Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2413176.2413215acmconferencesArticle/Chapter ViewAbstractPublication PagesconextConference Proceedingsconference-collections
research-article

Cachet: a decentralized architecture for privacy preserving social networking with caching

Published: 10 December 2012 Publication History
  • Get Citation Alerts
  • Abstract

    Online social networks (OSNs) such as Facebook and Google+ have transformed the way our society communicates. However, this success has come at the cost of user privacy; in today's OSNs, users are not in control of their own data, and depend on OSN operators to enforce access control policies. A multitude of privacy breaches has spurred research into privacy-preserving alternatives for social networking, exploring a number of techniques for storing, disseminating, and controlling access to data in a decentralized fashion. In this paper, we argue that a combination of techniques is necessary to efficiently support the complex functionality requirements of OSNs.
    We propose Cachet, an architecture that provides strong security and privacy guarantees while preserving the main functionality of online social networks. In particular, Cachet protects the confidentiality, integrity and availability of user content, as well as the privacy of user relationships. Cachet uses a distributed pool of nodes to store user data and ensure availability. Storage nodes in Cachet are untrusted; we leverage cryptographic techniques such as attribute based encryption to protect the confidentiality of data. For efficient dissemination and retrieval of data, Cachet uses a hybrid structured-unstructured overlay paradigm in which a conventional distributed hash table is augmented with social links between users. Social contacts in our system act as caches to store recent updates in the social network, and help reduce the cryptographic as well as the communication overhead in the network.
    We built a prototype implementation of Cachet in the FreePastry simulator. To demonstrate the functionality of existing OSNs we implemented the "newsfeed" application. Our evaluation demonstrates that (a) decentralized architectures for privacy preserving social networking are feasible, and (b) use of social contacts for object caching results in significant performance improvements.

