The Good Left Undone: Advances and Challenges in Decentralizing Online Social Networks

Abstract Billions of users are now inter-connected in Online Social Networks (OSNs) and, as they interact with each other, massive amounts of potentially private data are collected at the OSN providers’ (e.g., Facebook or Twitter) premises. Unfortunately, provider-initiated privacy violations on this data are frequent and there is little chance that the providers will grant users effective data-protection means. To address these issues and to help users regain the control over their data, decentralized OSNs (DOSNs) have lately been introduced as a competitive paradigm to provider-controlled, centralized OSNs. DOSNs are built to function without the participation of a provider and with the intent to prevent any misuse of private user data. However, all proposed DOSNs still lack widespread adoption. While challenging the market-leading OSNs is difficult for many reasons, in this paper, we set out to understand the technical deficiencies behind the absence of a successful DOSN. We focus on the major technical challenge of DOSNs: they need to substitute the datacenter-based infrastructure of centralized OSNs. We first review recent advances in decentralizing OSNs based on how they approach that challenge. In a next step, we analyze the advantages and disadvantages each approach yields, and then derive a series of challenges that a successful DOSN will have to fulfill. Finally, we discuss options of moving forward in designing a new DOSN that could be successful in doing so.

[1]  Berkant Barla Cambazoglu,et al.  Impact of response latency on user behavior in web search , 2014, SIGIR.

[2]  Gurhan Gunduz,et al.  POSN: A Personal Online Social Network , 2015, SEC.

[3]  Cécile Paris,et al.  A survey of trust in social networks , 2013, CSUR.

[4]  Ben Y. Zhao,et al.  Uncovering social network sybils in the wild , 2011, IMC '11.

[5]  Frank Stajano,et al.  Privacy-enabling social networking over untrusted networks , 2009, WOSN '09.

[6]  Ralf Steinmetz,et al.  LifeSocial.KOM: A secure and P2P-based solution for online social networks , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).

[7]  Antony I. T. Rowstron,et al.  Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.

[8]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[9]  Catherine Dwyer Privacy in the Age of Google and Facebook , 2011, IEEE Technology and Society Magazine.

[10]  Jun Li,et al.  On the state of OSN-based Sybil defenses , 2014, 2014 IFIP Networking Conference.

[11]  Sudheendra Hangal,et al.  PrPl: a decentralized social networking infrastructure , 2010, MCS '10.

[12]  Bobby Bhattacharjee,et al.  Persona: an online social network with user-defined privacy , 2009, SIGCOMM '09.

[13]  Stefan Katzenbeisser,et al.  ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation , 2014, SOFSEM.

[14]  Refik Molva,et al.  Safebook: A privacy-preserving online social network leveraging on real-life trust , 2009, IEEE Communications Magazine.

[15]  Mahesh Balakrishnan,et al.  Contrail: Enabling Decentralized Social Networks on Smartphones , 2011, Middleware.

[16]  Virgílio A. F. Almeida,et al.  Characterizing user behavior in online social networks , 2009, IMC '09.

[17]  Drummond Reed,et al.  OpenID 2.0: a platform for user-centric identity management , 2006, DIM '06.

[18]  László Gyarmati,et al.  Measuring user behavior in online social networks , 2010, IEEE Network.

[19]  Shivakant Mishra,et al.  Results from a Practical Deployment of the MyZone Decentralized P2P Social Network , 2013, ArXiv.

[20]  Fiona Fui-Hoon Nah,et al.  A study on tolerable waiting time: how long are Web users willing to wait? , 2004, AMCIS.

[21]  Rajesh Sharma,et al.  SuperNova: Super-peers based architecture for decentralized online social networks , 2011, 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012).

[22]  Antony I. T. Rowstron,et al.  PAST: a large-scale, persistent peer-to-peer storage utility , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.

[23]  Jin H. Im,et al.  Privacy , 2002, Encyclopedia of Information Systems.

[24]  Krzysztof Rzadca,et al.  Replica Placement in P2P Storage: Complexity and Game Theoretic Analyses , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.

[25]  Jinyang Li,et al.  Friendstore: cooperative online backup using trusted nodes , 2008, SocialNets '08.

[26]  Keith W. Ross,et al.  "On the internet, nobody knows you're a dog": a twitter case study of anonymity in social networks , 2014, COSN '14.

[27]  Prateek Mittal,et al.  DECENT: A decentralized architecture for enforcing privacy in online social networks , 2011, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops.

[28]  Laura Ricci,et al.  DiDuSoNet: A P2P architecture for distributed Dunbar-based social networks , 2016, Peer-to-Peer Netw. Appl..

[29]  Paul Anderson,et al.  Prometheus: User-Controlled P2P Social Data Management for Socially-Aware Applications , 2010, Middleware.

[30]  J. Dijck The Culture of Connectivity: A Critical History of Social Media , 2013 .

[31]  Athanasios V. Vasilakos,et al.  Understanding user behavior in online social networks: a survey , 2013, IEEE Communications Magazine.

[32]  Krishna P. Gummadi,et al.  Sharing social content from home: a measurement-driven feasibility study , 2011, NOSSDAV.

[33]  Ramón Cáceres,et al.  Vis-à-Vis: Privacy-preserving online social networking via Virtual Individual Servers , 2011, 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011).

[34]  Eyal Kushilevitz,et al.  Private information retrieval , 1998, JACM.

[35]  Mark Agius,et al.  An update on: meta-analysis of medical and non-medicaltreatments of the prodromal phase of psychotic illness in at risk mental states. , 2016, Psychiatria Danubina.

[36]  Mahesh Balakrishnan,et al.  Contrail: Decentralized and Privacy-Preserving Social Networks on Smartphones , 2014, IEEE Internet Computing.

[37]  Balachander Krishnamurthy,et al.  Characterizing privacy in online social networks , 2008, WOSN '08.

[38]  Krishna P. Gummadi,et al.  Measurement and analysis of online social networks , 2007, IMC '07.

[39]  Xiaoming Fu,et al.  Gemstone: Empowering Decentralized Social Networking with High Data Availability , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[40]  Krzysztof Rzadca,et al.  Flexible replica placement for optimized P2P backup on heterogeneous, unreliable machines , 2016, Concurr. Comput. Pract. Exp..

[41]  Thorsten Strufe,et al.  Exploring decentralization dimensions of social networking services: adversaries and availability , 2012, HotSocial '12.

[42]  Ramón Cáceres,et al.  Confidant: Protecting OSN Data without Locking It Up , 2011, Middleware.

[43]  Thorsten Strufe,et al.  A survey on decentralized Online Social Networks , 2014, Comput. Networks.

[44]  Ben Y. Zhao,et al.  User interactions in social networks and their implications , 2009, EuroSys '09.

[45]  Jon Crowcroft,et al.  Internet on the move: challenges and solutions , 2013, CCRV.

[46]  Zhenyu Zhou,et al.  A View from the Other Side: Understanding Mobile Phone Characteristics in the Developing World , 2016, Internet Measurement Conference.

[47]  Thorsten Strufe,et al.  The User Behavior in Facebook and its Development from 2009 until 2014 , 2015, ArXiv.

[48]  Shihabur Rahman Chowdhury,et al.  A taxonomy of decentralized online social networks , 2015, Peer-to-Peer Netw. Appl..

[49]  Sonja Buchegger,et al.  A case for P2P infrastructure for social networks - opportunities & challenges , 2009, 2009 Sixth International Conference on Wireless On-Demand Network Systems and Services.

[50]  Mike Nicholls,et al.  On the internet , 2004, Biological Psychiatry.

[51]  Krzysztof Rzadca,et al.  Game-Theoretic Mechanisms to Increase Data Availability in Decentralized Storage Systems , 2015, ACM Trans. Auton. Adapt. Syst..

[52]  Krzysztof Rzadca,et al.  Decentralized Online Social Networks , 2010, Handbook of Social Network Technologies.

[53]  Nikita Borisov,et al.  Cachet: a decentralized architecture for privacy preserving social networking with caching , 2012, CoNEXT '12.

[54]  Ramón Cáceres,et al.  Privacy, cost, and availability tradeoffs in decentralized OSNs , 2009, WOSN '09.

[55]  Thomas Paul Mitigating adverse effects of using online social networks = Verminderung negativer Effekte bei der Nutzung von Online SocialNetworks , 2015 .

[56]  Jun Li,et al.  SOUP: an online social network by the people, for the people , 2014, SIGCOMM.

[57]  Ben Y. Zhao,et al.  Beyond Social Graphs: User Interactions in Online Social Networks and their Implications , 2012, TWEB.

[58]  Sonja Buchegger,et al.  PeerSoN: P2P social networking: early experiences and insights , 2009, SNS '09.