Proceedings of the 2nd ACM Workshop on Online Social Networks 2009
DOI: 10.1145/1592665.1592667
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-enabling social networking over untrusted networks

Abstract: Current social networks require users to place absolute faith in their operators, and the inability of operators to protect users from malicious agents has led to sensitive private information being made public. We propose an architecture for social networking that protects users' social information from both the operator and other network users. This architecture builds a social network out of smart clients and an untrusted central server in a way that removes the need for faith in network operators and gives… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
35
0

Year Published

2010
2010
2016
2016

Publication Types

Select...
5
3
2

Relationship

2
8

Authors

Journals

citations
Cited by 59 publications
(35 citation statements)
references
References 12 publications
0
35
0
Order By: Relevance
“…Vulnerabilities and implementation problems have been reported in the SDKs of OSNs [115], and security APIs have been proposed for OSNs [116]. Anderson et al focus on privacy in OSNs in general [117], Tarameshloo et al propose specific privacy policies for information sharing in OSNs [118], which is similar to our work on permission agreements (app-rights), and Ko et al also do research on this subject by studying the flows of private data between third-party applications and sites they connect to [119]. In a broader sense, Birrell and Schneider [64] have compared both existing and deprecated SSO solutions from a privacy perspective, similarly to our early work on authentication solutions.…”
Section: Factors In Third-party Authenticationmentioning
confidence: 99%
“…Vulnerabilities and implementation problems have been reported in the SDKs of OSNs [115], and security APIs have been proposed for OSNs [116]. Anderson et al focus on privacy in OSNs in general [117], Tarameshloo et al propose specific privacy policies for information sharing in OSNs [118], which is similar to our work on permission agreements (app-rights), and Ko et al also do research on this subject by studying the flows of private data between third-party applications and sites they connect to [119]. In a broader sense, Birrell and Schneider [64] have compared both existing and deprecated SSO solutions from a privacy perspective, similarly to our early work on authentication solutions.…”
Section: Factors In Third-party Authenticationmentioning
confidence: 99%
“…Other solutions require more radical changes to the system architecture while still relying on a centralized server for storing the data and guaranteeing its availability. In the proposal by Anderson et al [2] the central server is reduced to a data store to which users upload blocks of encrypted data containing their posts, pictures, friend lists, etc. As in the two previous examples, only authorized friends (who have the necessary decryption keys) are able to access the data.…”
Section: A Privacy As Protection From Surveillance and Interferencementioning
confidence: 99%
“…A similar approach is described in [29], where authors propose a client-server model with untrusted server as a privacy-aware OSN architecture. In this work, the server is used as a public storage without any access control policy (it offers only simple put and get primitives).…”
Section: Privacy Solutions For Centralized Osnsmentioning
confidence: 99%