ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation

  • Sebastian Biedermann
  • Nikolaos P. Karvelas
  • Stefan Katzenbeisser
  • Thorsten Strufe
  • Andreas Peter
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8327)


Online Social Networks (OSNs) enjoy high popularity, but their centralized architectures lead to intransparency and mistrust in the providers who can be the single point of failure. A solution is to adapt the OSN functionality to an underlying and fully distributed peer-to-peer (P2P) substrate. Several approaches in the field of OSNs based on P2P architectures have been proposed, but they share substantial P2P weaknesses and they suffer from low availability and privacy problems. In this work, we propose a distributed OSN which combines an underlying P2P architecture with friend-based data propagation and a Proof-of-Work (PoW) concept. ProofBook provides availability of user data, stability of the underlying network architecture and privacy improvements while it does not limit simple data sharing based on social relations.


Online Social Network Peer-to-Peer Proof-of-Work 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Back, A.: Hashcash: A denial of service counter-measure (2002)Google Scholar
  2. 2.
    Baumgart, I., Heep, B., Krause, S.: OverSim: A flexible overlay network simulation framework. In: Proceedings of 10th IEEE Global Internet Symposium (GI 2007) in conjunction with IEEE INFOCOM 2007, Anchorage, AK, USA, pp. 79–84 (2007)Google Scholar
  3. 3.
    Belenkiy, M., Chase, M., Erway, C.C., Jannotti, J., Küpçü, A., Lysyanskaya, A.: Incentivizing outsourced computation. In: Proceedings of the 3rd International Workshop on Economics of Networked Systems, NetEcon 2008, pp. 85–90. ACM, New York (2008)Google Scholar
  4. 4.
    Belenkiy, M., Chase, M., Erway, C.C., Jannotti, J., Küpçü, A., Lysyanskaya, A., Rachlin, E.: Making p2p accountable without losing privacy. In: Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society, WPES 2007, pp. 31–40. ACM, New York (2007)CrossRefGoogle Scholar
  5. 5.
    Bielenberg, A., Helm, L., Gentilucci, A., Stefanescu, D., Zhang, H.: The growth of diaspora - a decentralized online social network in the wild. In: 2012 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 13–18 (2012)Google Scholar
  6. 6.
    Buchegger, S., Schiöberg, D., Vu, L.-H., Datta, A.: Peerson: P2p social networking: early experiences and insights. In: Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, SNS 2009, pp. 46–52. ACM, New York (2009)CrossRefGoogle Scholar
  7. 7.
    Cutillo, L.A., Molva, R., Strufe, T.: Safebook: a privacy preserving online social network leveraging on real-life trust. IEEE Communications Magazine 47(12) (December 2009), Consumer Communications and Networking SeriesGoogle Scholar
  8. 8.
    Dwork, C., Naor, M.: Pricing via processing or combatting junk mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 139–147. Springer, Heidelberg (1993)CrossRefGoogle Scholar
  9. 9.
    Graffi, K., Mukherjee, P., Menges, B., Hartung, D., Kovacevic, A., Steinmetz, R.: Practical security in p2p-based social networks. In: IEEE 34th Conference on Local Computer Networks, LCN 2009, pp. 269–272 (October 2009)Google Scholar
  10. 10.
    Hua, C., Mao, Y., Jinqiang, H., Haiqing, D., Xiaoming, L.: Maze: a social peer-to-peer network. In: IEEE International Conference on E-Commerce Technology for Dynamic E-Business, pp. 290–293 (September 2004)Google Scholar
  11. 11.
    Mislove, A., Marcon, M., Gummadi, K.P., Druschel, P., Bhattacharjee, B.: Measurement and analysis of online social networks. In: Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, IMC 2007, pp. 29–42. ACM, New York (2007)Google Scholar
  12. 12.
    Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008)Google Scholar
  13. 13.
    Pouwelse, J.A., Garbacki, P., Wang, J., Bakker, A., Yang, J., Iosup, A., Epema, D.H.J., Reinders, M.J.T., Steen, M.R.V., Sips, H.J.: TRIBLER: a social-based peer-to-peer system. Concurrency and Computation: Practice and Experience 20, 127–138 (2008)CrossRefGoogle Scholar
  14. 14.
    Rowstron, A.I.T., Druschel, P.: Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems (2001)Google Scholar
  15. 15.
    Singh, A., Castro, M., Druschel, P., Rowstron, A.I.T.: Defending against eclipse attacks on overlay networks. In: SIGOPS European Workshop (2004)Google Scholar
  16. 16.
    Varga, A.: Using the omnet++ discrete event simulation system in education. IEEE Transactions on Education 42(4), 11 (1999)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Sebastian Biedermann
    • 1
  • Nikolaos P. Karvelas
    • 1
  • Stefan Katzenbeisser
    • 1
  • Thorsten Strufe
    • 2
  • Andreas Peter
    • 3
  1. 1.Security Engineering GroupTechnische Universtität DarmstadtGermany
  2. 2.P2P Networking GroupTechnische Universtität DarmstadtGermany
  3. 3.Distributed and Embedded Security GroupUniversity of TwenteThe Netherland

Personalised recommendations