ABSTRACT
Current social networks are widespread used all over the world. And many users pay more and more attentions on how to protect their privacy in social networks. Traditional social networks based on client/server architecture cannot protect users' private information because the operator is untrusted. We propose a P2P architecture for social networking, called Mailbook. Mailbook uses the email services and OpenDHT to share users' data and adopts dispersed algorithm for improving system's security and practicability. By introducing the email services in this scheme we can promote the network's availability and reduce the peer's overhead significantly.
- Chew, M. and Laurie, B. (Under) mining Privacy in Social Networks. Proceedings of AMCIS, 2008, (2008), 2--6.Google Scholar
- Danah, B. and Nicole, M. B. Social Network Sites: Definition, History, and Scholarship. Journal of Computer-Mediated Communication, (2007), 210--230.Google Scholar
- Krishnamurthy, B. and Wills, C. E. On the leakage of personally identifiable information via online social networks. ACM SIGCOMM Computer Communication Review, (2010), 7--12. Google ScholarDigital Library
- Dwyer, C. and Hiltz, S. R. Trust and privacy concern within social networking site: A comparison of Facebook and MySpace. Proceedings of AMCIS, (2007).Google Scholar
- Zhou, B. A Brief Survey on Anonymization Techniques for Privacy Preserving Publishing of Social Network Data. ACM SIGKDD Explorations Newsletter, (2008), 12--22. Google ScholarDigital Library
- Wondracek, G., Holz, T., Kirda, E., and Kruegel, C. A Practical Attack to De-anonymize Social Network Users. 2010 IEEE Symposium on Security and Privacy, (2010), 223--238. Google ScholarDigital Library
- Zhang, C., Sun, J., Zhu, X., and Fang, Y. Privacy and Security for Online Social Networks: Challenges and Opportunities. IEEE Network, (2010), 13--18. Google ScholarDigital Library
- Narayanan, A. and Shmatikov, V. De-anonymizing Social Networks. Proceedings of the 30th IEEE Symposium on Security and Privacy, (2009). Google ScholarDigital Library
- Berners-lee, T., with O. Seneviratne. Decentralization: The Future of Online Social Networking. Artificial Intelligence vol. 2, (2006).Google Scholar
- Buchegger, S. and Schi, D. PeerSoN: P2P Social Networking - Early Experiences and Insights. Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, (2009). Google ScholarDigital Library
- Antonio, L., Refik, C., Thorsten, M., and Antipolis, S. Safebook: Feasibility of Transitive Cooperation for Privacy on a Decentralized Social Network. World of Wireless, Mobile and Multimedia Networks & Workshops, (2009), 1--6.Google Scholar
- Shakimov, A. and Lim, H. Vis-a-Vis: Online Social Networking via Virtual Individual Servers. Duke University Technical Report TR-2008-05, (2008), 1--14.Google Scholar
- Shakimov, A., Cox, L. P., and Varshavsky, A. Privacy, Cost, and Availability Tradeoffs in Decentralized OSNs. Proceedings of the 2nd ACM workshop on Online social networks, (2009), 13--18. Google ScholarDigital Library
- Starin, D., Baden, R., Bender, A., Spring, N., and Bhattacharjee, B. Persona: An Online Social Network with User-Defined Privacy Categories and Subject Descriptors. Proceedings of the ACM SIGCOMM 2009 conference on Data communication, (2009). Google ScholarDigital Library
- GMail data loss affects 150,000 users. http://www.backup-technology.com/5844/gmail-data-loss-affects-15000-users/. (2011).Google Scholar
- Naone, E. Are we safeguarding social data? Technology Review published by MIT Review. http://www.technologyreview.com/blog/editors/22924/, (2009).Google Scholar
- HakimWeatherspoon. RACS: A case for cloud storage diversity. Proceedings of the 1st ACM Symposium on Cloud Computing, (2010), 229--240. Google ScholarDigital Library
- Resch, J. K. and Plank, J. S. AONT-RS: Blending Security and Performance in Dispersed Storage Systems. FAST '11: 9th USENIX Conference on File and Storage Technologies, (2011), 191--202. Google ScholarDigital Library
- Plank, J. S. and Ding, Y. Note: Correction to the 1997 tutorial on Reed-Solomon coding. Software -- Practice & Experience, (2005), 189--194. Google ScholarDigital Library
- Anderson, J., Diaz, C., Stajano, F., Leuven, K. U., and Bonneau, J. Privacy-Enabling Social Networking Over Untrusted Networks. Proceedings of the 2nd ACM workshop on Online social networks, (2009), 2--7. Google ScholarDigital Library
Index Terms
- Mailbook: privacy-protecting social networking via email
Recommendations
New P2P Sharing Incentive Mechanism Based on Social Network and Game Theory
WAINA '12: Proceedings of the 2012 26th International Conference on Advanced Information Networking and Applications WorkshopsP2P technology has been used widely in file and live media streaming sharing fields. But the architecture of P2P technology which we used is imperfect. In P2P system, most users are free-rider. They were not sharing their own resource because the ...
Exploiting vulnerability to secure user privacy on a social networking site
KDD '11: Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data miningAs (one's) social network expands, a user's privacy protection goes beyond his privacy settings and becomes a social networking problem. In this research, we aim to address some critical issues related to privacy protection: Would the highest privacy ...
Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy
AISec '09: Proceedings of the 2nd ACM workshop on Security and artificial intelligenceSocial networking services well know that some users are unwilling to freely share the information they store with the service (e.g. profile information). To address this, ser vices typically provide various privacy "knobs" that the user may adjust to ...
Comments