skip to main content
10.1145/1592665.1592667acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Free Access

Privacy-enabling social networking over untrusted networks

Published:17 August 2009Publication History

ABSTRACT

Current social networks require users to place absolute faith in their operators, and the inability of operators to protect users from malicious agents has led to sensitive private information being made public. We propose an architecture for social networking that protects users' social information from both the operator and other network users. This architecture builds a social network out of smart clients and an untrusted central server in a way that removes the need for faith in network operators and gives users control of their privacy.

References

  1. Bond, M. Understanding Security APIs. PhD thesis, University of Cambridge, Jan 2004.Google ScholarGoogle Scholar
  2. Borisov, N., Goldberg, I., and Brewer, E. O-the-Record Communication, or, Why Not To Use PGP. In Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society (2004), pp. 77 -- 84. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. danah michele boyd. Taken Out of Context - American Teen Sociality in Networked Publics. PhD thesis, University of California, Berkeley, 2008.Google ScholarGoogle Scholar
  4. Buchegger, S., and Datta, A. A Case for P2P Infrastructure for Social Networks - Opportunities&Challenges. In Proceedings of the Sixth International Conference on Wireless On-demand Network Systems and Services (2009). Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Buchegger, S., Schioberg, D., Vu, L.-H., and Datta, A. PeerSoN: P2P Social Networking - Early Experiences and Insights. In Proceedings of the Second Annual EuroSys Workshop on Social Network Systems (Mar 2009). Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Felt, A., and Evans, D. Privacy Protection for Social Networking Platforms. In Proceedings of Web 2.0 Security and Privacy 2008 (2008).Google ScholarGoogle Scholar
  7. Gong, L., Mueller, M., Prafullchandra, H., and Schemers, R. Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2. In Proceedings of the USENIX Symposium on Internet Technologies and Systems (1997). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Guha, S., Tang, K., and Francis, P. NOYB: Privacy in Online Social Networks. In Proceedings of the First Workshop on Online Social Networks (Aug 2008), pp. 49 -- 54. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Jagatic, T., Johnson, N., Jakobsson, M., and Menczer, F. Social Phishing. Communications of the ACM 50, 10 (Oct 2007), 94 -- 100. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Li, J., Krohn, M., Mazieres, D., and Shasha, D. Secure untrusted data repository (SUNDR). the 6th Symposium on Operating Systems Design and Implementation (2004). Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Lipner, S. B. A Comment on the Confinement Problem. ACM SIGOPS Operating Systems Review 9, 5 (1975), 192 -- 196. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Lucas, M., and Borisov, N. FlyByNight: Mitigating the Privacy Risks of Social Networking. the 7th ACM Workshop on Privacy in the Electronic Society (Oct 2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. McGonigle, B. Some profiles on MySpace.com not what they seem. http://www.boston.com/news/ nation/washington/articles/2006/10/16/some_ profiles_on_myspacecom_not_what_they_seem/, October 2006. The Boston Globe.Google ScholarGoogle Scholar
  14. Mills, E. Facebook suspends app that permitted peephole. http://news.cnet.com/8301-10784_3-9977762-7.html, Jun 2008. CNET News.Google ScholarGoogle Scholar
  15. Perrin, T. Public key distribution through-cryptoIDs. In Proceedings of the 2003 Workshop on New Security Paradigms (Aug 2003), pp. 87 -- 102. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Pilkington, E. Blackmail claim stirs fears over Facebook. http://www.guardian.co.uk/business/2007/jul/16/usnews.news, Jul 2007. The Guardian.Google ScholarGoogle Scholar
  17. Rabkin, A. Personal knowledge questions for fallback authentication: Security questions in the era of Facebook. In Proceedings of Symposium on Usable Privacy and Security (2008), pp. 13 -- 23. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Raimondo, M., Gennaro, R., and Krawczyk, H. Secure O-the-Record Messaging. the 2005 ACM Workshop on Privacy in the Electronic Society (Nov 2005), 81 -- 89. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Randall, D., and Richards, V. Facebook can ruin your life. And so can MySpace, Bebo... http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-can-ruin-your-life-and-so-can-myspace-bebo-780521.html, February 2008. The Independent.Google ScholarGoogle Scholar
  20. Story, L., and Stone, B. Facebook Retreats on Online Tracking. http://www.nytimes.com/2007/11/ 30/technology/30face.html, Nov 2007. The New York Times.Google ScholarGoogle Scholar
  21. Wong, F.-L., and Stajano, F. Multi-channel Protocols. In Proceedings of the International Workshop on Security Protocols (2005), pp. 112 -- 127. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Yee, K.-P. Aligning security and usability. IEEE Security and Privacy Magazine 2, 5 (2004), 48 -- 55. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Privacy-enabling social networking over untrusted networks

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in
                • Published in

                  cover image ACM Conferences
                  WOSN '09: Proceedings of the 2nd ACM workshop on Online social networks
                  August 2009
                  74 pages
                  ISBN:9781605584454
                  DOI:10.1145/1592665

                  Copyright © 2009 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 17 August 2009

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • research-article

                  Acceptance Rates

                  Overall Acceptance Rate12of36submissions,33%

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader