Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network

Social networking services (SNS), which provide the application with the most probably highest growth rates in the Internet today, raise serious security concerns, especially with respect to the privacy of their users. Multiple studies have shown the vulnerability of these services to breaches of privacy and to impersonation attacks mounted by third parties, however the centralized storage at the providers of SNS represents an additional quite significant weakness that so far has not satisfyingly been addressed. In this paper we show the feasibility of “Safebook”, our proposal for the provision of a competitive social networking service, which solves these vulnerabilities by its decentralized design, leveraging on the real life relationships of its users and means of cryptography.

[1]  Vincenza Carchiolo,et al.  PROSA: P2P Resource Organisation by Social Acquaintances , 2006, AP2PC.

[2]  Ravi Jain,et al.  An Experimental Study of the Skype Peer-to-Peer VoIP System , 2005, IPTPS.

[3]  Ian Clarke,et al.  Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[4]  Scott A. Golder,et al.  Security Issues and Recommendations for Online Social Networks. , 2007 .

[5]  Christian Grothoff,et al.  gap - Practical Anonymous Networking , 2003, Privacy Enhancing Technologies.

[6]  Tom Chothia,et al.  A Survey of Anonymous Peer-to-Peer File-Sharing , 2005, EUC Workshops.

[7]  Moritz Steiner,et al.  Faster Content Access in KAD , 2008, 2008 Eighth International Conference on Peer-to-Peer Computing.

[8]  David Mazières,et al.  Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.

[9]  Refik Molva,et al.  Privacy preserving social networking through decentralization , 2009, 2009 Sixth International Conference on Wireless On-Demand Network Systems and Services.

[10]  Saikat Guha,et al.  NOYB: privacy in online social networks , 2008, WOSN '08.

[11]  Michael Rogers,et al.  How to Disappear Completely: A Survey of Private Peer-to-Peer Networks , 2007 .

[12]  Leyla Bilge,et al.  All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.

[13]  Carmen Guerrero,et al.  Bittella: A Novel Content Distribution Overlay Based on Bittorrent and Social Groups , 2007, OTM Workshops.