Advertisement

Decentralized Online Social Networks

  • Anwitaman DattaEmail author
  • Sonja Buchegger
  • Le-Hung Vu
  • Thorsten Strufe
  • Krzysztof Rzadca
Chapter

Abstract

Current Online social networks (OSN) are web services run on logically centralized infrastructure. Large OSN sites use content distribution networks and thus distribute some of the load by caching for performance reasons, nevertheless there is a central repository for user and application data. This centralized nature of OSNs has several drawbacks including scalability, privacy, dependence on a provider, need for being online for every transaction, and a lack of locality. There have thus been several efforts toward decentralizing OSNs while retaining the functionalities offered by centralized OSNs. A decentralized online social network (DOSN) is a distributed system for social networking with no or limited dependency on any dedicated central infrastructure. In this chapter we explore the various motivations of a decentralized approach to online social networking, discuss several concrete proposals and types of DOSN as well as challenges and opportunities associated with decentralization.

Keywords

Social Network Access Control Online Social Network Direct Exchange Social Networking Service 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Notes

Acknowledgments

Anwitaman Datta and Krzysztof Rzadca’s work was funded by ACRF Tier-1 Grant Number RG 29/09 and A*Star SERC Grant Number 072 134 0055. Le-Hung Vu is partially supported by the FP7 EU Large-scale Integrating Project OKKAM: Enabling a Web of Entities, contract number ICT-215032.

