Privacy-Aware Contact Sharing for Groups in P2P Networks

被引:1
作者
Meskanen, Tommi [1 ,2 ]
Kuusijarvi, Jarkko [3 ]
Niemi, Valtteri [1 ,2 ]
机构
[1] Univ Helsinki, Helsinki, Finland
[2] Helsinki Inst Informat Technol, Helsinki, Finland
[3] VTT Tech Res Ctr Finland Ltd, Helsinki, Finland
来源
INTERNATIONAL JOURNAL OF EMBEDDED AND REAL-TIME COMMUNICATION SYSTEMS (IJERTCS) | 2021年 / 12卷 / 04期
基金
欧盟地平线“2020”;
关键词
DHT; Distributed Hash Table; Group Management; p2p; Peer Discovery; Peer-to-Peer Networks; Privacy; SYBIL ATTACKS; PEER; SECURE;
D O I
10.4018/IJERTCS.2021100103
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The need for peer-to-peer (p2p) communications is obvious because current centralized solutions are capturing and storing too much information from individuals communicating with each other. HELIOS platform introduces a new social media platform that is not controlled by any central operator but brings the power of possession of the data back to the users. It does not have centralized servers that store and handle receiving/sending of the messages. Instead, HELIOS platform relies on the current open-source solutions available in the p2p communities to propagate the messages to the wanted recipients of the data and/or messages. The authors of this paper propose a set of protocols to help answer one specific problem related to p2p communication. Especially, this paper proposes how to privately share data (end-point address or other) of the user with such other users who have previously connected with the user securely, either offline or online.
引用
收藏
页码:36 / 54
页数:19
相关论文
共 31 条
[1]  
Brack S, 2020, IACR Cryptol. Eprint Arch., V2020, P337
[2]   Safebook: A Privacy-Preserving Online Social Network Leveraging on Real-Life Trust [J].
Cutillo, Leucio Antonio ;
Molva, Refik ;
Strufe, Thorsten .
IEEE COMMUNICATIONS MAGAZINE, 2009, 47 (12) :94-101
[3]   Fully Homomorphic Encryption Using Ideal Lattices [J].
Gentry, Craig .
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, :169-178
[4]   Security and privacy issues in P2P streaming systems: A survey [J].
Gheorghe, Gabriela ;
Lo Cigno, Renato ;
Montresor, Alberto .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2011, 4 (02) :75-91
[5]  
Goldwasser S., 2013, REUSABLE GARBLED CIR
[6]  
Goldwasser S, 2013, STOC'13: PROCEEDINGS OF THE 2013 ACM SYMPOSIUM ON THEORY OF COMPUTING, P555
[7]   LibreSocial: A peer-to-peer framework for online social networks [J].
Graffi, Kalman ;
Masinde, Newton .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (08)
[8]   The Contextual Ego Network P2P Overlay for the Next Generation Social Networks [J].
Guidi, Barbara ;
Kapanova, Kristina G. ;
Koidl, Kevin ;
Michienzi, Andrea ;
Ricci, Laura .
MOBILE NETWORKS & APPLICATIONS, 2020, 25 (03) :1062-1074
[9]  
Isaac M., 2018, The New York Times
[10]  
Jawad M, 2013, LECT NOTES SOC NETW, P195, DOI 10.1007/978-3-7091-0894-9_7