Abstract
Online Social Networks (OSNs) have gained enormous popularity in recent years. They provide a dynamic platform for sharing content (text messages or multimedia) and for facilitating communication between friends and acquaintances. Microblogging services are a popular form of OSNs. They allow sending small messages in a one-to-many messaging model so that users can communicate with their favorite celebrity, brand, politician, or other regular users without the obligation of a pre-existing social relationship. A chain of privacy-related scandals linked to questionable data handling practices in microblogging services has arisen in the last past few years. Most current microblogging service providers offer centralized services and their business model is based on monitoring, analyzing, and selling users’ activity and patterns. In the end, the personal information shared by the users to benefit from the free-of-charge services is used for the underlying payment in such systems. In this paper, we present Garlanet, a privacy-aware censorship-resistant microblogging social network that does not rely on a centralized service provider as all data is hosted in computers voluntarily contributed by the users of the system. Garlanet provides microblogging functionalities while protecting privacy and preserving the confidentiality and integrity of users and data. It ensures that users’ identities and their social graphs are hidden from the system and adversaries and it provides availability and scalability of the services. We also evaluate the privacy level of Garlanet and we compare it with the privacy level of eight other microblogging systems.
- [1] . 2015. Measuring the degree of corporate social media use. International Journal of Market Research 57, 2 (2015), 257–275. Google Scholar
Cross Ref
- [2] . 2017. Sybil defense techniques in online social networks: A survey. IEEE Access 5 (2017), 1200–1219. Google Scholar
Cross Ref
- [3] . 2007. Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication 13, 1 (2007), 210–230.Google Scholar
Digital Library
- [4] . 2009. PeerSoN: P2P social networking: Early experiences and insights. In Proceedings of the Second ACM EuroSys Workshop on Social Network Systems (SNS’09). ACM, Nuremberg, Germany, 46–52. Google Scholar
Digital Library
- [5] . 2010. Security and privacy in online social networks. In Handbook of Social Network Technologies and Applications. Springer, 497–522.Google Scholar
Cross Ref
- [6] . 2011. Safebook: A distributed privacy preserving online social network. In 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks. IEEE, Lucca, Italy, 1–3. Google Scholar
Digital Library
- [7] . 2009. Safebook: A privacy-preserving online social network leveraging on real-life trust. IEEE Communications Magazine 47, 12 (
Dec. 2009), 94–101. Google ScholarDigital Library
- [8] . 2009. Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network. In 2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks Workshops. IEEE, Kos, Greece, 1–6. Google Scholar
Cross Ref
- [9] . 2016. Anonymous Publish-Subscribe Overlays. Ph.D. Dissertation. Darmstadt, Technische Universität Darmstadt, Darmstadt, Germany.Google Scholar
- [10] . 2014. Twitterize: Anonymous micro-blogging. In 2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA). IEEE, Doha, Qatar, 817–823. Google Scholar
Cross Ref
- [11] . 2012. Hummingbird: Privacy at the time of Twitter. In 2012 IEEE Symposium on Security and Privacy. IEEE, San Francisco, California, USA, 285–299. Google Scholar
Digital Library
- [12] . 2012. Tweeting with Hummingbird: Privacy in large-scale micro-blogging OSNs. IEEE Data Eng. Bull. 35, 4 (2012), 93–100.Google Scholar
- [13] . 1987. Epidemic algorithms for replicated database maintenance. In Proceedings of the Sixth Annual ACM Symposium on Principles of Distributed Computing. Association for Computing Machinery, New York, NY, USA, 1–12.Google Scholar
Digital Library
- [14] . 2014. Detection and prevention of profile cloning in online social networks. In International Conference on Recent Advances and Innovations in Engineering (ICRAIE’14). 1–5. Google Scholar
Cross Ref
- [15] . 2013. Twister-a P2P microblogging platform.