References

  1. 1.
    A. Adya, W. Bolosky, M. Castro, R. Chaiken, G. Cermak, J. Douceur, J. Howell, J. Lorch, M. Theimer, and R. Wattenhofer. In Proceedings of the 5th Usenix Symposium on Operating Systems Design and Implementation (OSDI), Farsite: Federated, available, and reliable storage for an incompletely trusted environment, 2002.Google Scholar
  2. 2.
    Karl Aberer, Anwitaman Datta, and Manfred Hauswirth. Efficient, self-contained handling of identity in peer-to-peer systems. IEEE Transactions on Knowledge and Data Engineering, 16(7):858–869, 2004.CrossRefGoogle Scholar
  3. 3.
    P. Antoniadis, B. Le Grand, L. Satsiou, A.and Tassiulas, R.L. Aguiar, J.P. Barraca, and S. Sargento. Community building over neighborhood wireless mesh networks. IEEE Technology and Society Magazine, 27:48–56, 2008.Google Scholar
  4. 4.
    Luca Maria Aiello, Marco Milanesio, Giancarlo Ruffo, and Rossano Schifanella. Tempering Kademlia with a robust identity based system. In P2P ’08: Proceedings of the 2008 Eighth International Conference on Peer-to-Peer Computing, pages 30–39, 2008.Google Scholar
  5. 5.
    Luca Maria Aiello and Giancarlo Ruffo. Secure and Flexible Framework for Decentralized Social Network Services. In SESOC 2010: IEEE International Workshop on SECurity and SOCial Networking, 2010.Google Scholar
  6. 6.
    Maria Aspan. Quitting Facebook Gets Easier, Feb. 2008. http://www.nytimes.com/2008/02/13/technology/13face.html.
  7. 7.
    Sonja Buchegger and Anwitaman Datta. A case for P2P infrastructure for social networks – opportunities and challenges. In Proceedings of WONS 2009, The Sixth International Conference on Wireless On-demand Network Systems and Services, Snowbird, Utah, USA, February 2–4, 2009.Google Scholar
  8. 8.
    Sonja Buchegger and Anwitaman Datta. A case for P2P infrastructure for social networks – opportunities and challenges. In WONS 2009, 6th International Conference on Wireless On-demand Network Systems and Services, Snowbird, Utah, USA, February 2009.Google Scholar
  9. 9.
    Danah Boyd and Nicole B. Ellison. Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(1–2), November 2007.Google Scholar
  10. 10.
    Sonja Buchegger, Doris Schiöberg, Le Hung Vu, and Anwitaman Datta. PeerSoN: P2P social networking - early experiences and insights. In Proceedings of the Second ACM Workshop on Social Network Systems Social Network Systems 2009, co-located with Eurosys 2009, Nürnberg, Germany, March 31, 2009.Google Scholar
  11. 11.
    M. Caesar, M. Castro, E.B. Nightingale, G. O’Shea, and A. Rowstron. Virtual ring routing: network routing inspired by dhts. In SIGCOMM, Proceedings, 2006.Google Scholar
  12. 12.
    clip2. The gnutella protocol specification v0.4. http://rfc-gnutella.sourceforge. net/, letzter Abruf: 19.04.2007, 2002.
  13. 13.
    Leucio-Antonio Cutillo, Refik Molva, and Thorsten Strufe. Safebook: a Privacy Preserving Online Social Network Leveraging on Real-Life Trust. IEEE Communications Magazine, 47(12):94–101, December 2009.CrossRefGoogle Scholar
  14. 14.
    Bram Cohen. Incentives build robustness in bitorrent. In Proceedings of the 1st Workshop on Economics of Peer-to-Peer Systems, 2003.Google Scholar
  15. 15.
    Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W. Hong. Freenet: A distributed anonymous information storage and retrieval system. In Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 46–66, July 2000.Google Scholar
  16. 16.
    Roger Dingledine, Michael J. Freedman, and David Molnar. The free haven project: Distributed anonymous storage service. In H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability. Springer-Verlag, LNCS 2009, July 2000.Google Scholar
  17. 17.
    J.R. Douceur. The sybil attack. In Peer-To-Peer Systems: First International Workshop, IPTPS, Revised Papers. Springer, 2002.Google Scholar
  18. 18.
    Renato J. Figueiredo, Oscar P. Boykin, Pierre St. Juste, and David Wolinsky. Social VPNs: Integrating overlay and social networks for seamless P2P networking. In 17th IEEE International Workshop on Enabling Technologies: Infrastructures for Collaborative Enterprises, June 2008.Google Scholar
  19. 19.
    Justin Frankel. Waste P2P Darknet, 2003. http://waste.sourceforge.net/.
  20. 20.
    Sarunas Girdzijauskas, Wojciech Galuba, Vasilios Darlagiannis, Anwitaman Datta, and Karl Aberer. Fuzzynet: Zero-maintenance Ringless Overlay. Technical report, 2008.Google Scholar
  21. 21.
    P. Garbacki, A. Iosup, D.H.J. Epema, and M. van Steen. 2fast: Collaborative downloads in p2p networks (best paper award). In 6-th IEEE International Conference on Peer-to-Peer Computing, pages 23–30. IEEE Computer Society, sep 2006.Google Scholar
  22. 22.
    F. Giroire, J. Monteiro, and S. Pérennes. P2p storage systems: How much locality can they tolerate? Technical Report 7006, INRIA, 2009.Google Scholar
  23. 23.
    Jennifer Golbeck. Quechup: Another Social Network Enemy!, Sept. 2007. Oreillynet.com.Google Scholar
  24. 24.
    Kalman Graffi, Sergey Podrajanski, Patrick Mukherjee, Aleksandra Kovacevic, and Ralf Steinmetz. A distributed platform for multimedia communities. In IEEE International Symposium on Multimedia (ISM’08), page 6, Berkley, USA, Dec 2008. IEEE, IEEE Computer Society Press.Google Scholar
  25. 25.
