Privacy-Preserving Peer Discovery for Group Management in p2p Networks

被引:2
作者
Meskanen, Tommi [1 ]
Niemi, Valttemi [1 ]
Kuusijarvi, Jarkko [2 ]
机构
[1] Univ Helsinki, Helsinki, Finland
[2] VTT Tech Res Ctr Finland Ltd, Oulu, Finland
来源
PROCEEDINGS OF THE 2020 27TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT) | 2020年
基金
欧盟地平线“2020”;
关键词
D O I
10.23919/fruct49677.2020.9211019
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The necessity for peer-to-peer (p2p) communications is obvious; current centralized solutions are capturing and storing too much information from the individual people communicating with each other. Privacy concerns with a centralized solution in possession of all the users data are a difficult matter. HELIOS platform introduces a new social-media platform that is not in control of any central operator, but brings the power of possession of the data back to the users. It does not have centralized servers that store and handle receiving/sending of the messages. Instead, it relies on the current open-source solutions available in the p2p communities to propagate the messages to the wanted recipients of the data and/or messages. The p2p communications also introduce new problems in terms of privacy and tracking of the user, as the nodes part of a p2p network can see what data the other nodes provide and ask for. How the sharing of data in a p2p network can be achieved securely, taking into account the user's privacy is a question that has not been fully answered so far. We do not claim we answer this question fully in this paper either, but we propose a set of protocols to help answer one specific problem. Especially, this paper proposes how to privately share data (end-point address or other) of the user between other users, provided that they have previously connected with each other securely, either offline or online.
引用
收藏
页码:150 / 156
页数:7
相关论文
共 22 条
[1]  
[Anonymous], 1998, ACM SIGCOMM COMPUTER
[2]  
Brack S, 2020, IACR Cryptol. Eprint Arch., V2020, P337
[3]   Safebook: A Privacy-Preserving Online Social Network Leveraging on Real-Life Trust [J].
Cutillo, Leucio Antonio ;
Molva, Refik ;
Strufe, Thorsten .
IEEE COMMUNICATIONS MAGAZINE, 2009, 47 (12) :94-101
[4]   Security and privacy issues in P2P streaming systems: A survey [J].
Gheorghe, Gabriela ;
Lo Cigno, Renato ;
Montresor, Alberto .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2011, 4 (02) :75-91
[5]  
Graffi K., 2020, ARXIV200102962
[6]   The Contextual Ego Network P2P Overlay for the Next Generation Social Networks [J].
Guidi, Barbara ;
Kapanova, Kristina G. ;
Koidl, Kevin ;
Michienzi, Andrea ;
Ricci, Laura .
MOBILE NETWORKS & APPLICATIONS, 2020, 25 (03) :1062-1074
[7]  
Isaac M., 2018, Facebook security breach exposes accounts of 50 million users
[8]  
Jawad M, 2013, LECT NOTES SOC NETW, P195, DOI 10.1007/978-3-7091-0894-9_7
[9]   A Privacy-Preserving and Fully Decentralized Storage and Sharing System on Blockchain [J].
Li, Gen ;
Sato, Hiroyuki .
2019 IEEE 43RD ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 2, 2019, :694-699
[10]  
Li J., 2007, A Survey of Peer-to-Peer Network Security Issues