Decentralized Online Social Network Architectures

  • Francisco de Asís López-FuentesEmail author
Part of the Lecture Notes in Social Networks book series (LNSN)


In recent years, online social networks have become very popular. Online social networks (OSN) have been useful to find former classmates or to improve our interaction with friends. Social networks are also used to establish new relationships with other users, organize events with friends, promote personal work, share multimedia contents, publish comments, or broadcast news. In this way, a huge amount of information is generated and consumed by millions of people via these networks every day. Although the benefits introduced by social networks are well known, these networks still have many challenges. Today popular online social networks are centralized and based on the client-server paradigm. Centralized servers are responsible for managing and storing all information. However, centralized structure introduces several drawbacks in the online social networks such as storage dependence, scalability, security threats, and privacy. P2P infrastructure have emerged as an alternative platform to deploy decentralized online social networks. However, P2P systems are limited by network performance, topology, or vulnerability to security attacks. In this chapter, we review P2P infrastructure as an alternative platform for developing decentralized online social networks. This chapter introduces the benefits of decentralized online social networks and studies its architectures in terms of performance and security.


  1. 1.
    J.A. Pouwelse, P. Garbacki, J. Wang, A. Bakker, J. Yang, A. Iosup, D.H.J. Epema, M. Reinders, M.R. Van Steen, H. Sips, TRIBLER: A social-based peer-to-peer system, in Journal Concurrency and Computation: Practice & Experience. Vol 20(2), pp. 127–138, John Wiley and Sons Ltd, Chichester (2008)Google Scholar
  2. 2.
    S. Buchegger, A. Datta, A case for P2P infrastructure for social networks—opportunities and challenges, in 6th International Conference on Wireless On-Demand Network System, Snowbird, UT (2009), pp. 161–168Google Scholar
  3. 3.
    M. Durr, M. Maier, F. Dorfmeister, Vegas—a secure and privacy-preserving peer-to-peer online social network, in 4th International Conference on Social Computing (2012)Google Scholar
  4. 4.
    G. Wondracek, T. Holz, E. Kirda, C. Kruegel, A practical attack to de-anonymize social network users, in IEEE Symposium on Security and Privacy (2010), Pp. 223–238Google Scholar
  5. 5.
    B. Krishnamurthy, C.E. Wills, On the leakage of personally identifiable information via online social networks, in SIGCOMM Computer Communication Review, vol. 40 (2010), pp. 112–117Google Scholar
  6. 6.
    A. Datta, S. Buchegger, L.H. Vu, T. Strufe, K. Rzadca, Decentralized online social networks, in Handbook of Social Network Technologies and Applications, Springer (2010), Pp. 349–378Google Scholar
  7. 7.
    D. Milojicic, D. Valogeraki, R. Lukose, K. Nagaraja, J. Pruyne, B. Richard, S. Rollins, Z. Xu, Peer-to-peer computing, in Technical Report HPL-2002-57(R.1). HP Laboratories, Palo Alto, CA (2003)Google Scholar
  8. 8.
    S.R. Chowdhury, A.R. Roy, M. Shaikh, K. Daudjee, A taxonomy of decentralized online social networks, in Peer-To-Peer Networking and Applications (2014), Pp. 1–17Google Scholar
  9. 9.
    T. Paul, A. Famurali, T. Strufe, A survey on decentralized online social networks, in Computer Networks, vol. 75, pp. 437–452 (2014)Google Scholar
  10. 10.
    K. Goutsias, G. Spathoulas, I. Anagnostopoulos, Testing scalability and performance of decentralized online social networks, in 20th Pan-Hellenic Conference on Informatics, Patras (2016)Google Scholar
  11. 11.
    M. Castro, M. Costa, A. Rowstron, Peer-to-Peer Overlays: structured, unstructured, or both? in Technical Report MSR-TR-2004-73, Microsoft Research (2004)Google Scholar
  12. 12.
    F.A. López-Fuentes, Video Multicast in Peer-to-Peer Networks (Verlag Dr. Hut, Munich, 2009), 138 Pp,Google Scholar
  13. 13.
    S. Kaune, R.C. Rumín, G. Tyson, A. Mauthe, C. Guerrero, R. Steinmetz, Unraveling BitTorrent’s file unavailability: Measurements and analysis, in 10th International Conference on Peer-To-Peer Computing, Delft (2010)Google Scholar
  14. 14.
    D.S. Menasche, A. Rocha, B. Li, D. Towsley, A. Venkataramani, Content availability and bundling in swarming systems, in, 5th International Conference on Emerging Networking Experiments and Technologies, Rome (2009)Google Scholar
  15. 15.
    J.A. Pouwelse, P. Garbacki, D. H. J. Epema, H. Sips, The Bittorrent P2P filesharing system: Measurements and analysis, in 4th International Workshop on Peer-toPeer Systems, Ithaca, NY (2005)Google Scholar
  16. 16.
