Centralized to Decentralized Social Networks: Factors that Matter

This work covers the research work on decentralization of Online Social Networks (OSNs), issues with centralized design are studied with possible decentralized solutions. Centralized architecture is prone to privacy breach, p2p architecture for data and thus authority decentralization with encryption seems a possible solution. OSNs’ users grow exponentially causing scalability issue, a natural solution is decentralization where users bring resources with them via personal machines or paid services. Also centralized services are not available unremittingly, to this end decentralization proposes replication. Decentralized solutions are also proposed for reliability issues arising in centralized systems and the potential threat of a central authority. Yet key to all problems isn’t found, metadata may be enough for inferences about data and network traffic flow can lead to information on users’ relationships. First issue can be mitigated by data padding or splitting in uniform blocks. Caching, dummy traffic or routing through a mix of nodes can be some possible solutions to the second. Centralized to Decentralized Social Networks: Factors that Matter

[1]  Sonja Buchegger,et al.  XACML-Based Access Control for Decentralized Online Social Networks , 2014, 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing.

[2]  Sonja Buchegger,et al.  Access control in decentralized online social networks: Applying a policy-hiding cryptographic scheme and evaluating its performance , 2014, 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS).

[3]  Refik Molva,et al.  Safebook: A privacy-preserving online social network leveraging on real-life trust , 2009, IEEE Communications Magazine.

[4]  Emiliano De Cristofaro,et al.  Private discovery of common social contacts , 2011, International Journal of Information Security.

[5]  Karl Aberer,et al.  A Decentralized Online Social Network with Efficient User-Driven Replication , 2012, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing.

[6]  Nitin Chiluka,et al.  Social Networks Meet Distributed Systems: Towards a Robust Sybil Defense under Churn , 2015, AsiaCCS.

[7]  Shivakant Mishra,et al.  Results from a Practical Deployment of the MyZone Decentralized P2P Social Network , 2013, ArXiv.

[8]  Anne-Marie Kermarrec,et al.  Software - Papeer: Peer-to-peer social-centricpaper management platform. , 2009 .

[9]  Refik Molva,et al.  Privacy preserving social networking through decentralization , 2009, 2009 Sixth International Conference on Wireless On-Demand Network Systems and Services.

[10]  Prateek Mittal,et al.  DECENT: A decentralized architecture for enforcing privacy in online social networks , 2011, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops.

[11]  Saikat Guha,et al.  NOYB: privacy in online social networks , 2008, WOSN '08.

[12]  Ramón Cáceres,et al.  Vis-à-Vis: Privacy-preserving online social networking via Virtual Individual Servers , 2011, 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011).

[13]  Akira Sato,et al.  A distributed web browser as a platform for running collaborative applications , 2011, 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).

[14]  David Mazières,et al.  Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.

[15]  Sonja Buchegger,et al.  A case for P2P infrastructure for social networks - opportunities & challenges , 2009, 2009 Sixth International Conference on Wireless On-Demand Network Systems and Services.

[16]  Giancarlo Ruffo,et al.  LotusNet: Tunable privacy for distributed online social network services , 2012, Comput. Commun..

[17]  Khuzaima Daudjee,et al.  Update Management in Decentralized Social Networks , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops.

[18]  Alberto Montresor,et al.  Efficient dissemination in decentralized social networks , 2011, 2011 IEEE International Conference on Peer-to-Peer Computing.

[19]  Thorsten Strufe,et al.  d2 Deleting Diaspora: Practical attacks for profile discovery and deletion , 2013, 2013 IEEE International Conference on Communications (ICC).

[20]  Ralf Steinmetz,et al.  A Distributed Platform for Multimedia Communities , 2008, 2008 Tenth IEEE International Symposium on Multimedia.

[21]  Bobby Bhattacharjee,et al.  Persona: an online social network with user-defined privacy , 2009, SIGCOMM '09.

[22]  Rajesh Sharma,et al.  SuperNova: Super-peers based architecture for decentralized online social networks , 2011, 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012).

[23]  Michalis Vafopoulos,et al.  Information Society: the two faces of Janus , 2006, AIAI.

[24]  Raouf Boutaba,et al.  Ensuring Beta-Availability in P2P Social Networks , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops.

[25]  Rossano Schifanella,et al.  Tempering Kademlia with a Robust Identity Based System , 2008, 2008 Eighth International Conference on Peer-to-Peer Computing.

[26]  Karl Aberer,et al.  Towards the Realization of Decentralized Online Social Networks: An Empirical Study , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.

[27]  Krzysztof Rzadca,et al.  Replica Placement in P2P Storage: Complexity and Game Theoretic Analyses , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.

[28]  Kanchana Thilakarathna,et al.  Enabling mobile distributed social networking on smartphones , 2012, MSWiM '12.

[29]  Julita Vassileva,et al.  Selective Propagation of Social Data in Decentralized Online Social Network , 2011, UMAP Workshops.

[30]  Torben Weis,et al.  SoNet -- Privacy and Replication in Federated Online Social Networks , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops.

[31]  Sonja Buchegger,et al.  PeerSoN: P2P social networking: early experiences and insights , 2009, SNS '09.

[32]  Arturo Azcorra,et al.  A first step towards user assisted online social networks , 2010, SNS '10.

[33]  Thorsten Strufe,et al.  A survey on decentralized Online Social Networks , 2014, Comput. Networks.

[34]  Benjamin Greschbach,et al.  The devil is in the metadata — New privacy challenges in Decentralised Online Social Networks , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops.

[35]  Nikita Borisov,et al.  Cachet: a decentralized architecture for privacy preserving social networking with caching , 2012, CoNEXT '12.

[36]  Jin Zhao,et al.  Cuckoo: towards decentralized, socio-aware online microblogging services and data measurements , 2010, HotPlanet '10.

[37]  Michael Dürr,et al.  Vegas -- A Secure and Privacy-Preserving Peer-to-Peer Online Social Network , 2012, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing.

[38]  Ramón Cáceres,et al.  Privacy, cost, and availability tradeoffs in decentralized OSNs , 2009, WOSN '09.