Socio Path: Protecting Privacy by Self-Sufficient Data Distribution in User-Centric Networks

Communication between users poses a privacy problem as soon as it relies on a third party. The problem ranges from personalized advertising to mass surveillance and applies primarily to centralized application service providers. However, also nodes in decentralized approaches are often under control by a third party. We argue that application data and metadata between a set of users can stay private only by self-sufficiency, i.e. Exclusive end-to-end communication between devices under these users' control. State synchronization is a main challenge here, since especially mobile devices are prone to churn and varying connectivity. We present Socio Path, a decentralized protocol for self-sufficient user-to-user communication. It handles device heterogeneity by decoupling data objects from notifications and keeping recurrent state exchanges small. Additionally, it offers a user-centric application interface which abstracts from devices towards the user. Evaluation results show that even under heavy churn, it is possible to achieve a high delivery ratio and large scalability.

[1]  Sonja Buchegger,et al.  PeerSoN: P2P social networking: early experiences and insights , 2009, SNS '09.

[2]  Scott E. Hudson,et al.  Communication characteristics of instant messaging: effects and predictions of interpersonal relationships , 2006, CSCW '06.

[3]  Martin Florian,et al.  A socio- and locality-aware overlay for user-centric networking , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).

[4]  Benjamin Greschbach,et al.  The devil is in the metadata — New privacy challenges in Decentralised Online Social Networks , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops.

[5]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[6]  Refik Molva,et al.  Safebook: A privacy-preserving online social network leveraging on real-life trust , 2009, IEEE Communications Magazine.

[7]  Ingmar Baumgart,et al.  SMART-ER: Peer-based privacy for smart metering , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[8]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[9]  Andrew S. Tanenbaum,et al.  Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System , 2004, Security Protocols Workshop.

[10]  Honggang Zhang,et al.  The growth of Diaspora - A decentralized online social network in the wild , 2012, 2012 Proceedings IEEE INFOCOM Workshops.

[11]  Ingmar Baumgart,et al.  Towards Socio- and Resource-Aware Data Replication in User-Centric Networking , 2014 .

[12]  S. Krause,et al.  OverSim: A Flexible Overlay Network Simulation Framework , 2007, 2007 IEEE Global Internet Symposium.

[13]  Bobby Bhattacharjee,et al.  Persona: an online social network with user-defined privacy , 2009, SIGCOMM '09.

[14]  J. Chris Anderson,et al.  CouchDB: The Definitive Guide , 2010 .