    References

    [1]
    S. M. A. Abbas, J. A. Pouwelse, D. H. J. Epema, and H. J. Sips. A gossip-based distributed social networking system. In Proceedings of the 2009 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, WETICE'09, pages 93--98, Washington, DC, USA, 2009.
    [2]
    D. Adami, C. Callegari, S. Giordano, M. Pagano, and T. Pepe. A real-time algorithm for skype traffic detection and classification. In S. Balandin, D. Moltchanov, and Y. Koucheryavy, editors, Smart Spaces and Next Generation Wired/Wireless Networking, volume 5764 of Lecture Notes in Computer Science. Springer Berlin / Heidelberg, 2009.
    [3]
    L. Aiello and G. Ruffo. LotusNet: tunable privacy for distributed online social network services. Computer Communications, 35(1):75--88, 2012.
    [4]
    L. M. Aiello, M. Milanesio, G. Ruffo, and R. Schifanella. Tempering Kademlia with a robust identity based system. In P2P, 2008.
    [5]
    M. S. Artigas, P. G. Lopez, J. P. Ahullo, and A. F. G. Skarmeta. Cyclone: A novel design schema for hierarchical DHTs. In P2P, pages 49--56, Washington, DC, USA, 2005. IEEE Computer Society.
    [6]
    M. Backes, M. Maffei, and K. Pecina. A security API for distributed social networks. In NDSS, 2011.
    [7]
    R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin. Persona: an online social network with user-defined privacy. In ACM SIGCOMM, 2009.
    [8]
    F. Beato, M. Kohlweiss, and K. Wouters. Scramble! your social network data. In Proceedings of the 11th international conference on Privacy enhancing technologies, PETS'11, pages 211--225, Berlin, Heidelberg, 2011. Springer-Verlag.
    [9]
    S. Ben Mokhtar, A. Pace, and V. Quema. FireSpam: Spam Resilient Gossiping in the BAR Model. In 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), Nov. 2010.
    [10]
    M. Bertier, D. Frey, R. Guerraoui, A.-M. Kermarrec, and V. Leroy. The GOSSPLE anonymous social network. In Proceedings of the ACM/IFIP/USENIX 11th International Conference on Middleware, Middleware '10, pages 191--211. Springer-Verlag, 2010.
    [11]
    J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-policy attribute-based encryption. In IEEE Security & Privacy, 2007.
    [12]
    S. Borst, V. Gupta, and A. Walid. Distributed caching algorithms for content distribution networks. In Proceedings of the 29th conference on Information communications, INFOCOM'10. IEEE Press, 2010.
    [13]
    S. Buchegger, D. Schiöberg, L. H. Vu, and A. Datta. PeerSoN: P2P social networking -- early experiences and insights. In SNS, 2009.
    [14]
    B. Carrasco, Y. Lu, and J. M. F. da Trindade. Partitioning social networks for time-dependent queries. In Proceedings of the 4th Workshop on Social Network Systems, SNS '11. ACM, 2011.
    [15]
    M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. Wallach. Secure routing for structured peer-to-peer overlay networks. In OSDI, 2002.
    [16]
    B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan. Private information retrieval. J. ACM, 45(6), 1998.
    [17]
    E. D. Cristofaro, C. Soriente, G. Tsudik, and A. Williams. Hummingbird: Privacy at the time of Twitter. IACR Cryptology ePrint Archive, 2011:640, 2011.
    [18]
    L. A. Cutillo, R. Molva, and T. Strufe. Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network. In WOWMOM, 2009.
    [19]
    G. Danezis. Inferring privacy policies for social networking services. In Proceedings of the 2nd ACM workshop on Security and artificial intelligence, AISec '09, pages 5--10, New York, NY, USA, 2009. ACM.
    [20]
    A. Datta and R. Sharma. GoDisco: Selective gossip based dissemination of information in social community based overlays. In ICDCN'11, pages 227--238, 2011.
    [21]
    E. De Cristofaro, M. Manulis, and B. Poettering. Private discovery of common social contacts. In 9th International Conference on Applied Cryptography and Network Security (ACNS), volume 6715 of LNCS, pages 147--165. Springer, 2011.
    [22]
    Diaspora*. https://joindiaspora.com/.
    [23]
    R. Dingledine, N. Mathewson, and P. F. Syverson. Tor: The second-generation onion router. In USENIX Security Symposium, 2004.
    [24]
    J. Douceur. The Sybil Attack. In P. Druschel, F. Kaashoek, and A. Rowstron, editors, International Workshop on Peer-to-Peer Systems (IPTPS), volume 2429 of Lecture Notes in Computer Science, pages 251--260. Springer, Mar. 2002.
    [25]
    D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica, and W. Zwaenepoel. Denial-of-service resilience in peer-to-peer file sharing systems. In ACM SIGMETRICS, 2005.
    [26]
    L. Fang and K. LeFevre. Privacy wizards for social networking sites. In Proceedings of the 19th international conference on World wide web, WWW '10, pages 351--360, New York, NY, USA, 2010. ACM.
    [27]
    A. J. Feldman, A. Blankstein, M. J. Freedman, and E. W. Felten. Social networking with {F}rientegrity: privacy and integrity with an untrusted provider. In Proceedings of the 21st USENIX conference on Security symposium, Security'12, Berkeley, CA, USA, 2012. USENIX Association.
    [28]
    D. Gavidia. A gossip-based distributed news service for wireless mesh networks. In In Proc. 3rd IEEE Conf. on Wireless On demand Network Syst. and Services (WONS '06), pages 59--67. IEEE Computer Society, 2006.
    [29]
    D. Gavidia, G. P. Jesi, C. Gamage, and M. van Steen. Canning spam in gossip wireless networks. In Procedings of the 4th IEEE Conference on Wireless On demand Network Systems and Services (WONS), Jan. 2007.
    [30]
    S. Guha, K. Tang, and P. Francis. NOYB: privacy in online social networks. In Proceedings of the first workshop on Online social networks, WOSN '08, pages 49--54. ACM, 2008.
    [31]
    S. Jahid, P. Mittal, and N. Borisov. EASiER: Encryption-based access control in social networks with efficient revocation. In ASIACCS, 2011.
    [32]
    S. Jahid, S. Nilizadeh, P. Mittal, N. Borisov, and A. Kapadia. DECENT: A decentralized architecture for enforcing privacy in online social networks. In SESOC, 2012.
    [33]
    A. Kapadia and N. Triandopoulos. Halo: High-Assurance Locate for Distributed Hash Tables. In NDSS, 2008.
    [34]
    D. Kempe, A. Dobra, and J. Gehrke. Gossip-based computation of aggregate information. In Proceedings of the 44th Annual IEEE Symposium on Foundations of Computer Science, FOCS '03. IEEE Computer Society, 2003.
    [35]
    A.-M. Kermarrec and M. van Steen. Gossiping in distributed systems. SIGOPS Oper. Syst. Rev., 41(5):2--7, Oct. 2007.
    [36]
    B. Klein and H. Hlavacs. A socially aware caching mechanism for encounter networks. Telecommunication Systems, 2011.
    [37]
    C. Lesniewski-Laas and M. F. Kaashoek. Whanau: a Sybil-proof distributed hash table. In NSDI, 2010.
    [38]
    Y. Liu, K. P. Gummadi, B. Krishnamurthy, and A. Mislove. Analyzing Facebook privacy settings: user expectations vs. reality. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, IMC '11, pages 61--70, New York, NY, USA, 2011. ACM.
    [39]
    M. M. Lucas and N. Borisov. FlyByNight: mitigating the privacy risks of social networking. In Proceedings of the 7th ACM workshop on Privacy in the electronic society}, WPES '08, New York, NY, USA, 2008. ACM.
    [40]
    M. Mani, A.-M. Nguyen, and N. Crespi. SCOPE: A prototype for spontaneous P2P social networking. In PerCom Workshops, 2010.
    [41]
    P. Maymounkov and D. Mazières. Kademlia: A peer-to-peer information system based on the XOR metric. In IPTPS, 2002.
    [42]
    G. Mega, A. Montresor, and G. P. Picco. Efficient dissemination in decentralized social networks. In Peer-to-Peer Computing, pages 338--347, 2011.
    [43]
    P. Mittal, M. Caesar, and N. Borisov. X-Vine: Secure and pseudonymous routing using social networks. In NDSS, 2012.
    [44]
    E. Modiano, D. Shah, and G. Zussman. Maximizing throughput in wireless networks via gossiping. In Proceedings of the joint international conference on Measurement and modeling of computer systems}, SIGMETRICS '06/Performance '06. ACM, 2006.
    [45]
    A. Müller, N. Evans, C. Grothoff, and S. Kamkar. Autonomous nat traversal. In 10th IEEE International Conference on Peer-to-Peer Computing (IEEE P2P 2010), pages 61--64. IEEE, 2010.
    [46]
    A. Nambiar and M. Wright. Salsa: a structured approach to large-scale anonymity. In ACM CCS, 2006.
    [47]
    S. Nilizadeh, N. Alam, N. Husted, and A. Kapadia. Pythia: a privacy aware, peer-to-peer network for social search. In Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, WPES '11, pages 43--48, New York, NY, USA, 2011. ACM.
    [48]
    K. Opsahl. Facebook's eroding privacy policy: A timeline. https://www.eff.org/deeplinks/2010/04/facebook-timeline.
    [49]
    I. Osipkov, P. Wang, and N. Hopper. Robust accounting in decentralized {P2P} storage systems. In ICDCS, 2006.
    [50]
    J. A. Pouwelse, P. Garbacki, J. Wang, A. Bakker, J. Yang, A. Iosup, D. H. J. Epema, M. Reinders, M. R. van Steen, and H. J. Sips. TRIBLER: a social-based peer-to-peer system: Research articles. Concurr. Comput. : Pract. Exper., 20(2):127--138, 2008.
    [51]
    A. Rowstron and P. Druschel. Pastry: Scalable distributed object location and routing for large-scale peer-to-peer systems. In Middleware, 2001.
    [52]
    Skype. http://www.skype.com/.
    [53]
    E. Steel and J. E. Vascellaro. Facebook, MySpace confront privacy loophole. The Wall Street Journal, May 2010.
    [54]
    B. Viswanath, A. Mislove, M. Cha, and K. P. Gummadi. On the evolution of user interaction in Facebook. In Proceedings of the 2nd ACM SIGCOMM Workshop on Social Networks (WOSN'09), August 2009.
    [55]
    B. Viswanath, A. Post, K. P. Gummadi, and A. Mislove. An analysis of social network-based sybil defenses. In Proceedings of the ACM SIGCOMM 2010 conference, SIGCOMM '10, pages 363--374, New York, NY, USA, 2010. ACM.
    [56]
    C. Wang, L. Xiao, Y. Liu, and P. Zheng. Distributed caching and adaptive search in multilayer P2P networks. In Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'04), ICDCS '04. IEEE Computer Society, 2004.
    [57]
    Z. Xu and Y. Hu. SBARC: A supernode based peer-to-peer file sharing system. In Computers and Communication, 2003.(ISCC 2003). Proceedings. Eighth IEEE International Symposium on, pages 1053--1058. IEEE, 2003.
    [58]
    H. Zhang and S. Vasudevan. Design and analysis of a choking strategy for coalitions in data swarming systems. In INFOCOM, 2012.
    [59]
    J. Zhao, P. Zhang, and G. Cao. On cooperative caching in wireless P2P networks. In Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems, ICDCS '08. IEEE Computer Society, 2008.
    [60]
    R. Zhou and K. Hwang. Gossip-based reputation aggregation for unstructured peer-to-peer networks. Parallel and Distributed Processing Symposium, International, 0, 2007.

    Cited By

    View all
    • (2023)The Promise of Blockchain-Based Decentralized Social NetworksConcepts, Technologies, Challenges, and the Future of Web 310.4018/978-1-6684-9919-1.ch010(172-197)Online publication date: 20-Oct-2023
    • (2023)Identity-Based Key Management Scheme for Secure Discussion Group Establishment in DOSNsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.328671218(3706-3719)Online publication date: 2023
    • (2022)Image DePO: Towards Gradual Decentralization of Online Social Networks using Decentralized Privacy OverlaysProceedings of the ACM on Human-Computer Interaction10.1145/35129076:CSCW1(1-28)Online publication date: 7-Apr-2022
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CoNEXT '12: Proceedings of the 8th international conference on Emerging networking experiments and technologies
    December 2012
    384 pages
    ISBN:9781450317757
    DOI:10.1145/2413176
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 10 December 2012

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. caching
    2. peer-to-peer systems
    3. privacy
    4. social networking

    Qualifiers

    • Research-article

    Conference

    CoNEXT '12
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 198 of 789 submissions, 25%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)24
    • Downloads (Last 6 weeks)4
    Reflects downloads up to 11 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)The Promise of Blockchain-Based Decentralized Social NetworksConcepts, Technologies, Challenges, and the Future of Web 310.4018/978-1-6684-9919-1.ch010(172-197)Online publication date: 20-Oct-2023
    • (2023)Identity-Based Key Management Scheme for Secure Discussion Group Establishment in DOSNsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.328671218(3706-3719)Online publication date: 2023
    • (2022)Image DePO: Towards Gradual Decentralization of Online Social Networks using Decentralized Privacy OverlaysProceedings of the ACM on Human-Computer Interaction10.1145/35129076:CSCW1(1-28)Online publication date: 7-Apr-2022
    • (2022)Hierarchical and scalable peer-to-peer architecture for online social networkJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2021.04.00934:10(8623-8636)Online publication date: Nov-2022
    • (2022)Restricting data-leakage using fine-grained access control on OSN objectsInternational Journal of Information Security10.1007/s10207-022-00629-z22:1(93-106)Online publication date: 1-Nov-2022
    • (2022)A Socially-Aware, Privacy-Preserving, and Scalable Federated Learning Protocol for Distributed Online Social NetworksAdvanced Information Networking and Applications10.1007/978-3-030-99587-4_17(192-203)Online publication date: 31-Mar-2022
    • (2021)Human rights in the digital age: Challenges, threats and prospectsJournal of the National Academy of Legal Sciences of Ukraine10.37635/jnalsu.28(1).2021.15-2328:1(15-23)Online publication date: 24-Mar-2021
    • (2021)P2PCFJournal of High Speed Networks10.3233/JHS-21064927:1(13-31)Online publication date: 29-Mar-2021
    • (2021)Secure Resource Sharing on Hyperledger Fabric based on CP-ABEProceedings of the 2021 3rd International Conference on Blockchain Technology10.1145/3460537.3460541(203-209)Online publication date: 26-Mar-2021
    • (2021)Data Analysis in Social Network: A Case StudyTransactions on Large-Scale Data- and Knowledge-Centered Systems XLVII10.1007/978-3-662-62919-2_5(112-136)Online publication date: 17-Jan-2021
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media