“…However, each of these systems suffers from multiple shortcomings, including (i) limited success in providing high data availability [7,9,[11][12][13]; (ii) discrimination of users based on their dependency on other nodes [6,7,[11][12][13]; (iii) dependency on powerful nodes [4][5][6][7]; (iv) high overhead [10][11][12][13]; (v) low adaptivity to OSN dynamics [4,[6][7][8][9][10][11][12][13]; (vi) susceptibility to adversaries [4,6,7,[9][10][11][12][13]; (vii) a lack of data encryption [4,7,9]; (viii) non-consideration of mobile users [6,7,[9][10][11][12][13]; and (ix) technical feasibility and economical deployability issues [5,6,8,…”