Abstract
Conventional Social Networking Services (SNSs) or Online Social Networks (OSNs) are implemented based on a centralized architecture, and this centralization causes privacy problems. This paper describes Sweets, a decentralized SNS application that synchronizes tweets among users’ own mobile devices and enables users to retain ownership of their data. Sweets provides user authentication and access control without centralized servers. Sweets improves the data availability using an indirect replication scheme. Experimental results show that Sweets has a feasible performance over a 4G cellular network.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Baden, R., Bender, A., Spring, N., Bhattacharjee, B., Starin, D.: Persona: an online social network with user-defined privacy. In: The ACM SIGCOMM 2009 Conference on Data Communication, pp. 135–146 (2009)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321–334 (2007)
Couchbase Lite. http://www.couchbase.com/nosql-databases/couchbase-mobile
Daemen, J., Rijmen, V.: The Design of Rijndael: AES-The Advanced Encryption Standard. Springer Science & Business Media, Heidelberg (2013)
Datta, A., Buchegger, S., Vu, L.H., Strufe, T., Rzadca, K.: Decentralized online social networks. In: Furht, B. (ed.) Handbook of Social Network Technologies and Applications, pp. 349–378. Springer, Heidelberg (2010)
Durr, M., Maier, M., Dorfmeister, F.: Vegas-a secure and privacy-preserving peer-to-peer online social network. In: 2012 International Conference on Privacy, Security, Risk and Trust (PASSAT), pp. 868–874. IEEE (2012)
Figueiredo, R.J., Boykin, P.O., Juste, P.S., Wolinsky, D.: Integrating overlay and social networks for seamless P2P networking. In: Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 93–98. IEEE (2008)
Freitas, M.: Twister-a P2P microblogging platform. arXiv preprint (2013). arXiv:1312.7152
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM (2006)
Greenwald, G.: No Place to Hide. Metropolitan Books, New York (2014)
Huang, L., Wang, S., Hsu, C.H., Zhang, J., Yang, F.: Using reputation measurement to defend mobile social networks against malicious feedback ratings. J. Supercomput. 71(6), 2190–2203 (2015)
Microsoft Windows access control. https://msdn.microsoft.com/en-us/library/windows/desktop/aa374860(v=vs.85).aspx
OpenID. http://openid.net/
OpenID Connect. http://openid.net/connect/
Shinjo, Y., Kunyao, X., Kainuma, N., Nobori, D., Sato, A.: Friend news system: a modern implementation of Usenet over social VPNs. In: 7th IEEE International Conference on Social Computing and Networking, pp. 432–440 (2014)
Softether VPN Project. http://www.softether.org/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Lai, R., Shinjo, Y. (2017). Sweets: A Decentralized Social Networking Service Application Using Data Synchronization on Mobile Devices. In: Wang, S., Zhou, A. (eds) Collaborate Computing: Networking, Applications and Worksharing. CollaborateCom 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 201. Springer, Cham. https://doi.org/10.1007/978-3-319-59288-6_17
Download citation
DOI: https://doi.org/10.1007/978-3-319-59288-6_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-59287-9
Online ISBN: 978-3-319-59288-6
eBook Packages: Computer ScienceComputer Science (R0)