    Olaf Gorlitz, Sergej Sizov, and Steffen Staab. Pints: Peer-to-peer infrastructure for tagging systems. IPTPS, 2008.Google Scholar
  26. 26.
    J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. Weatherspoon, C. Wells, et al. Oceanstore: An architecture for global-scale persistent storage. ACM SIGARCH Computer Architecture News, 28(5):190–201, 2000.CrossRefGoogle Scholar
  27. 27.
    Eng Keong Lua, Jon Crowcroft, Marcelo Pias, Ravi Sharma, and Steven Lim. A survey and comparison of peer-to-peer overlay network schemes. IEEE Communications Surveys & Tutorials, 7(2):72–93, 2005.Google Scholar
  28. 28.
    J. Li and F. Dabek. F2F: Reliable storage in open networks. In IPTPS, Proceedings, 2006.Google Scholar
  29. 29.
    Nicolas Liebau, Konstantin Pussep, Kalman Graffi, Sebastian Kaune, Eric Jahn, André Beyer, and Ralf Steinmetz. The impact of the p2p paradigm. In Proceedings of Americas Conference on Information Systems 2007, Aug 2007.Google Scholar
  30. 30.
    Ching man Au Yeung, Ilaria Liccardi, Kanghao Lu, Oshani Seneviratne, and Tim Berners-Lee. Decentralization: The future of online social networking. In W3C Workshop on the Future of Social Networking Position Papers, 2009.Google Scholar
  31. 31.
    J.J.D. Mol, A. Bakker, J. Pouwelse, D.H.J. Epema, and H.J. Sips. The design and deployment of a bittorrent live video streaming solution. In ISM 2009. IEEE Computer Society, December 2009.Google Scholar
  32. 32.
    S. Marti, P. Ganesan, and H. Garcia-Molina. Dht routing using social links. In The 3rd International Workshop on Peer-to-Peer Systems. Springer, 2004.Google Scholar
  33. 33.
    Petar Maymounkov and David Mazieres. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric. In LNCS: International Workshop on P2P-Systems, volume 2429, pages 53–65, 2002.Google Scholar
  34. 34.
    M. Meulpolder, J.A. Pouwelse, D.H.J. Epema, and H.J. Sips. Bartercast: A practical approach to prevent lazy freeriding in p2p networks. In State University of New York Yuanyuan Yang, editor, Proceedings of the 23rd IEEE International Parallel and Distributed Processing Symposium, pages 1–8, Los Alamitos, USA, May 2009. IEEE Computer Society.Google Scholar
  35. 35.
    Juan Carlos Perez. Facebook’s Beacon More Intrusive Than Previously Thought, Nov 2007. http://www.pcworld.com/article/id,140182-c,onlineprivacy/article.html.
  36. 36.
    J.A. Pouwelse, P. Garbacki, J. Wang, A. Bakker, J. Yang, A. Iosup, D.H.J. Epema, M. Reinders, M. van Steen, and H.J. Sips. Tribler: A social-based peer-to-peer system. Concurrency and Computation: Practice and Experience, 20:127–138, 2008.CrossRefGoogle Scholar
  37. 37.
    J.A. Pouwelse, P. Garbacki, J. Wang, A. Bakker, J. Yang, A. Iosup, D.H.J. Epema, M. Reinders, M. van Steen, and H.J. Sips. Tribler: A social-based peer-to-peer system. Concurrency and Computation: Practice and Experience, 20:127–138, 2008.CrossRefGoogle Scholar
  38. 38.
    Doris Schiöberg. A peer-to-peer infrastructure for social networks. Diplom thesis, TU Berlin, Berlin, Germany, December 17, 2008.Google Scholar
  39. 39.
    Skype.com. Skype P2P telephony explained, 2004. http://www.skype.com/intl/en/download/explained.html.
  40. 40.
    I. Stoica, R. Morris, D. Liben-Nowell, DR Karger, MF Kaashoek, F. Dabek, and H. Balakrishnan. Chord: a scalable peer-to-peer lookup protocol for internet applications. Networking, IEEE/ACM Transactions on, 11(1):17–32, 2003.Google Scholar
  41. 41.
    M. Steiner, G. Tsudik, and M. Waidner. Key agreement in dynamic peer groups. IEEE Transactions on Parallel and Distributed Systems, 11(8):769–780, 2000.CrossRefGoogle Scholar
  42. 42.
    Daniel R. Sandler and Dan S. Wallach. Birds of a fethr: Open, decentralized micropublishing. In 8th International Workshop on Peer-to-Peer Systems (IPTPS ’09) April 21, 2009, Boston, MA, 2009.Google Scholar
  43. 43.
    D.N. Tran, F. Chiang, and J. Li. Friendstore: cooperative online backup using trusted nodes. In SocialNets ’08: Proceedings of the 1st Workshop on Social Network Systems, pages 37–42. ACM, 2008.Google Scholar
  44. 44.
    J. Wang, J.A.Pouwelse, J.E. Fokker, A.P. de Vries, and M.J.T. Reinders. Personalization on a peer-to-peer television system. Multimedia Tools and Applications, 36:89–113, 2008.CrossRefGoogle Scholar
  45. 45.
    Susu Xie, Gabriel Y. Keung, and Bo Li. A measurement of a large-scale peer-to-peer live video streaming system. Parallel Processing Workshops, International Conference on, p. 57, 2007.Google Scholar
  46. 46.
    Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, and Abraham Flaxman. Sybilguard: defending against sybil attacks via social networks. In SIGCOMM, 2006.Google Scholar
  47. 47.
    Lukasz Zaczek and Anwitaman Datta. Mapping social networks into p2p directory service. In SocInfo, International Conference on Social Informatics, 2009.Google Scholar
  48. 48.
    Xinyan Zhang, Jiangchuan Liu, Bo Li, and Tak shing Peter Yum. Coolstreaming/donet: A data-driven overlay network for peer-to-peer live media streaming. In in IEEE Infocom, 2005.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2010

Authors and Affiliations

  • Anwitaman Datta
    • 1
    Email author
  • Sonja Buchegger
  • Le-Hung Vu
  • Thorsten Strufe
  • Krzysztof Rzadca
  1. 1.School of Computer EngineeringNTU SingaporeSingaporeSingapore

Personalised recommendations