TY - GEN
T1 - DECENT
T2 - 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012
AU - Jahid, Sonia
AU - Nilizadeh, Shirin
AU - Mittal, Prateek
AU - Borisov, Nikita
AU - Kapadia, Apu
PY - 2012
Y1 - 2012
N2 - A multitude of privacy breaches, both accidental and malicious, have prompted users to distrust centralized providers of online social networks (OSNs) and investigate decentralized solutions. We examine the design of a fully decentralized (peer-to-peer) OSN, with a special focus on privacy and security. In particular, we wish to protect the confidentiality, integrity, and availability of user content and the privacy of user relationships. We propose DECENT, an architecture for OSNs that uses a distributed hash table to store user data, and features cryptographic protections for confidentiality and integrity, as well as support for flexible attribute policies and fast revocation. DECENT ensures that neither data nor social relationships are visible to unauthorized users and provides availability through replication and authentication of updates. We evaluate DECENT through simulation and experiments on the PlanetLab network and show that DECENT is able to replicate the main functionality of current centralized OSNs with manageable overhead.
AB - A multitude of privacy breaches, both accidental and malicious, have prompted users to distrust centralized providers of online social networks (OSNs) and investigate decentralized solutions. We examine the design of a fully decentralized (peer-to-peer) OSN, with a special focus on privacy and security. In particular, we wish to protect the confidentiality, integrity, and availability of user content and the privacy of user relationships. We propose DECENT, an architecture for OSNs that uses a distributed hash table to store user data, and features cryptographic protections for confidentiality and integrity, as well as support for flexible attribute policies and fast revocation. DECENT ensures that neither data nor social relationships are visible to unauthorized users and provides availability through replication and authentication of updates. We evaluate DECENT through simulation and experiments on the PlanetLab network and show that DECENT is able to replicate the main functionality of current centralized OSNs with manageable overhead.
UR - http://www.scopus.com/inward/record.url?scp=84861568393&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84861568393&partnerID=8YFLogxK
U2 - 10.1109/PerComW.2012.6197504
DO - 10.1109/PerComW.2012.6197504
M3 - Conference contribution
AN - SCOPUS:84861568393
SN - 9781467309073
T3 - 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012
SP - 326
EP - 332
BT - 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012
Y2 - 19 March 2012 through 23 March 2012
ER -