DocumentCode :
2778032
Title :
Encryption for Peer-to-Peer Social Networks
Author :
Bodriagov, Oleksandr ; Buchegger, Sonja
Author_Institution :
Sch. of Comput. Sci. & Commun., KTH-The R. Inst. of Technol., Stockholm, Sweden
fYear :
2011
fDate :
9-11 Oct. 2011
Firstpage :
1302
Lastpage :
1309
Abstract :
To address privacy concerns over online social networking services, several distributed alternatives have been proposed. These peer-to-peer (P2P) online social networks do not rely on centralized storage of user data. Instead, data can be stored not only on a computer of a profile owner but almost anywhere (friends´ computers, random peers from the social network, third-party external storage, etc.). Since the external storage is often untrusted or only semi-trusted, encryption plays a fundamental role in security of P2P social networks. Encryption, however, also adds some overhead in both the time and space domains. To be scalable, a system that relies heavily on encryption should use as efficient algorithms as possible. It also needs to provide the functionality of changing access rights at reasonable cost, and, crucially, the system should preserve privacy properties itself. That is, beyond user data confidentiality, it has to protect against information leakage about users´ access rights and traffic analysis. In this paper we explore the requirements of encryption for P2P social networks in detail and propose a list of criteria for evaluation. We then compare a set of approaches from the literature according to these criteria. We find that none of the current P2P architectures for social networks manages to achieve secure, efficient, 24/7 access control enforcement and data storage. They either rely on trust, require constantly running servers for each user, use expensive encryption, or fail to protect privacy of access information. In the search for a solution that better fulfills the criteria, we found that some broadcast encryption (BE) schemes exhibit several desirable properties. We thus propose to use BE schemes with high performance encryption/decryption regardless of the number of identities/groups for an efficient encryption-based access control in the P2P environment. We define relevant properties for the BE schemes to be used in the P2P social netw- rk scenario and describe advantages that such schemes have compared to encryption techniques used in existing P2P architectures.
Keywords :
Internet; authorisation; cryptography; data privacy; peer-to-peer computing; social networking (online); telecommunication traffic; P2P architecture; P2P environment; P2P online social network; access rights; broadcast encryption; decryption; encryption-based access control; external storage; information leakage; online social networking service; peer-to-peer online social network; privacy concern; traffic analysis; user data confidentiality; Access control; Encryption; Privacy; Public key; Receivers; Social network services; cryptography; peer-to-peer; privacy; social networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference on Social Computing (SocialCom), 2011 IEEE Third International Conference on
Conference_Location :
Boston, MA
Print_ISBN :
978-1-4577-1931-8
Type :
conf
DOI :
10.1109/PASSAT/SocialCom.2011.158
Filename :
6113300
Link To Document :
بازگشت