• Aucun résultat trouvé

Safebook : a decentralized on-line social network leveraging on real life trust

N/A
N/A
Protected

Academic year: 2022

Partager "Safebook : a decentralized on-line social network leveraging on real life trust"

Copied!
1
0
0

Texte intégral

(1)

EURECOM – 2229 Route des Crêtes – BP 193 F-06904 Sophia Antipolis cedex

www.eurecom.fr

Requirements

: A DECENTRALIZED ON-LINE SOCIAL NETWORK

LEVERAGING ON REAL LIFE TRUST

Threats Current status of OSNs OSN as “Big Brother”

Decentralization - P2P architecture

Leveraging existing Trust

- Social trust ⇒ trusted link - Friend = neighbor

- Trust strength = link weight

Goals

Cooperation enforcement - Friends cooperate

Privacy

- Simple anonymous routing - Based on trusted links

- Group Encryption

2

1 3

3

x b

c

a f

e h

g i

d

L. Antonio Cutillo, Refik Molva, Melek Önen, Thorsten Strufe

Contacts

Hops

Online Probability

90% one valid path probability

y x

y

c

d

e

b’s outer shell:

h(b), @g h(b), @h h(b), @i

k a

g b

1: lookup 2: profile retrieval

Entry point for x

h e c

f

i

x’s Matryoshka x’s profile lookup

Non transitive trust

Security

P2P

SN

Anonymous networks F2F

Crypto patches

or settings

for current OSNs

New Applications

Decentralization Trusted links Cooperation enforcement

Privacy

P2P Social trust Group encryption Super DNS for

Communications New Applicationss

trusted service API

PROTOTYPE

{cutillo, molva, onen, strufe}@eurecom.fr

1. Security and privacy issues in OSNs

2. Design Principles & Contribution

3. Architecture & Feasibility

4. Open Questions & Future Work

Design

Trusted Id System

Internet b

Peer to peer overlay

b a

Social network overlay

• ID Theft

• Cloning

• Porting

• Harvesting

• Profiling

• Censorship

Privacy protection against

• Intruders

• Crawlers

• Third parties

• Ease of data leakage

• Ease of impersonation

• Limited privacy support

• Lack of flexibility in privacy

New privacy preserving OSN

architecture are needed with decentralization as a

requirement for privacy

does not prevent Application Server from reading/exploiting your data

Matryoshka

http://www.safebook.us

Références

Documents relatifs

An approach of selective propagation of social data (i.e. information shared by users in social networks, such as status updates, shared links) by modeling interest of

This paper presents work-in-progress on the Social Semantic Server, an open framework providing applications and their users with a growing set of services of different granularity

The aforementioned characteris- tics skewed degree distribution, high clustering coefficient and short path lengths are typical social network properties and indicate that the

H1: A decentralized network, which holds a globally shared state for all data providers will improve the tracking and storing of provenance information of LOD in comparison to

In this position paper we analyze some of the problems with existing academic solutions and then present an argument why we believe that running an open source academic writing

User interactions in social networks and their implications // The 4th ACM European conference on Computer systems.. Understanding latent interactions in online social networks

Location-based Social Networks (LBSN) allow users to check-in in a Point-of-Interest (POI) 1 and share their activities with friends, providing publicly available data about

We successively used maps and photos within the framework of town planning projects; we are now able to propose a protocol which formalizes the interactions between the project