decent a decentralized architecture for enforcing privacy in online social networks n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
DECENT: A Decentralized Architecture for Enforcing Privacy in Online Social Networks PowerPoint Presentation
Download Presentation
DECENT: A Decentralized Architecture for Enforcing Privacy in Online Social Networks

Loading in 2 Seconds...

play fullscreen
1 / 13

DECENT: A Decentralized Architecture for Enforcing Privacy in Online Social Networks - PowerPoint PPT Presentation


  • 69 Views
  • Uploaded on

DECENT: A Decentralized Architecture for Enforcing Privacy in Online Social Networks. Sonia Jahid 1 , Shirin Nilizadeh 2 , Prateek Mittal 1 , Nikita Borisov 1 , Apu Kapadia 2 1 University of Illinois at Urbana-Champaign 2 Indiana University Bloomington Presented by: Sonia Jahid

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'DECENT: A Decentralized Architecture for Enforcing Privacy in Online Social Networks' - thina


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
decent a decentralized architecture for enforcing privacy in online social networks

DECENT: A Decentralized Architecture for Enforcing Privacy in Online Social Networks

Sonia Jahid1, ShirinNilizadeh2, PrateekMittal1, Nikita Borisov1, Apu Kapadia2

1University of Illinois at Urbana-Champaign

2Indiana University Bloomington

Presented by: Sonia Jahid

SESOC, 2012

decentralization challenges

Myself

Decentralization - Challenges
  • Hybrid
  • Trusted Party
  • Availability
  • Access control by others
  • Confidentiality/Integrity
  • Malicious activities
  • Untrusted Party
  • Provider
  • Existing Research
    • Diaspora* [http://joindiaspora.com]
    • LotusNet [Aiello et al. ’12]
    • SafeBook [Cutillo et al. ’09 ]
    • PeerSoN [Buchegger et al. ’09]
    • Persona [Baden et al. ’09]
  • DHT
  • Cryptography
slide4

OSN Data is complicated

Wall

Status

Video

Link

Comment

our contribution
Our Contribution
  • Address the challenges
    • Decentralization of the OSN architecture
    • Advanced cryptography
    • Other design philosophes
design data structure
Design – Data Structure

Alice’s Status

Status Message

Friend or Family Alice|Friend & Family

ID, Read-Policy, Write-Policy

CommentReference

Bob’s Comment

design privacy policy
Design – Privacy Policy

Alice

  • Restrictive Policy on comments

Alice

Bob

StatusReference1

design dht
Design - DHT
  • Provides
    • Storage/Lookup Operation
    • Availability
    • Append Operation
  • Verifies
    • Write policy
    • Append policy
  • Can not
    • Relate data to its owner
    • Figure out data owner’s social graph
design confidentiality and integrity

OR

AND

Colleague

1

Friend

Neighbor

Design – Confidentiality and Integrity
  • Attribute-based Encryption
    • User-defined attribute-based policy
    • Frequent revocation

Alice

Carol

Diana

Bob

friend,

colleague

colleague

friend,

neighbor

S.Jahid, P.Mittal, N.Borisov, EASiER: Encryption-based Access Control in Social Networks with Efficient Revocation

design confidentiality and integrity1
Design – Confidentiality and Integrity

Integrity

  • Write Policy – set to the owner
    • Request signed with Write-Secret-Key
    • Verified by readers
  • Append Policy – attribute-based
    • Comment-reference signed with Append-Secret-Key
    • Verified by readers

Confidentiality

  • ABE

Alice’s Object

Write-Public-Key

Append-Public-Key

EAlice(Write-Secret-Key)

ABE

ABE(Append-Secret-Key)

Data

Sign

Sign(CommentRef1)

Sign(CommentRef2)

implementation and evaluation
Implementation and Evaluation
  • Prototype in Java
  • Simulation - FreePastry Simulator
  • Experiments on PlanetLab – Kademlia

Cryptography

Progressive Lookup

Experiment on PlanetLab (12 Statuses)

Simulation (60 Statuses)

conclusion
Conclusion
  • Contribution
    • Design and prototype of a decentralized OSN
    • Preliminary performance results
  • Ongoing Work
    • Optimizations in cryptography and DHT Lookup

ShirinNilizadeh

Prateek Mittal

ApuKapadia

Nikita Borisov