Decentralized Online Social Networks
Current Online social networks (OSN) are web services run on logically centralized infrastructure. Large OSN sites use content distribution networks and thus distribute some of the load by caching for performance reasons, nevertheless there is a central repository for user and application data. This centralized nature of OSNs has several drawbacks including scalability, privacy, dependence on a provider, need for being online for every transaction, and a lack of locality. There have thus been several efforts toward decentralizing OSNs while retaining the functionalities offered by centralized OSNs. A decentralized online social network (DOSN) is a distributed system for social networking with no or limited dependency on any dedicated central infrastructure. In this chapter we explore the various motivations of a decentralized approach to online social networking, discuss several concrete proposals and types of DOSN as well as challenges and opportunities associated with decentralization.
KeywordsSocial Network Access Control Online Social Network Direct Exchange Social Networking Service
Anwitaman Datta and Krzysztof Rzadca’s work was funded by ACRF Tier-1 Grant Number RG 29/09 and A*Star SERC Grant Number 072 134 0055. Le-Hung Vu is partially supported by the FP7 EU Large-scale Integrating Project OKKAM: Enabling a Web of Entities, contract number ICT-215032.
- 1.A. Adya, W. Bolosky, M. Castro, R. Chaiken, G. Cermak, J. Douceur, J. Howell, J. Lorch, M. Theimer, and R. Wattenhofer. In Proceedings of the 5th Usenix Symposium on Operating Systems Design and Implementation (OSDI), Farsite: Federated, available, and reliable storage for an incompletely trusted environment, 2002.Google Scholar
- 3.P. Antoniadis, B. Le Grand, L. Satsiou, A.and Tassiulas, R.L. Aguiar, J.P. Barraca, and S. Sargento. Community building over neighborhood wireless mesh networks. IEEE Technology and Society Magazine, 27:48–56, 2008.Google Scholar
- 4.Luca Maria Aiello, Marco Milanesio, Giancarlo Ruffo, and Rossano Schifanella. Tempering Kademlia with a robust identity based system. In P2P ’08: Proceedings of the 2008 Eighth International Conference on Peer-to-Peer Computing, pages 30–39, 2008.Google Scholar
- 5.Luca Maria Aiello and Giancarlo Ruffo. Secure and Flexible Framework for Decentralized Social Network Services. In SESOC 2010: IEEE International Workshop on SECurity and SOCial Networking, 2010.Google Scholar
- 6.Maria Aspan. Quitting Facebook Gets Easier, Feb. 2008. http://www.nytimes.com/2008/02/13/technology/13face.html.
- 7.Sonja Buchegger and Anwitaman Datta. A case for P2P infrastructure for social networks – opportunities and challenges. In Proceedings of WONS 2009, The Sixth International Conference on Wireless On-demand Network Systems and Services, Snowbird, Utah, USA, February 2–4, 2009.Google Scholar
- 8.Sonja Buchegger and Anwitaman Datta. A case for P2P infrastructure for social networks – opportunities and challenges. In WONS 2009, 6th International Conference on Wireless On-demand Network Systems and Services, Snowbird, Utah, USA, February 2009.Google Scholar
- 9.Danah Boyd and Nicole B. Ellison. Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(1–2), November 2007.Google Scholar
- 10.Sonja Buchegger, Doris Schiöberg, Le Hung Vu, and Anwitaman Datta. PeerSoN: P2P social networking - early experiences and insights. In Proceedings of the Second ACM Workshop on Social Network Systems Social Network Systems 2009, co-located with Eurosys 2009, Nürnberg, Germany, March 31, 2009.Google Scholar
- 11.M. Caesar, M. Castro, E.B. Nightingale, G. O’Shea, and A. Rowstron. Virtual ring routing: network routing inspired by dhts. In SIGCOMM, Proceedings, 2006.Google Scholar
- 12.clip2. The gnutella protocol specification v0.4. http://rfc-gnutella.sourceforge. net/, letzter Abruf: 19.04.2007, 2002.
- 14.Bram Cohen. Incentives build robustness in bitorrent. In Proceedings of the 1st Workshop on Economics of Peer-to-Peer Systems, 2003.Google Scholar
- 15.Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W. Hong. Freenet: A distributed anonymous information storage and retrieval system. In Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 46–66, July 2000.Google Scholar
- 16.Roger Dingledine, Michael J. Freedman, and David Molnar. The free haven project: Distributed anonymous storage service. In H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability. Springer-Verlag, LNCS 2009, July 2000.Google Scholar
- 17.J.R. Douceur. The sybil attack. In Peer-To-Peer Systems: First International Workshop, IPTPS, Revised Papers. Springer, 2002.Google Scholar
- 18.Renato J. Figueiredo, Oscar P. Boykin, Pierre St. Juste, and David Wolinsky. Social VPNs: Integrating overlay and social networks for seamless P2P networking. In 17th IEEE International Workshop on Enabling Technologies: Infrastructures for Collaborative Enterprises, June 2008.Google Scholar
- 19.Justin Frankel. Waste P2P Darknet, 2003. http://waste.sourceforge.net/.
