메뉴 건너뛰기




Volumn 75, Issue PartA, 2014, Pages 437-452

A survey on decentralized Online Social Networks

Author keywords

Distributed Online Social Network (DOSN); Online Social Network (OSN); Privacy

Indexed keywords

ACCESS CONTROL; DATA PRIVACY; DIGITAL STORAGE; NETWORK ARCHITECTURE; ONLINE SYSTEMS; SURVEYS;

EID: 84918819364     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2014.10.005     Document Type: Short Survey
Times cited : (69)

References (54)
  • 5
    • 81255134469 scopus 로고    scopus 로고
    • Lotusnet: Tunable privacy for distributed online social network services
    • Luca Maria Aiello, and Giancarlo Ruffo Lotusnet: tunable privacy for distributed online social network services Comput. Commun. 35 1 2012 75 88
    • (2012) Comput. Commun. , vol.35 , Issue.1 , pp. 75-88
    • Aiello, L.M.1    Ruffo, G.2
  • 8
    • 84865489890 scopus 로고    scopus 로고
    • P2p social networks with broadcast encryption protected privacy
    • Springer
    • Oleksandr Bodriagov, and Sonja Buchegger P2p social networks with broadcast encryption protected privacy Privacy and Identity Management for Life 2012 Springer 197 206
    • (2012) Privacy and Identity Management for Life , pp. 197-206
    • Bodriagov, O.1    Buchegger, S.2
  • 9
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • Lecture Notes in Computer Science Springer Berlin Heidelberg
    • Dan Boneh, Xavier Boyen, and Eu-Jin Goh Hierarchical identity based encryption with constant size ciphertext Advances in Cryptology EUROCRYPT 2005 Lecture Notes in Computer Science vol. 3494 2005 Springer Berlin Heidelberg 440 456
    • (2005) Advances in Cryptology EUROCRYPT 2005 , vol.3494 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.-J.3
  • 11
    • 42149149254 scopus 로고    scopus 로고
    • I tube, you tube, everybody tubes: Analyzing the world's largest user generated content video system
    • ACM
    • Meeyoung Cha, Haewoon Kwak, Pablo Rodriguez, Yong-Yeol Ahn, and Sue Moon I tube, you tube, everybody tubes: analyzing the world's largest user generated content video system IMC 2007 ACM
    • (2007) IMC
    • Cha, M.1    Kwak, H.2    Rodriguez, P.3    Ahn, Y.-Y.4    Moon, S.5
  • 13
    • 72949088489 scopus 로고    scopus 로고
    • Safebook: A privacy preserving online social network leveraging on real-life trust
    • A. Cutillo, R. Molva, and T. Strufe Safebook: a privacy preserving online social network leveraging on real-life trust IEEE Commun. Mag. 2009
    • (2009) IEEE Commun. Mag.
    • Cutillo, A.1    Molva, R.2    Strufe, T.3
  • 15
    • 57949110628 scopus 로고    scopus 로고
    • Identity-based broadcast encryption with constant size ciphertexts and private keys
    • Ccile Delerable, Identity-based broadcast encryption with constant size ciphertexts and private keys, in: Advances in Cryptology ASIACRYPT, 2007.
    • (2007) Advances in Cryptology ASIACRYPT
    • Delerable, C.1
  • 19
    • 84870159064 scopus 로고    scopus 로고
    • Trust and privacy concern within social networking sites: A comparison of facebook and myspace
    • Catherine Dwyer, Starr Roxanne Hiltz, Katia Passerini, Trust and privacy concern within social networking sites: a comparison of facebook and myspace, in: AMCIS, 2007.
    • (2007) AMCIS
    • Dwyer, C.1    Roxanne Hiltz, S.2    Passerini, K.3
  • 21
    • 84918774529 scopus 로고    scopus 로고
    • Mantle: A novel dosn leveraging free storage and local software
    • Antonino Famulari, Artur Hecker, Mantle: a novel dosn leveraging free storage and local software, in: ICAIT, 2012.
    • (2012) ICAIT
    • Famulari, A.1    Hecker, A.2
  • 23
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine-grained access control of encrypted data
    • Vipul Goyal, Omkant Pandey, Amit Sahai, Brent waters, Attribute-based encryption for fine-grained access control of encrypted data, in: CCS, 2006.
    • (2006) CCS
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 25
    • 84918828006 scopus 로고    scopus 로고
    • Friendly surveillance - A new adversary model for privacy in decentralized online social etworks
    • Benjamin Greschbach, Sonja Buchegger, Friendly surveillance - a new adversary model for privacy in decentralized online social etworks, in: Current Issues in IT Security, 2012, pp. 195-206.
    • (2012) Current Issues in IT Security , pp. 195-206
    • Greschbach, B.1    Buchegger, S.2
  • 26
    • 84861539737 scopus 로고    scopus 로고
    • The devil is in the metadata - New privacy challenges in decentralised online social networks
    • Benjamin Greschbach, Gunnar Kreitz, Sonja Buchegger, The devil is in the metadata - new privacy challenges in decentralised online social networks, in: SESOC (PERCOM Workshops), 2012.
