decent: a decentralized architecture for enforcing privacy in online social networks

13
DECENT: A Decentralized Architecture for Enforcing Privacy in Online Social Networks Sonia Jahid 1 , Shirin Nilizadeh 2 , Prateek Mittal 1 , Nikita Borisov 1 , Apu Kapadia 2 1 University of Illinois at Urbana-Champaign 2 Indiana University Bloomington Presented by: Sonia Jahid SESOC, 2012

Upload: thina

Post on 23-Feb-2016

19 views

Category:

Documents


0 download

DESCRIPTION

DECENT: A Decentralized Architecture for Enforcing Privacy in Online Social Networks. Sonia Jahid 1 , Shirin Nilizadeh 2 , Prateek Mittal 1 , Nikita Borisov 1 , Apu Kapadia 2 1 University of Illinois at Urbana-Champaign 2 Indiana University Bloomington Presented by: Sonia Jahid - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: DECENT: A Decentralized Architecture for Enforcing Privacy in Online Social Networks

DECENT: A Decentralized Architecture for Enforcing Privacy in Online Social

Networks

Sonia Jahid1, Shirin Nilizadeh2, Prateek Mittal1, Nikita Borisov1, Apu Kapadia2

1University of Illinois at Urbana-Champaign2Indiana University Bloomington

Presented by: Sonia JahidSESOC, 2012

Page 2: DECENT: A Decentralized Architecture for Enforcing Privacy in Online Social Networks

2

Privacy Issues

Page 3: DECENT: A Decentralized Architecture for Enforcing Privacy in Online Social Networks

3

Decentralization - Challenges

• Availability• Access control by others• Confidentiality/Integrity• Malicious activities

ProviderTrusted

Party

Myself

Hybrid

Untrusted Party

• Existing Research– Diaspora*

[http://joindiaspora.com]– LotusNet [Aiello et al. ’12]– SafeBook [Cutillo et al. ’09 ]– PeerSoN [Buchegger et al. ’09]– Persona [Baden et al. ’09]

• DHT

• Cryptography

Page 4: DECENT: A Decentralized Architecture for Enforcing Privacy in Online Social Networks

4

WallStatus

Comment

Video

Link

OSN Data is complicated

Page 5: DECENT: A Decentralized Architecture for Enforcing Privacy in Online Social Networks

5

Our Contribution

• Address the challenges– Decentralization of the OSN architecture

– Advanced cryptography

– Other design philosophes

Page 6: DECENT: A Decentralized Architecture for Enforcing Privacy in Online Social Networks

6

Design – Data Structure

Object

Data

Policy

ReferenceList

Status Message

Friend or Family Alice|Friend & Family

Object

Like!

Friend or Colleague|Bob|Friend

CommentReference

Alice’s Status

Bob’s Comment

Read

Write/Delete

Append

ID, Read-Policy, Write-Policy

Page 7: DECENT: A Decentralized Architecture for Enforcing Privacy in Online Social Networks

7

Design – Privacy Policy

• Restrictive Policy on comments

Status

DECENT rocks!

Friend and Family

CommentReference

Alice

Comment

Like!

Colleague or Neighbor

Bob

Wall

Policy

ReferenceList

Alice

StatusReference1

Page 8: DECENT: A Decentralized Architecture for Enforcing Privacy in Online Social Networks

8

Design - DHT• Provides

– Storage/Lookup Operation– Availability– Append Operation

• Verifies– Write policy– Append policy

• Can not– Relate data to its owner– Figure out data owner’s social graph

Page 9: DECENT: A Decentralized Architecture for Enforcing Privacy in Online Social Networks

9

Design – Confidentiality and Integrity

• Attribute-based Encryption– User-defined attribute-based policy– Frequent revocation

Bob Carol Diana

1 AND Colleague

Neighbor

OR

Friend

friend, neighbor

colleague friend,colleague

Alice

S.Jahid, P.Mittal, N.Borisov, EASiER: Encryption-based Access Control in Social Networks with Efficient Revocation

Page 10: DECENT: A Decentralized Architecture for Enforcing Privacy in Online Social Networks

10

Data

Design – Confidentiality and Integrity

Integrity• Write Policy – set to the owner

– Request signed with Write-Secret-Key– Verified by readers

• Append Policy – attribute-based– Comment-reference signed with Append-

Secret-Key– Verified by readers

Confidentiality• ABE

Write-Public-Key

Append-Public-Key

EAlice(Write-Secret-Key)

Alice’s Object

ABE(Append-Secret-Key)

Sign

ABE

Sign(CommentRef1)

Sign (CommentRef2)

Page 11: DECENT: A Decentralized Architecture for Enforcing Privacy in Online Social Networks

11

Implementation and Evaluation• Prototype in Java• Simulation - FreePastry Simulator• Experiments on PlanetLab – Kademlia

Simulation (60 Statuses) Experiment on PlanetLab (12 Statuses)

View Own Wall View Others’ Wall

View Newsfeed0

50100150200250300350400

Cryptography

Tim

e (s

ec)

View Own Wall View Others’ Wall

160

165

170

175

180

185

190

195

Cryptography

Tim

e (s

ec)

Cryptography

Progressive Lookup

Page 12: DECENT: A Decentralized Architecture for Enforcing Privacy in Online Social Networks

12

Conclusion• Contribution– Design and prototype of a decentralized OSN– Preliminary performance results

• Ongoing Work– Optimizations in cryptography and DHT Lookup

Shirin Nilizadeh Prateek Mittal Apu Kapadia Nikita Borisov

Page 13: DECENT: A Decentralized Architecture for Enforcing Privacy in Online Social Networks

13