    W. Zheng, X. Liu, S. Shi, J. Hu, H. Dong, Peer-to-peer: A technique perspective, in Handbook of Theoretical and Algorithmic Aspects of Ad Hoc, Sensor, and Peer-to-Peer Networks, Auerbach Publications (2006) pp. 587–588Google Scholar
  17. 17.
    P. Maymounkov,D. Mazieres, Kademlia: A Peer-To-Peer Information System Based on the Xor Metric, in International Workshop on Peer-to-Peer Systems, Cambridge, MA (2002)Google Scholar
  18. 18.
    Diaspora. (2014)
  19. 19.
    A. Bielenberg, L. Helm, A. Gentilucci, D. Stefanescu, H. Zhang, The growth of diaspora—a decentralized online social network in the wild, in Global Internet Symposium, pp. 13–18, Orlando, FL (2012)Google Scholar
  20. 20.
    Buchegger, S., Schieberg, D., Yu, L.H., Datta, A., Peerson: P2P social networking - early experiences and insights, in 2nd ACM Workshop on Social Network Systems, pp. 46–52, Nuremberg (2009)Google Scholar
  21. 21.
    S. Nilizadeh, S. Jahid, P. Mittal, N. Borisov, A. Kapadia, Cachet: A decentralized architecture for privacy preserving social networking with caching, in The 8th Int. Conference on Emerging Networking Experiments and Technologies (2012)Google Scholar
  22. 22.
    N. Kourtellis, Finnis, J. Anderson, P. Blackburn, J. Borcea, C. Iamnitchi, A. Prometheus, User-controlled P2P social data management for socially-aware applications, in 11th International Conference on Middleware, pp. 212–213, Bangalore (2010)Google Scholar
  23. 23.
    Jahid, S., Nilizadeh, S., Mittal, P., Borisov, N., Kapadia, A.,DECENT: A decentralized architecture for enforcing privacy in online social networks, in 4th International Workshop on Security and Social Networking, Lugano (2012)Google Scholar
  24. 24.
    P. Garbacki, A. Iosup, D.H.J. Epema, M. Van Steen, 2Fast: Collaborative downloads in P2P networks, in 6th IEEE International Conference on Peer-To-Peer Computing, Cambridge (2006)Google Scholar
  25. 25.
    L. Cutillo, R. Molva, T. Strufe, Safebook: A privacypreserving online social network leveraging on real-life trust. Commun. Mag. IEEE 47(12), 94–101 (2009)CrossRefGoogle Scholar
  26. 26.
    B. Bohen, Incentives build robustness in Bittorrent, in 1st Workshop on Economics of Peer-To-Peer Systems, Berkeley, CA, (2003)Google Scholar
  27. 27.
    P. Mittal, M. Caesar, N. Borisov, X-Vine: Secure and pseudonymous routing using social networks, in Network Distributed System Security Symposium, San Diego, CA (2012)Google Scholar
  28. 28.
    H. Yu, P.B. Gibbons, M. Kaminsky, F. Xiao, SybilLimit: A near-optimal social network defense against Sybil attacks, in IEEE Symposium on Security and Privacy, Oakland, CA (2008)Google Scholar
  29. 29.
    B. Viswanath, A. Post, K. P. Gummadi, A. Mislove, An analysis of social network-based sybil defenses, in SIGCOMM Computer Communications Review, Vol. 40(4), pp.363–374 (2010)Google Scholar
  30. 30.
    S. Roos, T. Strufe, A contribution to analyzing and enhancing Darknet routing, in International Conference on Computer Communications (INFOCOM), Turin (2013)Google Scholar
  31. 31.
    Y. Chen, W. Trappe,R.P. Martin, Detecting and localizing wireless spoofing attacks, in 4th IEEE SECON (2007)Google Scholar
  32. 32.
    Y. Sheng, K. Tan, G. Chen, D. Kotz,A. Campbell, Detecting 802.11 MAC layer spoofing using received signal strength, in IEEE INFOCOM, Phoenix, AZ (2008)Google Scholar
  33. 33.
    V. Velasco, Introduction to IP Spoofing. SANS Institute InfoSec Reading Room (2000)Google Scholar
  34. 34.
    H. Wang, C. Jin, K. Shin, Defense against spoofed IP traffic using hop-count filtering, in IEEE/ACM Transactions on Networking, vol. 15, no. 1 (2007), pp.40–53Google Scholar
  35. 35.
    Z. Duan, X. Yuan, J. Chandrashekar, Controlling IP spoofing through Interdomain packet filters, in IEEE Transactions on Dependable and Secure Computing, vol. 5, no. 1 (2007), pp.22–36Google Scholar
  36. 36.
    F.A. López-Fuentes, S. Balleza-Gallegos, Evaluating Sybil attacks in P2P infrastructures for online social networks, in IEEE 7th International Symposium. on Cyberspace Safety and Security (2015)Google Scholar
  37. 37.
    F.A. López-Fuentes, S. Balleza-Gallegos, Investigation of effects of spoofing attacks in P2P online social networks, in IEEE 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA) (2016)Google Scholar
  38. 38.
    J.R. Douceur, The Sybil attack, in 1st IPTPS, LNCS, Springer-Verlag, 2429 (2002)Google Scholar
  39. 39.
    H. Yu, M. Kaminsky, P.B. Gibbons, A. Flaxman, SybilGuard: Defending against Sybil attacks via social networks, in SIGCOMM’06, Pisa (2006)Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Departamento de Tecnologías de la InformaciónUniversidad Autónoma Metropolitana Cuajimalpa (UAM-C)Mexico CityMexico

Personalised recommendations