for Online Social Network Sensitive Data Privacy Protection
TLDR
This paper adopts the descriptive approach in its presentation as the usable implementation of the presented proposal is near completion with issues of computational overhead addressed based on preliminary results that show promise of being able to support agreement up to 75% in terms of making changes by participants in the chain.
Exploring decentralization dimensions of social networking services: adversaries and availability
Current online Social Networking Services (SNS) are organized around a single provider and while storage and functionality can be distributed, the control over the service belongs to one central
Privacy Policy in Decentralized Online Social Networks : Cryptography
Decentralized Online Social Networks (DOSNs) have recently captured the interest of users because of the more control given to them over their shared contents. Indeed, most of the user privacy issues
Evaluating the Privacy Properties of Secure VoIP Metadata
TLDR
This work investigates privacy properties of voice calls metadata, in particular when using secure VoIP, giving evidence of the ability to extract sensitive information from its metadata, and finds that ZRTP metadata is freely available to any client on the network, and that users can be re-identified by any user with access to the network.
Secure Data Management in P2P Social Networks Using Access Tokens
TLDR
This model focuses on reducing the cost of access revocation in terms of network and computational resources compared to other P2P OSNs models, and it supports all the basic features of modern OSNs.
A survey on privacy in decentralized online social networks
TLDR
A comprehensive overview of the privacy solutions adopted by currently available DOSNs is provided, and the security mechanisms adopted for privacy policy management and enforcement are evaluated by discussing their advantages and drawbacks.
PESCA: a peer-to-peer social network architecture with privacy-enabled social communication and data availability
TLDR
The proposed P2P-OSN architecture is composed of a privacy enabled setup for users’ social communications and an adaptive replica placement strategy for ensuring availability for Users’ shared data.
Managing social contents in Decentralized Online Social Networks: A survey
TLDR
An overview of the main open issues in this research area, taking into account the strategies adopted to manage social data, focusing on the data availability and on information diffusion, is presented.
Centralized to Decentralized Social Networks: Factors that Matter
TLDR
This work covers the research work on decentralization of Online Social Networks (OSNs), issues with centralized design are studied with possible decentralized solutions and solutions are proposed for reliability issues arising in centralized systems and the potential threat of a central authority.
Socio Path: Protecting Privacy by Self-Sufficient Data Distribution in User-Centric Networks
  • F. Hartmann, I. Baumgart
  • Computer Science
    2014 IEEE Fourth International Conference on Big Data and Cloud Computing
  • 2014
TLDR
Socio Path is presented, a decentralized protocol for self-sufficient user-to-user communication which handles device heterogeneity by decoupling data objects from notifications and keeping recurrent state exchanges small and offers a user-centric application interface which abstracts from devices towards the user.
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 106 REFERENCES
Encryption for Peer-to-Peer Social Networks
  • Oleksandr Bodriagov, S. Buchegger
  • Computer Science
    2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing
  • 2011
TLDR
This paper explores the requirements of encryption for P2P social networks in detail and proposes to use broadcast encryption schemes with high performance encryption/decryption regardless of the number of identities/groups for an efficient encryption-based access control in the P1P environment.
A case for P2P infrastructure for social networks - opportunities & challenges
  • S. Buchegger, Anwitaman Datta
  • Computer Science
    2009 Sixth International Conference on Wireless On-Demand Network Systems and Services
  • 2009
TLDR
This paper is an attempt to identify the core functionalities necessary to build social networking applications and services, and the research challenges in realizing them in a decentralized setting, and presents its own approach at realizing peer-to-peer social networks.
Anonymity and Censorship Resistance in Unstructured Overlay Networks
TLDR
Clouds is a peer-to-peer protocol that guarantees both anonymity and censorship resistance in semantic overlay networks and can be applied to any unstructured overlay network.
Privacy-preserving P2P data sharing with OneSwarm
TLDR
This paper describes the design and implementation of a new P2P data sharing protocol, called OneSwarm, that provides users much better privacy than BitTorrent and much better performance than Tor or Freenet.
Safebook: A privacy-preserving online social network leveraging on real-life trust
TLDR
The suggested approach adopts a decentralized architecture relying on cooperation among a number of independent parties that are also the users of the online social network application to ensure users' privacy in the face of potential privacy violations by the provider.
Private Communication Through a Network of Trusted Connections : The Dark Freenet
Freenet is a distributed, Internet-wide peer-to-peer overlay network designed to allow anonymized and censorship resistant publication and distribution of information. The system functions as a
Secure and flexible framework for decentralized social network services
  • L. Aiello, G. Ruffo
  • Computer Science
    2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)
  • 2010
TLDR
This paper defines an architectural model which embeds user identity management in a DHT overlay, providing a very robust and flexible support for any identity-based application.
A survey on decentralized Online Social Networks
TLDR
This work proposes a classification of previous work under two dimensions: types of approaches with respect to resource provisioning devices and adopted strategies for three main technical issues for DOSN (decentralizing storage of content, access control and interaction/signaling), and points out advantages and limitations of each approach.
A Security API for Distributed Social Networks
TLDR
A cryptographic framework to achieve access control, privacy of social relations, secrecy of resources, and anonymity of users in social networks, which constitutes an ideal plug-in for decentralized social networks.
Efficient Sharing of Encrypted Data
TLDR
The main idea advocated in this paper is that simple cryptographic techniques are sufficient to engineer an efficient data encoding that can make it significantly harder to selectively censor information.
...
1
2
3
4
5
...