2015
DOI: 10.1007/978-3-319-18467-8_4
|View full text |Cite
|
Sign up to set email alerts
|

POSN: A Personal Online Social Network

Abstract: Abstract. A growing concern for end users of Online Social Networks (OSNs) is the privacy and control of user data due to the client-server architecture of the current ecosystems. In this paper, we introduce a privacy preserving decentralized OSN platform, which mimics real life social interactions. In particular, we decentralize the OSN platform and give direct control of the information to the user. The distributed platform removes central authorities from the OSN and users share their content only with inte… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 31 publications
0
4
0
Order By: Relevance
“…In contrast, our approach has a number of encryption operation, which is upper-bounded by the height of the LKH tree (h) and each node has only one symmetric key. Cachet employs [6] 0.00082 0.41066 0.41107 LotusNet [24] 0.16 0.16 160.0004 Cachet [8] 155 87 87 LifeSocial [7] 0 160.0004 160.0004 POSN [32] 0.16041 160 0.00082 Vegas [33] 0 160.0004 160.0004 DIBBE [11] ---DECLKH [34] 0.085595 0.02432 0.00082 encryption scheme based on ABE, where ecryption/decryption cost are quite expensive with respect standard symmetric encryption and it depends on the number of attributes [41].…”
Section: Related Work and Comparisonmentioning
confidence: 99%
See 1 more Smart Citation
“…In contrast, our approach has a number of encryption operation, which is upper-bounded by the height of the LKH tree (h) and each node has only one symmetric key. Cachet employs [6] 0.00082 0.41066 0.41107 LotusNet [24] 0.16 0.16 160.0004 Cachet [8] 155 87 87 LifeSocial [7] 0 160.0004 160.0004 POSN [32] 0.16041 160 0.00082 Vegas [33] 0 160.0004 160.0004 DIBBE [11] ---DECLKH [34] 0.085595 0.02432 0.00082 encryption scheme based on ABE, where ecryption/decryption cost are quite expensive with respect standard symmetric encryption and it depends on the number of attributes [41].…”
Section: Related Work and Comparisonmentioning
confidence: 99%
“…When access to a group is revoked, the affected user is removed from the access control list and the m contents will be encrypted with a new symmetric key which is securely distributed to the n current users of the group by using their public keys. Authors of [32] propose POSN: a DOSN exploiting the resources of the users' mobile devices and the storage clouds to distribute encrypted users' contents. Every user has an individual (RSA) public key, which is exchanged at the time Laura Ricci Laura Ricci is a Professor of the Department of Computer Science, University of Pisa where she has taught several courses in the area of Computer Networks.…”
mentioning
confidence: 99%
“…We begin our discussion with server-based solutions. These solutions typically assume that each user has a (web-)server-which can also be hosted in a cloud environment-available to store and retrieve her data [22][23][24][25][26][27][28][29], as shown in Figure 3. The approaches differ in that the servers can either be operated by users themselves, contributed in an altruistic fashion, or supplied by commercial providers.…”
Section: Server-based Solutionsmentioning
confidence: 99%
“…POSN [29]: As a more recent approach, POSN is similar to Vis-à-Vis. User data is stored exclusively on cloud services, while users mainly interact Figure 4: A decentralized OSN that exploits user cooperation replaces the cloud infrastructure with a distributed overlay (bottom layer).…”
Section: Commercial Cloud Storagementioning
confidence: 99%