- 20.Sarunas Girdzijauskas, Wojciech Galuba, Vasilios Darlagiannis, Anwitaman Datta, and Karl Aberer. Fuzzynet: Zero-maintenance Ringless Overlay. Technical report, 2008.Google Scholar
- 21.P. Garbacki, A. Iosup, D.H.J. Epema, and M. van Steen. 2fast: Collaborative downloads in p2p networks (best paper award). In 6-th IEEE International Conference on Peer-to-Peer Computing, pages 23–30. IEEE Computer Society, sep 2006.Google Scholar
- 22.F. Giroire, J. Monteiro, and S. Pérennes. P2p storage systems: How much locality can they tolerate? Technical Report 7006, INRIA, 2009.Google Scholar
- 23.Jennifer Golbeck. Quechup: Another Social Network Enemy!, Sept. 2007. Oreillynet.com.Google Scholar
- 24.Kalman Graffi, Sergey Podrajanski, Patrick Mukherjee, Aleksandra Kovacevic, and Ralf Steinmetz. A distributed platform for multimedia communities. In IEEE International Symposium on Multimedia (ISM’08), page 6, Berkley, USA, Dec 2008. IEEE, IEEE Computer Society Press.Google Scholar
- 25.Olaf Gorlitz, Sergej Sizov, and Steffen Staab. Pints: Peer-to-peer infrastructure for tagging systems. IPTPS, 2008.Google Scholar
- 27.Eng Keong Lua, Jon Crowcroft, Marcelo Pias, Ravi Sharma, and Steven Lim. A survey and comparison of peer-to-peer overlay network schemes. IEEE Communications Surveys & Tutorials, 7(2):72–93, 2005.Google Scholar
- 28.J. Li and F. Dabek. F2F: Reliable storage in open networks. In IPTPS, Proceedings, 2006.Google Scholar
- 29.Nicolas Liebau, Konstantin Pussep, Kalman Graffi, Sebastian Kaune, Eric Jahn, André Beyer, and Ralf Steinmetz. The impact of the p2p paradigm. In Proceedings of Americas Conference on Information Systems 2007, Aug 2007.Google Scholar
- 30.Ching man Au Yeung, Ilaria Liccardi, Kanghao Lu, Oshani Seneviratne, and Tim Berners-Lee. Decentralization: The future of online social networking. In W3C Workshop on the Future of Social Networking Position Papers, 2009.Google Scholar
- 31.J.J.D. Mol, A. Bakker, J. Pouwelse, D.H.J. Epema, and H.J. Sips. The design and deployment of a bittorrent live video streaming solution. In ISM 2009. IEEE Computer Society, December 2009.Google Scholar
- 32.S. Marti, P. Ganesan, and H. Garcia-Molina. Dht routing using social links. In The 3rd International Workshop on Peer-to-Peer Systems. Springer, 2004.Google Scholar
- 33.Petar Maymounkov and David Mazieres. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric. In LNCS: International Workshop on P2P-Systems, volume 2429, pages 53–65, 2002.Google Scholar
- 34.M. Meulpolder, J.A. Pouwelse, D.H.J. Epema, and H.J. Sips. Bartercast: A practical approach to prevent lazy freeriding in p2p networks. In State University of New York Yuanyuan Yang, editor, Proceedings of the 23rd IEEE International Parallel and Distributed Processing Symposium, pages 1–8, Los Alamitos, USA, May 2009. IEEE Computer Society.Google Scholar
- 35.Juan Carlos Perez. Facebook’s Beacon More Intrusive Than Previously Thought, Nov 2007. http://www.pcworld.com/article/id,140182-c,onlineprivacy/article.html.
- 38.Doris Schiöberg. A peer-to-peer infrastructure for social networks. Diplom thesis, TU Berlin, Berlin, Germany, December 17, 2008.Google Scholar
- 39.Skype.com. Skype P2P telephony explained, 2004. http://www.skype.com/intl/en/download/explained.html.
- 40.I. Stoica, R. Morris, D. Liben-Nowell, DR Karger, MF Kaashoek, F. Dabek, and H. Balakrishnan. Chord: a scalable peer-to-peer lookup protocol for internet applications. Networking, IEEE/ACM Transactions on, 11(1):17–32, 2003.Google Scholar
- 42.Daniel R. Sandler and Dan S. Wallach. Birds of a fethr: Open, decentralized micropublishing. In 8th International Workshop on Peer-to-Peer Systems (IPTPS ’09) April 21, 2009, Boston, MA, 2009.Google Scholar
- 43.D.N. Tran, F. Chiang, and J. Li. Friendstore: cooperative online backup using trusted nodes. In SocialNets ’08: Proceedings of the 1st Workshop on Social Network Systems, pages 37–42. ACM, 2008.Google Scholar
- 45.Susu Xie, Gabriel Y. Keung, and Bo Li. A measurement of a large-scale peer-to-peer live video streaming system. Parallel Processing Workshops, International Conference on, p. 57, 2007.Google Scholar
- 46.Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, and Abraham Flaxman. Sybilguard: defending against sybil attacks via social networks. In SIGCOMM, 2006.Google Scholar
- 47.Lukasz Zaczek and Anwitaman Datta. Mapping social networks into p2p directory service. In SocInfo, International Conference on Social Informatics, 2009.Google Scholar
- 48.Xinyan Zhang, Jiangchuan Liu, Bo Li, and Tak shing Peter Yum. Coolstreaming/donet: A data-driven overlay network for peer-to-peer live media streaming. In in IEEE Infocom, 2005.Google Scholar