2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing 2012
DOI: 10.1109/socialcom-passat.2012.42
|View full text |Cite
|
Sign up to set email alerts
|

Vegas -- A Secure and Privacy-Preserving Peer-to-Peer Online Social Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(16 citation statements)
references
References 11 publications
0
16
0
Order By: Relevance
“…External resources are used to cope with the situations in which the users cannot deliver the service by themselves. Vis-à-Vis [22], Vegas [23], and SuperNova [24] are only three examples of approaches in which cloud services are used.…”
Section: Decentralized Online Social Networkmentioning
confidence: 99%
“…External resources are used to cope with the situations in which the users cannot deliver the service by themselves. Vis-à-Vis [22], Vegas [23], and SuperNova [24] are only three examples of approaches in which cloud services are used.…”
Section: Decentralized Online Social Networkmentioning
confidence: 99%
“…Vegas [234] was designed as a secure OSN that limits the access to a user's social graph to the ego network only. It ensures that users have full control over who can access their personal profile and published content by enforcing strong trust relationships that are mapped to the real world.…”
Section: Vegasmentioning
confidence: 99%
“…Cachet [27], PeerSon [8], Safebook [9], and LifeSocial [13] build a peer-to-peer (p2p) system where peers are not necessarily trusted. Polaris [36], My3 [25] and Vegas [11] build a p2p network among friends to replicate data. Confidant [20], Tent [4], and Vis-a-Vis [31] build a distributed platform by building a protocol among servers that process user data.…”
Section: Related Workmentioning
confidence: 99%
“…Additionally, OSNs have predictive capabilities about the users as they continuously gather user data. Researchers have tried to address privacy concerns by user-based key management [6,12,14,34], peer-to-peer architectures [8,9,11,13,25,27,32,36], or decentralized platforms [1,3,20,30,31,33,35,38]. In general, peer-to-peer OSN architectures suffer from inefficiency due to high churn rate of users.…”
Section: Introductionmentioning
confidence: 99%