Research of apportioned social networks in terms of specific security features
DOI: 10.31673/2412-9070.2019.051318
DOI:
https://doi.org/10.31673/2412-9070.2019.051318Abstract
The analysis of distributed Internet social networks (OSNs) (Persona, Safebook, 3 PeerSoN Wie Concentric nodes, Vis-à-Vis,) from the point of view of security privacy, information self-determination, trust relations, support of mobility is carried out. Existing OSNs have been evaluated.
OSN Persona is a decentralized social network (SN), the concept of security based on the combination of traditional asymmetric and attribute encryption (AE).
OSN Safebook, a decentralized SN based on a structured version of P2P, helps protect the privacy of its members and protect them from harmful opponents / Despite the duplication in the SN, the requirement for permanent availability is only partially met. Replication of personal content is encrypted, but the user does not have influence when the neighbor removes its contents.
OSN PeerSoN Wie Concentric nodes based on OSN PeerSoN on P2P. Conceptually, security and privacy are based on the use of asymmetric encryption.
The right to information self-determination is only partially fulfilled. Because PeerSoN relies solely on P2P when storing personal content, the continued availability of user profiles and personal content is not guaranteed.
With centralized data management through storage and documentation services, Persona meets the requirements for ongoing access to data.
OSN Vis-à-Vis Vis-à-Vis (server and server) is a decentralized SN based on structured P2P.
The organization of participants is decentralized in Vis-à-Vis. In addition, each user manages and stores their personal information
solely on their own VIS instance. However, the right to self-determination is not guaranteed. Reading content and copying. For Safebook and PeerSoN, attacks cannot be ruled out. Cryptographic keys are exchanged directly between users outside the group.
It is stated that none of the investigated OSNs provides comprehensive protection of the user’s personal data and other security parameters.
Keywords: social networking; Internet; processes; security; personal data; privacy; information self-determination; trusting relationships; support for user mobility; friends; groups; key; attributes; asymmetric encryption; centralized; decentralized devices; access control; P2P network; identification; hash table; search.
References
1. Persona: an online social network with userdefned privacy / R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin // SIGCOMM Comput. Commun. Rev. 2018. Vol. 39. P. 135–146.
2. Buchegger S., Datta A. A case for P2P infrastructure for social networks — opportunities & challenges: in WONS’09 //IEEE, Feb 2009. P. 161–168.
3. Peerson: P2p social networking: early experiences and insights / S. Buchegger, D. Schiöberg, L.-H. Vu, A. Datta: Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, SNS ’09, (New York, NY, USA) // ACM, 2015. P. 46–52.
4. Cutillo L. A., Molva R., Strufe T. Privacy preserving social networking through decentralization: Sixth International Conference on Wireless On-Demand Network Systems and Services (WONS), 2009 // IEEE, Feb. 2009. P. 145–152.
5. Cutillo L. A., Molva R., Strufe T. Safebook: Aprivacy-preserving on line social network leveraging on real-life trust // Communications Magazine, IEEE: Dec. 2009. Vol. 47. P. 94–101.
6. Diffe W., Hellman M. E. New directions in cryptography // IEEE transactions on Information Theory, 2017. Vol. 22.
7. Lifesocial.kom: A secure and p2p-based solution for online social networks / K. Graff, C. Gross, D. Stingl [et al.]: Consumer Communications and Networking Conference (CCNC), 2011 // IEEE, 2015. P. 554–558.
8. NaorD., Naor M., Lotspiech J. Revocation and tracing schemes for stateless receivers (J. Kilian, ed.): Advances in Cryptology — CRYPTO 2001, Springer Berlin Heidelberg. 2014. Vol. 2139 of Lecture Notes in Computer Science. P. 41–62.
9. Narendula R., Papaioannou T., Aberer K. My3: A highly-available p2p-based online social network: The 2011 IEEE International Conference on Peer-toPeer Computing (P2P). 2011. P. 166–167.
10. Vis-à-vis: online social networking via virtual individual servers / A. Shakimov, H. Lim, L. P. Cox, R. Caceres: tech. rep. Duke University, May 2016.
11. Wong C. K., Gouda M., Lam S. S. Secure group communications using key graphs: Proceedings of the ACM SIGCOMM ’98 conference on Applications, technologies, architectures, and protocols for computer communication, SIGCOMM’98 (New York, NY, USA) // ACM, 2018. P. 68–79.