2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks &Amp; Workshops 2009
DOI: 10.1109/wowmom.2009.5282446
|View full text |Cite
|
Sign up to set email alerts
|

Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network

Abstract: International audienc

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 59 publications
(29 citation statements)
references
References 4 publications
0
29
0
Order By: Relevance
“…Regarding the issue above, it has proposed the anonymous ID and one failure in network transmission in paper [12][13][14], this method can ensure that even if an attacker intercepts an anonymous ID, it can't attack social network. Aimed at the problem which once the attacker intercepts a part of user information, it is possible to analyze the corresponding one or more user's problem, the paper [12] designed a user privacy protection scheme based on the model with K-Anonymity [14]. The scheme has determined the minimum user information combination number by setting privacy strength coefficient.…”
Section: Identifier Anonymity Protection Technologymentioning
confidence: 99%
“…Regarding the issue above, it has proposed the anonymous ID and one failure in network transmission in paper [12][13][14], this method can ensure that even if an attacker intercepts an anonymous ID, it can't attack social network. Aimed at the problem which once the attacker intercepts a part of user information, it is possible to analyze the corresponding one or more user's problem, the paper [12] designed a user privacy protection scheme based on the model with K-Anonymity [14]. The scheme has determined the minimum user information combination number by setting privacy strength coefficient.…”
Section: Identifier Anonymity Protection Technologymentioning
confidence: 99%
“…Cachet [27], PeerSon [8], Safebook [9], and LifeSocial [13] build a peer-to-peer (p2p) system where peers are not necessarily trusted. Polaris [36], My3 [25] and Vegas [11] build a p2p network among friends to replicate data.…”
Section: Related Workmentioning
confidence: 99%
“…Additionally, OSNs have predictive capabilities about the users as they continuously gather user data. Researchers have tried to address privacy concerns by user-based key management [6,12,14,34], peer-to-peer architectures [8,9,11,13,25,27,32,36], or decentralized platforms [1,3,20,30,31,33,35,38]. In general, peer-to-peer OSN architectures suffer from inefficiency due to high churn rate of users.…”
Section: Introductionmentioning
confidence: 99%
“…The Safebook 2 p2p OSN [17,18,19] focuses on resource availability as well as content privacy and end-to-end communications confidentiality. It combines a DHT with another p2p network called Matryoshka.…”
Section: Peer-to-peer Osnsmentioning
confidence: 99%