ABSTRACT
Current social networks require users to place absolute faith in their operators, and the inability of operators to protect users from malicious agents has led to sensitive private information being made public. We propose an architecture for social networking that protects users' social information from both the operator and other network users. This architecture builds a social network out of smart clients and an untrusted central server in a way that removes the need for faith in network operators and gives users control of their privacy.
- Bond, M. Understanding Security APIs. PhD thesis, University of Cambridge, Jan 2004.Google Scholar
- Borisov, N., Goldberg, I., and Brewer, E. O-the-Record Communication, or, Why Not To Use PGP. In Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society (2004), pp. 77 -- 84. Google ScholarDigital Library
- danah michele boyd. Taken Out of Context - American Teen Sociality in Networked Publics. PhD thesis, University of California, Berkeley, 2008.Google Scholar
- Buchegger, S., and Datta, A. A Case for P2P Infrastructure for Social Networks - Opportunities&Challenges. In Proceedings of the Sixth International Conference on Wireless On-demand Network Systems and Services (2009). Google ScholarDigital Library
- Buchegger, S., Schioberg, D., Vu, L.-H., and Datta, A. PeerSoN: P2P Social Networking - Early Experiences and Insights. In Proceedings of the Second Annual EuroSys Workshop on Social Network Systems (Mar 2009). Google ScholarDigital Library
- Felt, A., and Evans, D. Privacy Protection for Social Networking Platforms. In Proceedings of Web 2.0 Security and Privacy 2008 (2008).Google Scholar
- Gong, L., Mueller, M., Prafullchandra, H., and Schemers, R. Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2. In Proceedings of the USENIX Symposium on Internet Technologies and Systems (1997). Google ScholarDigital Library
- Guha, S., Tang, K., and Francis, P. NOYB: Privacy in Online Social Networks. In Proceedings of the First Workshop on Online Social Networks (Aug 2008), pp. 49 -- 54. Google ScholarDigital Library
- Jagatic, T., Johnson, N., Jakobsson, M., and Menczer, F. Social Phishing. Communications of the ACM 50, 10 (Oct 2007), 94 -- 100. Google ScholarDigital Library
- Li, J., Krohn, M., Mazieres, D., and Shasha, D. Secure untrusted data repository (SUNDR). the 6th Symposium on Operating Systems Design and Implementation (2004). Google ScholarDigital Library
- Lipner, S. B. A Comment on the Confinement Problem. ACM SIGOPS Operating Systems Review 9, 5 (1975), 192 -- 196. Google ScholarDigital Library
- Lucas, M., and Borisov, N. FlyByNight: Mitigating the Privacy Risks of Social Networking. the 7th ACM Workshop on Privacy in the Electronic Society (Oct 2008). Google ScholarDigital Library
- McGonigle, B. Some profiles on MySpace.com not what they seem. http://www.boston.com/news/ nation/washington/articles/2006/10/16/some_ profiles_on_myspacecom_not_what_they_seem/, October 2006. The Boston Globe.Google Scholar
- Mills, E. Facebook suspends app that permitted peephole. http://news.cnet.com/8301-10784_3-9977762-7.html, Jun 2008. CNET News.Google Scholar
- Perrin, T. Public key distribution through-cryptoIDs. In Proceedings of the 2003 Workshop on New Security Paradigms (Aug 2003), pp. 87 -- 102. Google ScholarDigital Library
- Pilkington, E. Blackmail claim stirs fears over Facebook. http://www.guardian.co.uk/business/2007/jul/16/usnews.news, Jul 2007. The Guardian.Google Scholar
- Rabkin, A. Personal knowledge questions for fallback authentication: Security questions in the era of Facebook. In Proceedings of Symposium on Usable Privacy and Security (2008), pp. 13 -- 23. Google ScholarDigital Library
- Raimondo, M., Gennaro, R., and Krawczyk, H. Secure O-the-Record Messaging. the 2005 ACM Workshop on Privacy in the Electronic Society (Nov 2005), 81 -- 89. Google ScholarDigital Library
- Randall, D., and Richards, V. Facebook can ruin your life. And so can MySpace, Bebo... http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-can-ruin-your-life-and-so-can-myspace-bebo-780521.html, February 2008. The Independent.Google Scholar
- Story, L., and Stone, B. Facebook Retreats on Online Tracking. http://www.nytimes.com/2007/11/ 30/technology/30face.html, Nov 2007. The New York Times.Google Scholar
- Wong, F.-L., and Stajano, F. Multi-channel Protocols. In Proceedings of the International Workshop on Security Protocols (2005), pp. 112 -- 127. Google ScholarDigital Library
- Yee, K.-P. Aligning security and usability. IEEE Security and Privacy Magazine 2, 5 (2004), 48 -- 55. Google ScholarDigital Library
Index Terms
- Privacy-enabling social networking over untrusted networks
Recommendations
Privacy in social networks
The only way to be aware of the risks and threats of Facebook, the most commonly used social networking site in the world and Turkey, is to be a careful user changing the default settings or simply not to have a Facebook account. In Turkey, there is ...
Privacy preserving on social networks: new Policies and approaches
SCA '18: Proceedings of the 3rd International Conference on Smart City ApplicationsThanks to online social networks services such as Facebook, Twitter, YouTube, etc...., users have the opportunity to communicate easily without constraints by providing them with free and open platforms. Because of their crucial role in spreading ...
Practical Privacy-Preserving Friend Recommendations on Social Networks
WWW '18: Companion Proceedings of the The Web Conference 2018Making friend recommendations is an important task for social networks, as having more friends typically leads to a better user experience. Most current friend recommendations systems grow the existing network at the cost of privacy. In particular, any ...
Comments