Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Friendly Surveillance: A New Adversary Model for Privacy in Decentralized Online Social Networks
KTH, School of Computer Science and Communication (CSC), Theoretical Computer Science, TCS.ORCID iD: 0000-0002-7102-8153
KTH, School of Computer Science and Communication (CSC), Theoretical Computer Science, TCS.ORCID iD: 0000-0001-5742-5462
2012 (English)In: Current Issues in IT Security 2012, 5th interdisciplinary Conference, Freiburg, Germany, May 08-10, 2012. Proceedings / [ed] Jochen Jähnke and Nicolas von zur Mühlen and Klaus Rechert and Dirk von Suchodoletz, Berlin, Germany: Duncker & Humblot, 2012, 195-206 p.Conference paper, Published paper (Refereed)
Abstract [en]

In pace with the ever increasing popularity of Social Network Services (SNS) the critical privacy flaws of these applications got into focus of media as well as research interest in the last decade. The centralized aggregation of personal user data has been identified as a fundamental problem of popular services such as Facebook or Google+.

To mitigate this shortcoming the concept of a Decentralized OnlineSocial Network (DOSN) has evolved, where users form a peer-to-peer (P2P) network to corporately operate the service. While this architectural shift immediately eliminates the threat of a central provider adversary, new challenges to protect the users’ privacy arise.

In this paper we focus on the friend adversary model – that is an attacker that exploits the social relationship status established to the target user. We examine the properties of a friend adversary in a decentralized system by analyzing its capabilities, attack impacts as well as incentives and compare the results to the centralized case. We identify several implementation issues of DOSNs that can alleviate illegitimate data collection for a friend adversary. Furthermore, background knowledge abouta user may complement this information to mount relevant and privacy invading attacks. We conclude that friend adversaries can be powerful attackers indeed and propose to consider this hitherto less emphasized threat for DOSN implementations.

Place, publisher, year, edition, pages
Berlin, Germany: Duncker & Humblot, 2012. 195-206 p.
National Category
Computer Science
Identifiers
URN: urn:nbn:se:kth:diva-96816ISBN: 978-3-86113-115-1 (print)ISBN: 978-3-428-13887-6 (print)OAI: oai:DiVA.org:kth-96816DiVA: diva2:532875
Conference
Current Issues in IT Security 2012, 5th interdisciplinary Conference, Freiburg, Germany, May 08-10, 2012.
Funder
ICT - The Next Generation
Note

QC 20130110

Available from: 2012-06-12 Created: 2012-06-12 Last updated: 2013-06-24Bibliographically approved

Open Access in DiVA

No full text

Authority records BETA

Greschbach, BenjaminBuchegger, Sonja

Search in DiVA

By author/editor
Greschbach, BenjaminBuchegger, Sonja
By organisation
Theoretical Computer Science, TCS
Computer Science

Search outside of DiVA

GoogleGoogle Scholar

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 162 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf