MyNet: A Platform for Secure P2P Personal and Social Networking Services

Recent advances in peer-to-peer (P2P) technologies will enable users to establish ubiquitous connectivity among their personal networked devices and those of others. Building on top of such technologies, we propose a platform of middleware and user interaction tools, called MyNet, that allows everyday users to easily and securely access and share with others their devices, services, and content, without requiring expertise or centralized service support. MyNet offers a more immediate and responsive alternative to the current Web-based paradigm of personal and social networking, because it allows users' distributed services and content to be accessed and shared in real-time as they are produced, directly from their personal devices. In this paper, we describe the MyNet system architecture, including secure resource discovery, service management, security framework, and the user interaction tools for building personal and social networks and sharing resources over them. We also present our proof-of-concept implementation, including mobile devices and our tests with real users.

[1]  Avishai Wool,et al.  Firmato: A novel firewall management toolkit , 2004, TOCS.

[2]  Z. Antoniou,et al.  Intuitive Mobile User Interaction in Smart Spaces via NFC-Enhanced Devices , 2007, 2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07).

[4]  Andrew D. Miller,et al.  Give and take: a study of consumer photo-sharing culture and practice , 2007, CHI.

[5]  KyoungSoo Park,et al.  Connection Conditioning: Architecture-Independent Support for Simple, Robust Servers , 2006, NSDI.

[6]  Mahadev Satyanarayanan,et al.  Coda: A Highly Available File System for a Distributed Workstation Environment , 1990, IEEE Trans. Computers.

[7]  Zoe Antoniou,et al.  User-centered design of a secure P2P personal and social networking platform , 2008 .

[8]  Amy Wohl,et al.  Apple computer, Inc. , 2003 .

[9]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[10]  Andrew S. Tanenbaum,et al.  Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System , 2004, Security Protocols Workshop.

[11]  Mark W. Newman,et al.  Listening in: practices surrounding iTunes music sharing , 2005, CHI.

[12]  Jun Wang,et al.  TRIBLER: a social‐based peer‐to‐peer system , 2008, IPTPS.

[13]  Maria Papadopouli,et al.  Locating application data across service discovery domains , 2001, MobiCom '01.

[14]  K. V. S. Ramarao,et al.  Detection of mutual inconsistency in Distributed Databases , 1987, 1987 IEEE Third International Conference on Data Engineering.

[15]  J. T. Robinson,et al.  On optimistic methods for concurrency control , 1979, TODS.

[16]  Zoe Antoniou,et al.  NFC-based mobile middleware for intuitive user interaction with security in smart homes , 2006, Communication Systems and Networks.

[17]  Lujo Bauer,et al.  Composing security policies with polymer , 2005, PLDI '05.

[18]  Robert Tappan Morris,et al.  Persistent personal names for globally connected mobile devices , 2006, OSDI '06.

[19]  Bahram Shafai,et al.  An Experimental Hardware Extension Platform for Mobile Devices in Smart Spaces , 2006, PSC.

[20]  Christian Floerkemeier,et al.  Interaction in pervasive computing settings using Bluetooth-enabled active tags and passive RFID technology together with mobile phones , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[21]  Dimitris N. Kalofonos,et al.  Intuisec: A Framework for Intuitive User Interaction with Smart Home Security using Mobile Devices , 2007, 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications.

[22]  David Saff,et al.  Footloose: a case for physical eventual consistency and selective conflict resolution , 2003, 2003 Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications.

[23]  Prasad Rao,et al.  Automatic management of network security policy , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.

[24]  Georg Carle,et al.  DIADEM Firewall: Web Server Overload Attack Detection and Response , 2005 .

[25]  William Yurcik,et al.  Secure Smart Environments : Security Requirements , Challenges and Experiences in Pervasive Computing , 2005 .

[26]  Jintae Lee,et al.  An end-user perspective on file-sharing systems , 2003, CACM.

[27]  K. Yamada,et al.  A new remote configurable firewall system for home-use gateways , 2005, Second IEEE Consumer Communications and Networking Conference, 2005. CCNC. 2005.

[28]  Jinyang Li,et al.  F2F: Reliable Storage in Open Networks , 2006, IPTPS.

[29]  John S. Heidemann,et al.  Implementation of the Ficus Replicated File System , 1990, USENIX Summer.

[30]  Holger Karl,et al.  Consistency challenges of service discovery in mobile ad hoc networks , 2004, MSWiM '04.

[31]  Diana K. Smetters,et al.  In search of usable security: five lessons from the field , 2004, IEEE Security & Privacy Magazine.

[32]  J. Doug Tygar,et al.  Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.

[33]  Robert Tappan Morris,et al.  Alpaca: extensible authorization for distributed services , 2007, CCS '07.

[34]  Susan B. Davidson,et al.  Optimism and consistency in partitioned distributed database systems , 1984, TODS.

[35]  Robert Tappan Morris,et al.  Ivy: a read/write peer-to-peer file system , 2002, OSDI '02.

[36]  Alley Stoughton,et al.  Detection of Mutual Inconsistency in Distributed Systems , 1983, IEEE Transactions on Software Engineering.

[37]  Brian Matthews,et al.  Policy-driven access control over a distributed firewall architecture , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.

[38]  Mark W. Newman,et al.  Share and share alike: exploring the user interface affordances of file sharing , 2006, CHI.

[39]  Marvin Theimer,et al.  Managing update conflicts in Bayou, a weakly connected replicated storage system , 1995, SOSP.

[40]  Perry A. Zirkel,et al.  MySpace , 2009 .

[41]  Hector Garcia-Molina,et al.  SPROUT: P2P Routing with Social Networks , 2004, EDBT Workshops.

[42]  Mahadev Satyanarayanan,et al.  Disconnected Operation in the Coda File System , 1999, Mobidata.

[43]  Scott Counts,et al.  Supporting social presence through lightweight photo sharing on and off the desktop , 2004, CHI.