Advertisement

Leveraging Social Links for Trust and Privacy in Networks

  • Leucio Antonio Cutillo
  • Refik Molva
  • Thorsten Strufe
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 309)

Abstract

Existing on-line social networks (OSN) such as Facebook suffer from several weaknesses regarding privacy and security due to their inherent handling of personal data. As pointed out in [4], a preliminary analysis of existing OSNs shows that they are subject to a number of vulnerabilities, ranging from cloning legitimate users to sybil attacks through privacy violations. Starting from these OSN vulnerabilities as the first step of a broader research activity, we came up with a new approach that is very promising in re-visiting security and privacy problems in distributed systems and networks. We suggest a solution that both aims at avoiding any centralized control and leverages on the real life trust between users, that is part of the social network application itself. An anonymization technique based on multi-hop routing among trusted nodes guarantees privacy in data access and, generally speaking, in all the OSN operations.

Keywords

Outer Shell Online Social Network Malicious Node Trust Relationship Social Network Service 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Modelling The Real Market Value Of Social Networks (2008), http://www.techcrunch.com/2008/06/23/modeling-the-real-market-value-of-social-networks/
  2. 2.
  3. 3.
    Bennett, K., Grotho, C.: Gap - practical anonymous networking. In: Dingledine, R. (ed.) PET 2003. LNCS, vol. 2760, pp. 141–160. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  4. 4.
    Bilge, L., Strufe, T., Balzarotti, D., Kirda, E.: All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks. In: WWW 2009, Madrid (2008)Google Scholar
  5. 5.
    Carchiolo, V., Malgeri, M., Mangioni, G., Nicosia, V.: Prosa: P2p resource organisation by social acquaintances, pp. 135–142Google Scholar
  6. 6.
    Chothia, T., Chatzikokolakis, K.: A survey of anonymous peer-to-peer file-sharing. In: Network-Centric Ubiquitous Systems, pp. 744–755. Springer, HeidelbergGoogle Scholar
  7. 7.
    Cutillo, L.A., Molva, R., Strufe, T.: Privacy preserving social networking through decentralization. In: Wireless On-demand Network Systems and Services (February 2009)Google Scholar
  8. 8.
    Guha, S., Daswani, N., Jain, R.: An experimental study of the skype peer-to-peer voip system. In: Peer-to-Peer Systems. Microsoft ResearchGoogle Scholar
  9. 9.
    Hogben, G.: Security issues and recommendations for online social networks. Technical Report 1 (2007)Google Scholar
  10. 10.
    Ian Clarke, B.W., Sandberg, O., Hong, T.W.: Freenet: A Distributed Anonymous Information Storage and Retrieval System. In: Design Issues in Anonymity and Unobservability, pp. 46–66 (2000)Google Scholar
  11. 11.
    Maymounkov, P., Mazieres, D.: Kademlia: A Peer-to-Peer Information System Based on the XOR Metric. In: P2P-Systems, vol. 2429, pp. 53–65 (2002)Google Scholar
  12. 12.
    Moyer, S., Hamiel, N.: Satan is on My Friends List: Attacking Social Networks (2008), http://www.blackhat.com/html/bh-usa-08/bh-usa-08-archive.html
  13. 13.
    Poller, A.: Privatsphärenschutz in Soziale-Netzwerke-Plattformen. Fraunhofer SIT Survey (2008), http://www.sit.fraunhofer.de
  14. 14.
    Cuevas, I.M.-Y.R., Guerrero, C., Navarro, C.: Bittella: A novel content distribution overlay based on bittorrent and social groups. In: Peer to Peer Networks (November 2007)Google Scholar
  15. 15.
    Rogers, M., Bhatti, S.: How to disappear completely: a survey of private peer-to-peer networks. In: Sustaining Privacy in Autonomous Collaborative Environments (2007)Google Scholar
  16. 16.
    Steiner, M., Carra, D., Biersack, E.W.: Faster content access in KAD. In: Peer-to-Peer Computing (September 2008)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2009

Authors and Affiliations

  • Leucio Antonio Cutillo
    • 1
  • Refik Molva
    • 1
  • Thorsten Strufe
    • 2
  1. 1.EURECOMSophia-AntipolisFrance
  2. 2.TU DarmstadtDarmstadtGermany

Personalised recommendations