基於點對點的社交網絡的全面的調查(Social and Information Networks)

  • 2020 年 1 月 16 日
  • 筆記

在線社交網絡,如Facebook和twitter,是當今世界一個日益增長的平台,各種平台為個人提供了通過消息和聊天以及分享視頻和照片等內容進行協作的能力。這些平台中的大多數都基於集中式計算系統,這意味着系統的控制和管理掌握在一個提供者手中,必須信任它能安全地處理數據和通信跟蹤。雖然用戶的目標是隱私和數據主權,但供應商的目標往往是將他們存儲的數據貨幣化。即使是私人運營的聯合社交網絡,也需要一些為社區服務的熱心人士,通過他們可以訪問自己管理的數據。點對點(P2P)技術作為一種零信任的替代方案,保證了網絡的自組織和設計安全,其中最終的數據主權在於相應的用戶。這些網絡支持端到端通信、不妥協的訪問控制、匿名性和對審查的彈性,以及由於濫用信任而導致的大量數據泄漏。這項調查的目標有三方面。首先,該調查闡述了基於p2p的在線社交網絡的特性,定義了對此類(零信任)平台的需求。其次,它詳細闡述了P2P框架的構建模塊,這些模塊允許創建複雜和高要求的應用程序,如用戶/身份管理、可靠的數據存儲、安全通信、訪問控制和通用擴展,這些功能在其他P2P調查中沒有涉及。作為第三點,本文概述了所提出的基於p2p的在線社交網絡應用程序、框架和體系結構。具體來說,它探討了可用解決方案的技術細節、相互依賴性和成熟度。

原文題目:Peer-to-Peer based Social Networks: A Comprehensive Survey

原文:Online social networks, such as Facebook and twitter, are a growing phenomenon in today』s world, with various platforms providing capabilities for individuals to collaborate through messaging and chatting as well as sharing of content such as videos and photos. Most, if not all, of these platforms are based on centralized computing systems, meaning that the control and management of the systems lies in the hand of one provider, which must be trusted to treat the data and communication traces securely. While users aim for privacy and data sovereignty, often the providers aim to monetize the data they store. Even, federated privately run social networks require a few enthusiasts that serve the community and have, through that, access to the data they manage. As a zero-trust alternative, peer-to-peer (P2P) technologies promise networks that are self organizing and secure-by-design, in which the final data sovereignty lies at the corresponding user. Such networks support end- to-end communication, uncompromising access control, anonymity and resilience against censorship and massive data leaks through misused trust. The goals of this survey are three-fold. Firstly, the survey elaborates the properties of P2P-based online social networks and defines the requirements for such (zero-trust) platforms. Secondly, it elaborates on the building blocks for P2P frameworks that allow the creation of such sophisticated and demanding applications, such as user/identity management, reliable data storage, secure communication, access control and general-purpose extensibility, features that are not addressed in other P2P surveys. As a third point, it gives an overview of proposed P2P-based online social network applications, frameworks and architectures. In specific, it explores the technical details, inter-dependencies and maturity of the available solutions.

原文作者:Newton Masinde, Kalman Graffi

原文鏈接:https://arxiv.org/abs/2001.02611