skip to main content
10.1145/3532105.3535041acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
keynote

Securing Content in Decentralized Online Social Networks: Solutions, Limitations, and the Road Ahead

Published: 08 June 2022 Publication History

Abstract

The most popular On-line Social Networks (OSNs) are based on centralized architectures where service providers (e.g., Facebook, Twitter, or Instagram) have full control over the data published by their user---a requirement of their business model, based on the monetization of the cited data [2]. In addition, such centralized architectures also increase the risk of censorship, surveillance, and information leakage [3]. Distributed On-line Social Networks (DOSNs), instead, are typically based on a P2P architecture, where there is no central service provider in control of user data. Indeed, the contents that are published on DOSNs are stored on user-provided devices, that also cooperate to execute the tasks needed to realize the intended service. Most of the popular DOSNs, in an effort to help users smoothly regulate content sharing in adherence to their privacy preferences, allow to organize users in groups. In this way, each user can choose to share content with the users belonging to specific groups only. The lack of a (logically) centralized, third party managed, reliable infrastructure to guarantee content availability---whether a given user is on-line or not---has led to have the contents published by a user to be stored on the devices of other users as well. Indeed, such a choice increases the chances that at least one of the cooperating users device (and the contents stored therein) is online when the content is required. Given the two above introduced (conflicting) requirements: group-oriented privacy setting and distributed storage, a critical feature of DOSNs is that published contents must be properly protected by the DOSN infrastructure, in order to ensure that they can be accessed only by users that have the appropriate permissions---granted by the publishers. Hence, DOSNs require efficient solutions for protecting the privacy of the contents published by each user with respect to the other users of the social network. While some preliminary solutions have been proposed [1], the literature lacks of a general systematization of DOSNs, in particular for what concerns the access control models in place to secure access and to ensure content availability. The same lack of systematization can be noticed when considering the pros and cons of the different models in place, especially when analyzed through the lenses of performance.
In this talk, we investigate and compare the principal content privacy enforcement models adopted by current DOSNs. In particular, we will discuss their suitability to support different types of privacy policies based on different user-group modelling. The discussion is supported by an evaluation carried out by implementing several models and comparing their performance for the typical operations performed on groups, that is: content publishing, user join and leave. Further, we also highlight the limitations of current approaches and show future research directions to help DOSNs become a relevant player in the On-line Social Networks ecosystem, so as to put users back in control of their generated content.

References

[1]
Andrea De Salve, Roberto Di Pietro, Paolo Mori, and Laura Ricci. 2020. A Logical Key Hierarchy Based Approach to Preserve Content Privacy in Decentralized Online Social Networks. IEEE Trans. Dependable Secur. Comput. 17, 1 (2020), 2--21.
[2]
Andrea De Salve, Paolo Mori, Barbara Guidi, Laura Ricci, and Roberto Di Pietro. 2021. Predicting Influential Users in Online Social Network Groups. ACM Trans. Knowl. Discov. Data 15, 3, Article 35 (apr 2021), 50 pages. https://doi.org/10.1145/3441447
[3]
Ankit Kumar Jain, Somya Ranjan Sahoo, and Jyoti Kaubiyal. 2021. Online social networks security and privacy: comprehensive review and analysis. Complex & Intelligent Systems (2021), 1--21.

Index Terms

  1. Securing Content in Decentralized Online Social Networks: Solutions, Limitations, and the Road Ahead

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SACMAT '22: Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies
    June 2022
    282 pages
    ISBN:9781450393577
    DOI:10.1145/3532105
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 08 June 2022

    Check for updates

    Author Tags

    1. access control
    2. availability
    3. confidentiality
    4. decentralized on-line social networks
    5. models

    Qualifiers

    • Keynote

    Funding Sources

    Conference

    SACMAT '22
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 177 of 597 submissions, 30%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 92
      Total Downloads
    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 27 Feb 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media