Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1592568.1592585acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Free access

Persona: an online social network with user-defined privacy

Published: 16 August 2009 Publication History

Abstract

Online social networks (OSNs) are immensely popular, with some claiming over 200 million users. Users share private content, such as personal information or photographs, using OSN applications. Users must trust the OSN service to protect personal information even as the OSN provider benefits from examining and sharing that information. We present Persona, an OSN where users dictate who may access their information. Persona hides user data with attribute-based encryption (ABE), allowing users to apply fine-grained policies over who may view their data. Persona provides an effective means of creating applications in which users, not the OSN, define policy over access to private data. We demonstrate new cryptographic mechanisms that enhance the general applicability of ABE. We show how Persona provides the functionality of existing online social networks with additional privacy benefits. We describe an implementation of Persona that replicates Facebook applications and show that Persona provides acceptable performance when browsing privacy-enhanced web pages, even on mobile devices.

References

[1]
A. Acquisti and R. Gross. Imagined communities: Awareness, information sharing, and privacy on the facebook. In PET, 2006.
[2]
Advanced crypto software collection. http://acsc.csl.sri.com/cpabe/.
[3]
S. Ahern, et al. Over-exposed?: privacy patterns and considerations in online and mobile photo sharing. In Human Factors in Computing Systems, 2007.
[4]
Apple iPhone SDK. http://developer.apple.com/iphone/.
[5]
J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-policy attribute-based encryption. In Security and Privacy, 2007.
[6]
P. A. Bonatti and P. Samarati. A uniform framework for regulating service access and information release on the web. Journal of Computer Security, 2002.
[7]
M. Chase. Multi-authority attribute based encryption. In TCC, 2007.
[8]
D. Clark. The design philosophy of the darpa internet protocols. In SIGCOMM, 1988.
[9]
Facebook statement of rights and responsibilities. http://www.facebook.com/press/info.php?statistics#/terms.php?ref=pf.
[10]
Facebook statistics. http://www.facebook.com/press/info.php?statistics.
[11]
D. F. Ferraiolo and D. R. Kuhn. Role-based access controls. In National Computer Security Conference, 1992.
[12]
M. Gjoka, M. Sirivianos, A. Markopoulou, and X. Yang. Poking facebook: Characterization of OSN applications. In WOSN, 2008.
[13]
R. Gross and A. Acquisti. Information revelation and privacy in online social networks (the facebook case). In WPES, 2005.
[14]
S. Guha, K. Tang, and P. Francis. NOYB: Privacy in online social networks. In WOSN, 2008.
[15]
K. P. Gummadi, S. Saroiu, and S. D. Gribble. King: Estimating latency between arbitrary internet end hosts. In IMC, 2002.
[16]
J. He, W. W. Chu, and Z. V. Liu. Inferring privacy information from social networks. In ISI, 2006.
[17]
J. Kleinberg. Challenges in social network data: Processes, privacy and paradoxes. In KDD, 2007. Invited talk.
[18]
A. Korolova, R. Motwani, S. U. Nabar, and Y. Xu. Link privacy in social networks. In Information and Knowledge Mining (CIKM), 2008.
[19]
B. Krishnamurthy. A measure of online social networks. In COMSNETS, 2009.
[20]
B. Krishnamurthy and C. E. Wills. Characterizing privacy in online social networks. In WOSN, 2008.
[21]
I.-F. Lam, K.-T. Chen, and L.-J. Chen. Involuntary information leakage in social network services. In IWSEC, 2008.
[22]
Y. Lee. Measured TCP performance in CDMA 1x EV-DO network. In PAM, 2006.
[23]
H. Lin, Z. Cao, X. Liang, and J. Shao. Secure threshold multi authority attribute based encryption without a central authority. In INDOCRYPT, 2008.
[24]
Linkedin. http://www.linkedin.com/.
[25]
Loopt. http://www.loopt.com.
[26]
M. M. Lucas and N. Borisov. flybynight: Mitigating the privacy risks of social networking. In WPES, 2008.
[27]
B. Lynn. On the implementation of pairing-based cryptosystems. Ph.D. thesis, Stanford, 2008.
[28]
A. Mislove, et al. Measurement and analysis of online social networks. In IMC, 2007.
[29]
A. Mislove, et al. Growth of the flickr social network. In WOSN, 2008.
[30]
D. Naor, M. Naor, and J. B. Lotspiech. Revocation and tracing schemes for stateless receivers. In CRYPTO, 2001.
[31]
M. Pirretti, P. Traynor, P. McDaniel, and B. Waters. Secure attribute-based systems. In ACM CCS, 2006.
[32]
A. Sahai and B. Waters. Fuzzy identity-based encryption. In Eurocrypt, 2005.
[33]
U. Shankar, et al. Detecting format-string vulnerabilities with type qualifiers. In USENIX Security, 2001.
[34]
A. Tootoonchian, et al. Lockr: Social access control for web 2.0. In WOSN, 2008.
[35]
P. Traynor, K. Butler, W. Enck, and P. McDaniel. Realizing massive-scale conditional access systems through attribute-based cryptosystems. In NDSS, 2008.
[36]
Where I've been. http://apps.facebook.com/whereivebeen/.
[37]
C. K. Wong, M. Gouda, and S. S. Lam. Secure group communications using key graphs. SIGCOMM CCR, 28(4):68--79, 1998.
[38]
W. Xu, X. Zhou, and L. Li. Inferring privacy information via social relations. In ICDEW, 2008.
[39]
H. Yin, et al. Capturing system-wide information flow for malware detection and analysis. In CCS, 2007.
[40]
T. Yu, M. Winslett, and K. E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. Transactions on Information and System Security, 2003.