    • (2012) SESOC (PERCOM Workshops)
    • Greschbach, B.1    Kreitz, G.2    Buchegger, S.3
  • 29
    • 79956030125 scopus 로고    scopus 로고
    • EASiER: Encryption-based access control in social networks with efficient revocation
    • Sonia Jahid, P Mittal, Nikita Borisov, EASiER: encryption-based access control in social networks with efficient revocation, in: ASIACCS, 2011.
    • (2011) ASIACCS
    • Jahid, S.1    Mittal, P.2    Borisov, N.3
  • 36
    • 84872002349 scopus 로고    scopus 로고
    • Cachet: A decentralized architecture for privacy preserving social networking with caching
    • Shirin Nilizadeh, Sonia Jahid, Prateek Mittal, Nikita Borisov, Apu Kapadia, Cachet: a decentralized architecture for privacy preserving social networking with caching, in: CoNEXT, 2012.
    • (2012) CoNEXT
    • Nilizadeh, S.1    Jahid, S.2    Mittal, P.3    Borisov, N.4    Kapadia, A.5
  • 38
    • 84871348269 scopus 로고    scopus 로고
    • Exploring decentralization dimensions of social network services: Adversaries and availability
    • Thomas Paul, Benjamin Greschbach, Sonja Buchegger, Thorsten Strufe, Exploring decentralization dimensions of social network services: adversaries and availability, in: HotSoc (KDD Workshop), 2012.
    • (2012) HotSoc (KDD Workshop)
    • Paul, T.1    Greschbach, B.2    Buchegger, S.3    Strufe, T.4
  • 39
    • 84918785357 scopus 로고    scopus 로고
    • Public key distribution through "cryptoids"
    • T. Perrin, Public key distribution through "cryptoids", in: Workshop on New Security Paradigms, 2003, pp. 82-102.
    • (2003) Workshop on New Security Paradigms , pp. 82-102
    • Perrin, T.1
  • 40
    • 80052093338 scopus 로고    scopus 로고
    • Online social network with flexible and dynamic privacy policies
    • IEEE
    • Fatemeh Raji, Ali Miri, Mohammad Davarpanah Jazi, and Behzad Malek Online social network with flexible and dynamic privacy policies CSSE 2011 IEEE 135 142
    • (2011) CSSE , pp. 135-142
    • Raji, F.1    Miri, A.2    Jazi, M.D.3    Malek, B.4
  • 43
    • 84891367912 scopus 로고    scopus 로고
    • 2 deleting diaspora: Practical attacks for profile discovery and deletion
    • 2 deleting diaspora: practical attacks for profile discovery and deletion, in: ICC, 2013, pp. 2042-2046.
    • (2013) ICC , pp. 2042-2046
    • Schulz, S.1    Strufe, T.2
  • 44
    • 84893327963 scopus 로고    scopus 로고
    • Sonet-privacy and replication in federated online social networks
    • Springer
    • Lorenz Schwittmann, Christopher Boelmann, Matthaus Wander, and Torben Weis Sonet-privacy and replication in federated online social networks ICDCSW 2013 Springer 51 57
    • (2013) ICDCSW , pp. 51-57
    • Schwittmann, L.1    Boelmann, C.2    Wander, M.3    Weis, T.4
  • 48
    • 84858025733 scopus 로고    scopus 로고
    • Supernova: Super-peers based architecture for decentralized online social networks
    • IEEE
    • Rajesh Sharma, and Anwitaman Datta Supernova: super-peers based architecture for decentralized online social networks COMSNETS 2012 IEEE 1 10
    • (2012) COMSNETS , pp. 1-10
    • Sharma, R.1    Datta, A.2
  • 49
    • 80055005437 scopus 로고    scopus 로고
    • An empirical study of availability in friend-to-friend storage systems
    • IEEE
    • Rajesh Sharma, Anwitaman Datta, M. DeH'Amico, and Pietro Michiardi An empirical study of availability in friend-to-friend storage systems IEEE P2P 2011 IEEE 348 351
    • (2011) IEEE P2P , pp. 348-351
    • Sharma, R.1    Datta, A.2    Deh'Amico, M.3    Michiardi, P.4
  • 50
    • 34547453122 scopus 로고    scopus 로고
    • Understanding churn in peer-to-peer networks
    • ACM
    • Daniel Stutzbach, and Reza Rejaie Understanding churn in peer-to-peer networks IMC 2006 ACM 189 202
    • (2006) IMC , pp. 189-202
    • Stutzbach, D.1    Rejaie, R.2
  • 51
    • 77953298166 scopus 로고    scopus 로고
    • A privacy-preserving scheme for online social networks with efficient revocation
    • J. Sun, X. Zhu, Y. Fang, A privacy-preserving scheme for online social networks with efficient revocation, in: INFOCOM, 2010.
    • (2010) INFOCOM
    • Sun, J.1    Zhu, X.2    Fang, Y.3
  • 52
    • 84857206955 scopus 로고    scopus 로고
    • Gemstone: Empowering decentralized social networking with high data availability
    • IEEE
    • Florian Tegeler, David Koll, and Xiaoming Fu Gemstone: empowering decentralized social networking with high data availability GLOBECOM 2011 IEEE 1 6
    • (2011) GLOBECOM , pp. 1-6
    • Tegeler, F.1    Koll, D.2    Fu, X.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.