skip to main content
10.1145/2043674.2043700acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicimcsConference Proceedingsconference-collections
research-article

Mailbook: privacy-protecting social networking via email

Authors Info & Claims
Published:05 August 2011Publication History

ABSTRACT

Current social networks are widespread used all over the world. And many users pay more and more attentions on how to protect their privacy in social networks. Traditional social networks based on client/server architecture cannot protect users' private information because the operator is untrusted. We propose a P2P architecture for social networking, called Mailbook. Mailbook uses the email services and OpenDHT to share users' data and adopts dispersed algorithm for improving system's security and practicability. By introducing the email services in this scheme we can promote the network's availability and reduce the peer's overhead significantly.

References

  1. Chew, M. and Laurie, B. (Under) mining Privacy in Social Networks. Proceedings of AMCIS, 2008, (2008), 2--6.Google ScholarGoogle Scholar
  2. Danah, B. and Nicole, M. B. Social Network Sites: Definition, History, and Scholarship. Journal of Computer-Mediated Communication, (2007), 210--230.Google ScholarGoogle Scholar
  3. Krishnamurthy, B. and Wills, C. E. On the leakage of personally identifiable information via online social networks. ACM SIGCOMM Computer Communication Review, (2010), 7--12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Dwyer, C. and Hiltz, S. R. Trust and privacy concern within social networking site: A comparison of Facebook and MySpace. Proceedings of AMCIS, (2007).Google ScholarGoogle Scholar
  5. Zhou, B. A Brief Survey on Anonymization Techniques for Privacy Preserving Publishing of Social Network Data. ACM SIGKDD Explorations Newsletter, (2008), 12--22. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Wondracek, G., Holz, T., Kirda, E., and Kruegel, C. A Practical Attack to De-anonymize Social Network Users. 2010 IEEE Symposium on Security and Privacy, (2010), 223--238. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Zhang, C., Sun, J., Zhu, X., and Fang, Y. Privacy and Security for Online Social Networks: Challenges and Opportunities. IEEE Network, (2010), 13--18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Narayanan, A. and Shmatikov, V. De-anonymizing Social Networks. Proceedings of the 30th IEEE Symposium on Security and Privacy, (2009). Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Berners-lee, T., with O. Seneviratne. Decentralization: The Future of Online Social Networking. Artificial Intelligence vol. 2, (2006).Google ScholarGoogle Scholar
  10. Buchegger, S. and Schi, D. PeerSoN: P2P Social Networking - Early Experiences and Insights. Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, (2009). Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Antonio, L., Refik, C., Thorsten, M., and Antipolis, S. Safebook: Feasibility of Transitive Cooperation for Privacy on a Decentralized Social Network. World of Wireless, Mobile and Multimedia Networks & Workshops, (2009), 1--6.Google ScholarGoogle Scholar
  12. Shakimov, A. and Lim, H. Vis-a-Vis: Online Social Networking via Virtual Individual Servers. Duke University Technical Report TR-2008-05, (2008), 1--14.Google ScholarGoogle Scholar
  13. Shakimov, A., Cox, L. P., and Varshavsky, A. Privacy, Cost, and Availability Tradeoffs in Decentralized OSNs. Proceedings of the 2nd ACM workshop on Online social networks, (2009), 13--18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Starin, D., Baden, R., Bender, A., Spring, N., and Bhattacharjee, B. Persona: An Online Social Network with User-Defined Privacy Categories and Subject Descriptors. Proceedings of the ACM SIGCOMM 2009 conference on Data communication, (2009). Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. GMail data loss affects 150,000 users. http://www.backup-technology.com/5844/gmail-data-loss-affects-15000-users/. (2011).Google ScholarGoogle Scholar
  16. Naone, E. Are we safeguarding social data? Technology Review published by MIT Review. http://www.technologyreview.com/blog/editors/22924/, (2009).Google ScholarGoogle Scholar
  17. HakimWeatherspoon. RACS: A case for cloud storage diversity. Proceedings of the 1st ACM Symposium on Cloud Computing, (2010), 229--240. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Resch, J. K. and Plank, J. S. AONT-RS: Blending Security and Performance in Dispersed Storage Systems. FAST '11: 9th USENIX Conference on File and Storage Technologies, (2011), 191--202. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Plank, J. S. and Ding, Y. Note: Correction to the 1997 tutorial on Reed-Solomon coding. Software -- Practice & Experience, (2005), 189--194. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Anderson, J., Diaz, C., Stajano, F., Leuven, K. U., and Bonneau, J. Privacy-Enabling Social Networking Over Untrusted Networks. Proceedings of the 2nd ACM workshop on Online social networks, (2009), 2--7. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Mailbook: privacy-protecting social networking via email

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in
                • Published in

                  cover image ACM Other conferences
                  ICIMCS '11: Proceedings of the Third International Conference on Internet Multimedia Computing and Service
                  August 2011
                  208 pages
                  ISBN:9781450309189
                  DOI:10.1145/2043674

                  Copyright © 2011 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 5 August 2011

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • research-article

                  Acceptance Rates

                  Overall Acceptance Rate163of456submissions,36%
                • Article Metrics

                  • Downloads (Last 12 months)5
                  • Downloads (Last 6 weeks)0

                  Other Metrics

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader