Abstract
On today’s online social networks (OSNs), users need to reveal their content and their sharing patterns to a central provider. Though there are proposals for decentralized OSNs to protect user privacy, they have paid scant attention to optimizing the cost borne by users or hiding their sharing patterns. In this paper, we present Hermes, a decentralized OSN architecture, designed explicitly with the goal of hiding sharing patterns while minimizing users’ costs. In doing so, Hermes tackles three key challenges: 1) it enables timely and consistent sharing of content, 2) it guarantees the confidentiality of posted private content, and 3) it hides sharing patterns from untrusted cloud service providers and users outside a private group. With extensive analyses of Hermes using traces of shared content on Facebook, we estimate that the cost borne per user will be less than $5 per month for over 90% of users. Our prototype implementation of Hermes demonstrates that it only adds minimal overhead to content sharing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Amazon EC2 micro-instance. amzn.to/14fxKbM
Amazon S3 pricing. amzn.to/1dRGFuz
Anatomy of Facebook. on.fb.me/1az2axi
The Diaspora project. diasporaproject.org/
Facebook fixes security glitch after leak of Mark Zuckerberg photos. lat.ms/14fx4mC
Facebook says it fixed leak that opened info to third-parties. wapo.st/12UidOW
Google App Engine. bit.ly/117kPXo
Google App Engine Pricing. bit.ly/1cclPzm
Heroku. www.heroku.com/
OAuth. oauth.net/
Recommended elliptic curves for federal government use. 1.usa.gov/14fwPYI
Some quitting Facebook as privacy concerns escalate. bit.ly/15pqQmK
Syme. getsyme.com
Your Facebook friends have more friends than you. wapo.st/11I58Mj
Baden, R., Bender, A., Spring, N., Bhattacharjee, B., Starin, D.: Persona: an online socialnetwork with user-defined privacy. In: SIGCOMM 2009 (2009)
Beato, F., Kohlweiss, M., Wouters, K.: Scramble! your social network data. In: Fischer-Hübner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 211–255. Springer, Heidelberg (2011)
Bernstein, M.S., Bakshy, E., Burke, M., Karrer, B.: Quantifying the invisible audience insocial networks. In: CHI 2013 (2013)
Danezis, G., Serjantov, A.: Statistical disclosure or intersection attacks on anonymity systems. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 293–308. Springer, Heidelberg (2005)
Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Security 2004 (2004)
Dunbar, R.: The ultimate brain teaser. bit.ly/17Floky
Feldman, A.J., Blankstein, A., Freedman, M.J., Felten, E.W.: Social networking with frientegrity: privacy and integrity with an untrusted provider. In: Security 2012 (2012)
Feldman, A.J., Zeller, W.P., Freedman, M.J., Felten, E.W.: Sporc: group collaboration usinguntrusted cloud resources. In: OSDI 2010 (2010)
Guha, S., Tang, K., Francis, P.: Noyb: privacy in online social networks. In: WOSN 2008 (2008)
Jahid, S., Nilizadeh, S., Mittal, P., Borisov, N., Kapadia, A.: DECENT: a decentralized architecture for enforcing privacy in online social networks. In: IEEE SESOC 2012 (2012)
Koblitz, N., Menezes, A., Vanstone, S.: The state of elliptic curve cryptography. Designs, Codes and Cryptography (2000)
Lamport, L.: Time, clocks, and the ordering of events in a distributed system. Commun. ACM (1978)
Liu, D., Shakimov, A., Cáceres, R., Varshavsky, A., Cox, L.P.: Confidant: protecting OSN data without locking it up. In: Kon, F., Kermarrec, A.-M. (eds.) Middleware 2011. LNCS, pp. 61–80. Springer, Heidelberg (2011)
Peterson, L., Anderson, T., Culler, D., Roscoe, T.: A blueprint for introducing disruptivetechnology into the internet. In: HotNets 2002 (2002)
Shakimov, A., Lim, H., Caceres, R., Cox, L., Li, K., Liu, D., Varshavsky, A.: Vis-a-vis: privacy-preserving online social networking via virtual individual servers. In: COMSNETS 2011 (2011)
Stefanov, E., Shi, E., Song, D.X.: Towards practical oblivious ram. In: NDSS 2012 (2012)
Sweeney, L.: K-anonymity: A model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. (2002)
Urban, B., Tiefenbeck, V., Roth, K.: Energy consumption of consumer electronics in US homes in 2010. bit.ly/10NMqOn
Zhang, L., Mislove, A.: Building confederated web-based services with priv.io. In: COSN 2013, New York, NY, USA (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Singh, I., Akhoondi, M., Arslan, M.Y., Madhyastha, H.V., Krishnamurthy, S.V. (2015). Resource Efficient Privacy Preservation of Online Social Media Conversations. In: Thuraisingham, B., Wang, X., Yegneswaran, V. (eds) Security and Privacy in Communication Networks. SecureComm 2015. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 164. Springer, Cham. https://doi.org/10.1007/978-3-319-28865-9_13
Download citation
DOI: https://doi.org/10.1007/978-3-319-28865-9_13
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-28864-2
Online ISBN: 978-3-319-28865-9
eBook Packages: Computer ScienceComputer Science (R0)