Cited By

View all
  • (2025)Integrita: A BFT distributed storage systemFuture Generation Computer Systems10.1016/j.future.2024.107629166(107629)Online publication date: May-2025
  • (2024)Blockchain for AcademicsAchieving Secure and Transparent Supply Chains With Blockchain Technology10.4018/979-8-3693-0482-2.ch012(200-224)Online publication date: 18-Jan-2024
  • (2024)Key-homomorphic and revocable ciphertext-policy attribute based key encapsulation mechanism for multimedia applicationsMultimedia Tools and Applications10.1007/s11042-024-18626-w83:33(78827-78859)Online publication date: 29-Feb-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGCOMM '09: Proceedings of the ACM SIGCOMM 2009 conference on Data communication
August 2009
340 pages
ISBN:9781605585949
DOI:10.1145/1592568
  • cover image ACM SIGCOMM Computer Communication Review
    ACM SIGCOMM Computer Communication Review  Volume 39, Issue 4
    SIGCOMM '09
    October 2009
    325 pages
    ISSN:0146-4833
    DOI:10.1145/1594977
    Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 16 August 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. ABE
  2. OSN
  3. facebook
  4. persona
  5. privacy
  6. social networks

Qualifiers

  • Research-article

Conference

SIGCOMM '09
Sponsor:
SIGCOMM '09: ACM SIGCOMM 2009 Conference
August 16 - 21, 2009
Barcelona, Spain

Acceptance Rates

Overall Acceptance Rate 462 of 3,389 submissions, 14%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)486
  • Downloads (Last 6 weeks)51
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Integrita: A BFT distributed storage systemFuture Generation Computer Systems10.1016/j.future.2024.107629166(107629)Online publication date: May-2025
  • (2024)Blockchain for AcademicsAchieving Secure and Transparent Supply Chains With Blockchain Technology10.4018/979-8-3693-0482-2.ch012(200-224)Online publication date: 18-Jan-2024
  • (2024)Key-homomorphic and revocable ciphertext-policy attribute based key encapsulation mechanism for multimedia applicationsMultimedia Tools and Applications10.1007/s11042-024-18626-w83:33(78827-78859)Online publication date: 29-Feb-2024
  • (2023)Reducing Mobile Web Latency Through Adaptively Selecting Transport ProtocolIEEE/ACM Transactions on Networking10.1109/TNET.2023.323590731:5(2162-2177)Online publication date: Oct-2023
  • (2022)FABEOProceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security10.1145/3548606.3560699(2491-2504)Online publication date: 7-Nov-2022
  • (2022)Are we ready for metaverse?Proceedings of the 22nd ACM Internet Measurement Conference10.1145/3517745.3561417(504-518)Online publication date: 25-Oct-2022
  • (2022)The Reintegration Journey Following a Psychiatric Hospitalization: Examining the Role of Social TechnologiesProceedings of the ACM on Human-Computer Interaction10.1145/35129696:CSCW1(1-31)Online publication date: 7-Apr-2022
  • (2022)Image DePO: Towards Gradual Decentralization of Online Social Networks using Decentralized Privacy OverlaysProceedings of the ACM on Human-Computer Interaction10.1145/35129076:CSCW1(1-28)Online publication date: 7-Apr-2022
  • (2022)Reality Check of Metaverse: A First Look at Commercial Social Virtual Reality Platforms2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)10.1109/VRW55335.2022.00040(141-148)Online publication date: Mar-2022
  • (2022)User-Defined Privacy-Preserving Traffic Monitoring Against n-by-1 Jamming AttackIEEE/ACM Transactions on Networking10.1109/TNET.2022.315765430:5(2060-2073)Online publication date: Oct-2022
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media