arXiv:1312.7152 Google Scholar - [16] . 2016. Twister: The development of a peer-to-peer microblogging platform. International Journal of Parallel Emergent and Distributed Systems 31, 1 (
Jan. 2016), 20–33. Google ScholarCross Ref
- [17] 2018. Retrieved April 30, 2019 from http://gab.com.Google Scholar
- [18] . 2013. How does Twitter make money? Retrieved June 10, 2019 from http://www.bbc.com/news/business-24397472.w.Google Scholar
- [19] . 2018. Retrieved September 10, 2018 from https://gnu.io/social/.Google Scholar
- [20] . 2012. Citizens’ perceptions of data protection and privacy in Europe. Computer Law & Security Review 28, 3 (2012), 263–272.Google Scholar
Cross Ref
- [21] . 2017. Psychopolitics: Neoliberalism and New Technologies of Power. Verso Books, Brooklyn, NY, USA.Google Scholar
Cross Ref
- [22] . [n.d.]. Internet Crime Schemes. https://www.ic3.gov/crimeschemes.aspx#item-9Google Scholar
- [23] . 2007. Why we Twitter: Understanding microblogging usage and communities. In Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 Workshop on Web Mining and Social Network Analysis (WebKDD/SNA-KDD’07). ACM, San Jose, California, 56–65. Google Scholar
Digital Library
- [24] . 2018. Retrieved August 20, 2018 from https://www.joindiaspora.com/.Google Scholar
- [25] . 2010. What is Twitter, a social network or a news media?. In Proceedings of the 19th International Conference on World Wide Web (WWW’10). ACM, Raleigh, North Carolina, USA, 591–600. Google Scholar
Digital Library
- [26] . 2020. https://en.wikipedia.org/wiki/Mastodon_(software).Google Scholar
- [27] . 2018. Retrieved April 30, 2019 from https://joindiaspora.com/posts/2fdcda606b2c0133cd8b2adb80a2c223.Google Scholar
- [28] . 2019. Towards Assessing Information Privacy in Microblogging Online Social Networks. The IPAM Framework. Ph.D. Dissertation. Universitat Oberta de Catalunya.Google Scholar
- [29] . 2019. IPAM: Information privacy assessment metric in microblogging online social networks. IEEE Access 7 (2019), 114817–114836.Google Scholar
Cross Ref
- [30] . 2019. Privacy analysis on microblogging online social networks: A survey. ACM Computing Surveys (CSUR) 52, 3 (2019), 60.Google Scholar
- [31] . 2018. Multi criteria biased randomized method for resource allocation in distributed systems: Application in a volunteer computing system. Future Generation Computer Systems 82 (2018), 29–40.Google Scholar
Cross Ref
- [32] . 2010. Megaphone: Fault tolerant, scalable, and trustworthy P2P microblogging. In 2010 Fifth International Conference on Internet and Web Applications and Services. IEEE, Barcelona, Spain, 469–477. Google Scholar
Digital Library
- [33] . 2018. Retrieved April 30, 2019 from http://pump.io/.Google Scholar
- [34] . 2020. How the biggest decentralized social network is dealing with its Nazi problem. https://www.theverge.com/2019/7/12/20691957/mastodon-decentralized-social-network-gab-migration-fediverse-app-blocking.Google Scholar
- [35] . 2020. The number of tweets per day in 2019 | David Sayce. https://www.dsayce.com/social-media/tweets-day/.Google Scholar
- [36] . 2016. Simulating and optimizing resource allocation in a micro-blogging applicacion. In 2016 Winter Simulation Conference (WSC). IEEE Press, Arlington, Virginia, 3167–3176.Google Scholar
Digital Library
- [37] . 2013. Twitsper: Tweeting privately. IEEE Security Privacy 11, 3 (
5 2013), 46–50. Google ScholarDigital Library
- [38] . 2020. Most popular social networks worldwide as of April 2020, ranked by number of active users(in millions). https://www.statista.com/statistics/272014/global-social-networks-ranked-by-number-of-users/.Google Scholar
- [39] . 2019. Facebook, Instagram and WhatsApp suffer outages in Americas and Europe. Retrieved June 10, 2019 from https://www.theguardian.com/technology/2019/mar/13/facebook-outages-americas-europe-instagram-whatsapp.Google Scholar
- [40] . 2019. 1.2 billion people exposed in data leak includes personal info, LinkedIN, Facebook. https://www.dataviper.io/blog/2019/pdl-data-exposure-billion-people/.Google Scholar
- [41] 2018. Retrieved April 30, 2019 from http://twister.net.co/.Google Scholar
- [42] . 2019. Retrieved April 25, 2019 from https://twitter.com/.Google Scholar
- [43] . 2009. Eventually consistent. Commun. ACM 52, 1 (2009), 40–44.Google Scholar
Digital Library
- [44] . 2012. Privacy in Social Networks. Morgan & Claypool Publishers.Google Scholar
Digital Library
Index Terms
From False-Free to Privacy-Oriented Communitarian Microblogging Social Networks
Recommendations
Privacy and Security Concern of Online Social Networks from User Perspective
ICISSP 2015: Proceedings of the 1st International Conference on Information Systems Security and PrivacyPersonal data sharing has emerged as a popular
activity on online social networks such as Facebook, Google+,
Twitter. As a result, privacy issues have received significant
attention in both the research literature and the mainstream
media. In this study,...
Can Friends Be Trusted? Exploring Privacy in Online Social Networks
ASONAM '09: Proceedings of the 2009 International Conference on Advances in Social Network Analysis and MiningIn this paper, we present a case study describing the privacy and trust that exist within a small population of online social network users. We begin by formally characterizing different graphs in social network sites like Facebook. We then determine ...
Privacy Protection Based Privacy Conflict Detection and Solution in Online Social Networks
Proceedings of the Second International Conference on Human Aspects of Information Security, Privacy, and Trust - Volume 8533Online Social Networks (OSNs) such as Facebook, Twitter, and so on recently are major impact in communication and social interaction. Users can share any information with others. However, they have concerns about losing privacy due to lack of an ...






Comments