140 likes | 265 Vues
This paper presents a decentralized architecture aimed at improving privacy for users in online social networks (OSNs). It addresses key challenges such as data confidentiality, user access controls, and the risks posed by both trusted and untrusted parties. The proposed design incorporates advanced cryptography and user-defined policies, allowing for efficient data management and access control. Through simulations and a working prototype, the research demonstrates how decentralized models can enhance user privacy while mitigating malicious activities. Preliminary results showcase the promise of this architecture in safeguarding online interactions.
E N D
DECENT: A Decentralized Architecture for Enforcing Privacy in Online Social Networks Sonia Jahid1, ShirinNilizadeh2, PrateekMittal1, Nikita Borisov1, Apu Kapadia2 1University of Illinois at Urbana-Champaign 2Indiana University Bloomington Presented by: Sonia Jahid SESOC, 2012
Myself Decentralization - Challenges • Hybrid • Trusted Party • Availability • Access control by others • Confidentiality/Integrity • Malicious activities • Untrusted Party • Provider • Existing Research • Diaspora* [http://joindiaspora.com] • LotusNet [Aiello et al. ’12] • SafeBook [Cutillo et al. ’09 ] • PeerSoN [Buchegger et al. ’09] • Persona [Baden et al. ’09] • DHT • Cryptography
OSN Data is complicated Wall Status Video Link Comment
Our Contribution • Address the challenges • Decentralization of the OSN architecture • Advanced cryptography • Other design philosophes
Design – Data Structure Alice’s Status Status Message Friend or Family Alice|Friend & Family ID, Read-Policy, Write-Policy CommentReference Bob’s Comment
Design – Privacy Policy Alice • Restrictive Policy on comments Alice Bob StatusReference1
Design - DHT • Provides • Storage/Lookup Operation • Availability • Append Operation • Verifies • Write policy • Append policy • Can not • Relate data to its owner • Figure out data owner’s social graph
OR AND Colleague 1 Friend Neighbor Design – Confidentiality and Integrity • Attribute-based Encryption • User-defined attribute-based policy • Frequent revocation Alice Carol Diana Bob friend, colleague colleague friend, neighbor S.Jahid, P.Mittal, N.Borisov, EASiER: Encryption-based Access Control in Social Networks with Efficient Revocation
Design – Confidentiality and Integrity Integrity • Write Policy – set to the owner • Request signed with Write-Secret-Key • Verified by readers • Append Policy – attribute-based • Comment-reference signed with Append-Secret-Key • Verified by readers Confidentiality • ABE Alice’s Object Write-Public-Key Append-Public-Key EAlice(Write-Secret-Key) ABE ABE(Append-Secret-Key) Data Sign Sign(CommentRef1) Sign(CommentRef2)
Implementation and Evaluation • Prototype in Java • Simulation - FreePastry Simulator • Experiments on PlanetLab – Kademlia Cryptography Progressive Lookup Experiment on PlanetLab (12 Statuses) Simulation (60 Statuses)
Conclusion • Contribution • Design and prototype of a decentralized OSN • Preliminary performance results • Ongoing Work • Optimizations in cryptography and DHT Lookup ShirinNilizadeh Prateek Mittal ApuKapadia Nikita Borisov