PRIVACY PRESERVING SOCIAL NETWORKING THROUGH DECENTRALIZATION AUTHORS: L.A. CUTILLO, REFIK MOLVA, THORSTEN STRUFE INSTRUCTOR DR. MOHAMMAD ASHIQUR RAHMAN.

Slides:



Advertisements
Similar presentations
Social Networking: Facebook, Google+, and Pinterest (and maybe one or two others) Mary Rotman Publicist, OReilly Media.
Advertisements

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Using Multi-Encryption to Provide Secure and Controlled Access to XML Documents Tomasz Müldner, Jodrey School of Computer Science, Acadia University, Wolfville,
Privacy: Facebook, Twitter
Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility Antony Rowstron, Peter Druschel Presented by: Cristian Borcea.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks Reporter : 鄭志欣 Advisor: Hsing-Kuo Pao Date : 2010/12/06 1.
Location Based Trust for Mobile User – Generated Content : Applications, Challenges and Implementations Presented By : Anand Dipakkumar Joshi USC.
University of Cincinnati1 Towards A Content-Based Aggregation Network By Shagun Kakkar May 29, 2002.
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
IPv4 and IPv6 Mobility Support Using MPLS and MP-BGP draft-berzin-malis-mpls-mobility-00 Oleg Berzin, Andy Malis {oleg.berzin,
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems Aameek Singh and Ling Liu Presented by: Korporn Panyim.
Freenet A Distributed Anonymous Information Storage and Retrieval System Ian Clarke Oskar Sandberg Brandon Wiley Theodore W.Hong.
Social Networking: Facebook, Twitter, and Google+ Mary Rotman Publicist, O’Reilly Media.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Nym: An anonymous, secure, peer-to-peer instant messenger By Seth Cooper, Adam Hoel, Elliott Hoel, Jeff Holschuh, and Hilde Schmitt.
Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
APPLAUS: A Privacy-Preserving Location Proof Updating System for Location-based Services Zhichao Zhu and Guohong Cao Department of Computer Science and.
Wide-area cooperative storage with CFS
TEMPLATE DESIGN © Privacy Issues of Vehicular Ad-hoc Networks (VANETs) Hang Dok and Ruben Echevarria Advisor: Dr. Huirong.
Access Control in IIS 6.0 Windows 2003 Server Prepared by- Shamima Rahman School of Science and Computer Engineering University of Houston - Clear Lake.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
Key Management in Cryptography
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
DEMIGUISE STORAGE An Anonymous File Storage System VIJAY KUMAR RAVI PRAGATHI SEGIREDDY COMP 512.
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
Network and Systems Security By, Vigya Sharma (2011MCS2564) FaisalAlam(2011MCS2608) DETECTING SPAMMERS ON SOCIAL NETWORKS.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider Prateek Basavaraj April 9 th 2014.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
10. Key Management. Contents Key Management  Public-key distribution  Secret-key distribution via public-key cryptography.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Crowds: Anonymity for Web Transactions Michael K. Reiter Aviel D. Rubin Jan 31, 2006Presented by – Munawar Hafiz.
Secure Authentication Scheme with Anonymity for Wireless Communications Speaker : Hong-Ji Wei Date :
Distributed Authentication in Wireless Mesh Networks Through Kerberos Tickets draft-moustafa-krb-wg-mesh-nw-00.txt Hassnaa Moustafa
Evoting using collaborative clustering Justin Gray Osama Khaleel Joey LaConte Frank Watson.
Securing Distributed Sensor Networks Udayan Kumar Subhajit Sengupta Sharad Sonapeer.
Social Media 101 An Overview of Social Media Basics.
1. Go to 2. Complete the requested information.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Presented by: Sanketh Beerabbi University of Central Florida.
How to Use Facebook This guide will help you navigate around the social networking site, Facebook.
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Decentralized authorization and data security in web content delivery * Danfeng Yao (Brown University, USA) Yunhua Koglin (Purdue University, USA) Elisa.
Protecting Yourself on Social Media – Friend Requests And Messages.
Security Mechanisms for Delivering Ubiquitous Services in Next Generation Mobile Networks Haitham Cruickshank University of Surrey workshop on Ubiquitous.
SybilGuard: Defending Against Sybil Attacks via Social Networks.
Establishing authenticated channels and secure identifiers in ad-hoc networks Authors: B. Sieka and A. D. Kshemkalyani (University of Illinois at Chicago)
BY: CHRIS GROVES Privacy in the Voting Booth. Reason for Privacy Voters worry that their vote may be held against them in the future  People shouldn’t.
Interactive Connectivity Establishment : ICE
Fair Blind Signature Based Authentication for Super Peer P2P Network Authors: Xiaoliang Wang and Xingming Sun Source: 2009, Information Technology Journal,
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P System Aameek Singh, Ling Liu College of Computing, Georgia Tech International.
A Lightweight Scheme for Securely and Reliably Locating SIP Users Lei Kong Vijay A. Balasubramaniyan Mustaque Ahamad.
Stefanos Antaris Distributed Publish/Subscribe Notification System for Online Social Networks Stefanos Antaris *, Sarunas Girdzijauskas † George Pallis.
SOCIAL MEDIA’S IMPACT ON PERSONAL BRANDING WHY YOUR DIGITAL FOOTPRINT MATTERS Image retrieved from socialmediatoday.com Created by Nicole Gennarelli.
Speaker : 童耀民 MA1G /3/21 1 Authors: Phone Lin and Pai-Chun Chung, National Taiwan University Yuguang Fang, University of Florida.
Fall 2006CS 395: Computer Security1 Key Management.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
Presented by: Sonali Pagade Nibha Dhagat paper1.pdf.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Presented by Edith Ngai MPhil Term 3 Presentation
Social Media Safety.
Online Safety; Privacy and Sharing
Online Safety; Privacy and Sharing
Presentation transcript:

