On the Security and Feasibility of Safebook: A Distributed Privacy-Preserving Online Social Network

  • Leucio Antonio Cutillo
  • Refik Molva
  • Thorsten Strufe
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 320)


Safebook tackles the security and privacy problems of online social networks. It puts a special emphasis on the privacy of users with respect to the application provider and provides defenses against intruders or malicious users. In order to assure privacy in the face of potential violations by the provider, Safebook is designed in a decentralized architecture. It relies on the cooperation among the independent parties that represent the users of the online social network at the same time. Safebook addresses the problem of building secure and privacy-preserving data storage and communication mechanisms in a peer-to-peer system by leveraging trust relationships akin to social networks in real life. This paper resumes the contributions of [7,9,8], and extends the first performance and security evaluation of Safebook.


Social Networking Service Malicious User Application Provider Contact List Privacy Problem 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Modelling the Real Market Value of Social Networks (2008),
  2. 2.
    Baden, R., Bender, A., Starin, D., Spring, N., Bhattacharjee, B.: Persona: An online social network with user-defined privacy. In: ACM SIGCOMM, Barcelona, Spain (August 2009)Google Scholar
  3. 3.
    Bennett, K., Grotho, C.: GAP - Practical Anonymous Networking. In: Dingledine, R. (ed.) PET 2003. LNCS, vol. 2760, pp. 141–160. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  4. 4.
    Bilge, L., Strufe, T., Balzarotti, D., Kirda, E.: All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks. In: 18th Intl. World Wide Web Conference (2009)Google Scholar
  5. 5.
    Buchegger, S., Schiöberg, D., Vu, L.H., Datta, A.: PeerSoN: P2P Social Networking. In: Social Network Systems (2009)Google Scholar
  6. 6.
    Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A Distributed Anonymous Information Storage and Retrieval System. In: Federrath, H. (ed.) Anonymity 2000. LNCS, vol. 2009, pp. 46–66. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  7. 7.
    Cutillo, L.-A., Molva, R., Strufe, T.: Privacy preserving social networking through decentralization. In: IEEE WONS (2009)Google Scholar
  8. 8.
    Cutillo, L.A., Molva, R., Strufe, T.: Safebook: a privacy preserving online social network leveraging on real-life trust (2009)Google Scholar
  9. 9.
    Cutillo, L.-A., Molva, R., Strufe, T.: Safebook: Feasibility of Transitive Cooperation for Privacy on a Decentralized Social Network. In: World of Wireless, Mobile and Multimedia Networks (2009)Google Scholar
  10. 10.
    Guha, S., Daswani, N., Jain, R.: An Experimental Study of the Skype Peer-to-Peer VoIP System. In: Peer-to-Peer SystemsGoogle Scholar
  11. 11.
    Guha, S., Tang, K., Francis, P.: NOYB: Privacy in Online Social Networks. In: Online Social Networks, pp. 49–54 (2008)Google Scholar
  12. 12.
    Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F.: Social phishing. Communications of the ACM, 94–100 (2007)Google Scholar
  13. 13.
    Maymounkov, P., Mazieres, D.: Kademlia: A Peer-to-Peer Information System Based on the XOR Metric. In: P2P-Systems. LNCS (2002)Google Scholar
  14. 14.
    Moyer, S., Hamiel, N.: Satan is on My Friends List (2008),
  15. 15.
    Rogers, M., Bhatti, S.: How to Disappear Completely: A Survey of Private Peer-to-Peer Networks (2007)Google Scholar
  16. 16.
    Steiner, M., Carra, D., Biersack, E.W.: Faster content access in KAD. In: Peer-to-Peer Computing (September 2008)Google Scholar
  17. 17.
    Yeung, C.M.A., Liccardi, I., Lu, K., Seneviratne, O., Berners-Lee, T.: Decentralization: The Future of Online Social Networking. In: Future of Social Networking (2009)Google Scholar

Copyright information

© IFIP 2010

Authors and Affiliations

  • Leucio Antonio Cutillo
    • 1
  • Refik Molva
    • 1
  • Thorsten Strufe
    • 2
  1. 1.EURECOMSophia-AntipolisFrance
  2. 2.TU DarmstadtDarmstadtGermany

Personalised recommendations