PRIVACY PRESERVING SOCIAL NETWORKING THROUGH DECENTRALIZATION AUTHORS: L.A. CUTILLO, REFIK MOLVA, THORSTEN STRUFE INSTRUCTOR DR. MOHAMMAD ASHIQUR RAHMAN PRESENTED BY GIRISH VENKATA SATAVALLI

CONTENTS Introduction Problem Proposed Scheme Evaluation Conclusion

INTRODUCTION Social Network : The way of extending ones’ social group i.e. getting connected to family, friends, partners etc.. with the usage of social media like LinkedIn, facebook, Twitter. Mainly used for social purposes, business purposes. It’s main goal to get everyone registered on the network to connect with each other and also setup & maintain a user’s list of contacts.

The Social Networks in detail deals with the information sharing like sending pictures, tagging, status update of its users and conserve their identity. For business purposes it deals with the marketing, advertising and also helps in receiving the feedback of a product or a service, helps in business expansion in terms of market intelligence

PROBLEM There are many problems which are coming up in social networking in the last few years of which some directly can harm the users. Privacy is the most prominent problem in all social networks, without proper protection of user’s identity it can be collected by the attackers and then can be used in defamation or impersonation attacks

SECURITY OBJECTIVES In addition to privacy the paper talks about a few security objectives in social networking like End- to – End Confidentiality Access Control Data Integrity Authentication Availability

PROPOSED SCHEME To ensure the privacy of the user in the social network the paper proposes a different scheme which avoids the centralization of the network structure. The scheme is rather a system which consists of three parts. Matryoshkas Peer -to- Peer substrate Trusted Identification Service

MATRYOSHKAS The Matryoshkas is the basic structure for a user in this system proposed by the paper. Its purpose to save user’s preferences and data and to restrict accessing of that data by other users Privacy preservation is attained in this stage

PEER -TO- PEER SUBSTRATE Based on a user’s identity this stage of the system allows global access to that particular user. The peer-to-peer substrate works on the DHT (Distributed Hash Table) The user is located based on the data saved on the outer ring of the its matryoshka.

TRUSTED IDENTIFICATION SERVICE The Trusted Identification Service(TIS) is the main part of this system as it will certify each and every user in the network. It is only limited to authenticate the users in the network and will not affect the service’s control It also assigns a pseudonym to the node corresponding to the user.

WORKING OF THE SYSTEM There are five different operations that are handled by the system Account Creation Profile Publication Data Retrieval Contact Request and Acceptance Message Management

ACCOUNT CREATION For a user ‘V’ account creation four steps are involved, which are Identity Creation: The TIS creates two key pairs ‘I’ & ‘P’ for a new user. To create it’s identity, the node pseudonym P v = h 1 (N) and node identifier v = h 2 (N). Then it generates two certificates (I +; v) STTP and (P + ;P V ) STTP Joining the P-to-P substrate Profile creation Matryoshka creation: the registration request

Then encapusalted message confirming the authentication of the user is sent back and then it is created.

Profile Publication: The data in a network may be public or private. For a node there are three types of data Profile information Trusted contact relations Messages Data retrieval: This is done in the reverse way of registration of the user. The DHT routes the information to the correct node to the requesting node.

Contact Request and Acceptance: The request message is sent to the node in the way similar to data request. If the user accepts the request it’s inner shell will increase with trusted nodes.

Message Management: The message are also similar to sending data requests to other users. The public messages like wall posts or comments are addressed publicly and private messages are directly delivered at the corresponding of the user associated with it.

CONCLUSION The paper has proposed a decentralized system to protect the identity of the user as well as the anonymization of data traffic With the proposed scheme they could evaluate the security objectives Authentication, End-to-End confidentiality, Data integrity, Availability of Profiles,.. Etc But there is no complete performance evaluation mentioned in the paper.

Also, we have to note that the scheme assumes a trusted user inside the matryoshka and it should also help to plot in finding malicious peer for the next shell. Due to the replications in the inner shell of the matryoshka, the user data deletion completely from the system might be difficult.

THANK YOU