Related Works
Characteristics of Online Social Networks and Behavior Patterns of Users
- Richter A. and Koch M. Functions of social networking services. In 8th International Conference on the Design of Cooperative Systems, pages 87-98, Provence, France, 2008.
- Krishnamurthy B. and Wills C. E. Characterizing privacy in online social networks. In 1st ACM workshop on Online social networks, pages 37-42, Seattle, Washington, USA, 2008.
Security and Privacy Threats in Online Social Networks
- Cutillo L.A., Manulis M., and Strufe T. Security and pricacy in online social networks. In F. Furht, editor, Handbook of Social Network Technologies and Applications, pages 497-522. Springer, Heidelberg, 2010.
- Steel E. and Vascellaro J.E. Facebook, myspace confront privacy loophole. The Wall Street Journal, 2010.
- Facebook statement of rights and responsibilities.
Protecting User Privacy in Conventional Online Social Networks
- Toch E., Sadeh N. M., and Hong J. Generating default privacy policies for online social networks. In 28th ACM International Conference on Extended Abstracts on Human factors in Computing systems, pages 4243-4248, Atlanta, Georgia, USA, 2010.
- Staddon J. Finding "hidden" connections on linkedin, an argument for more pragmatic social network privacy. In 2nd ACM workshop on Security and Articial Intelligence, pages 11-14, Chicago, Illinois, USA, 2009.
- Lucas M.M. and Borisov N. Flybynight: Mitigating the privacy risks of social networking. In 7th ACM Workshop on Privacy in the Electronic Society, pages 1-8, Alexandria, Virginia, USA, 2008.
- Guha S., Tang K., and Francis P. Noyb: Privacy in online social networks. In 1st Workshop on Online Social Networks, pages 49-54, Seattle, Washington, USA, 2008.
- Atrey P.K. A secret sharing based privacy enforcement mechanism for untrusted social networking operators. In 3rd International ACM Workshop on Multimedia in Forensics and Intelligence, pages 13-18, Scottsdale, Arizona, USA, 2011.
Alternative Architectures for Online Social Networks to Enhance User Privacy
Centralized client-server architectures
- Anderson J., Diaz C., Bonneau J., and Stajano F. Privacy-enabling social networking over untrusted networks. In 2nd ACM Workshop on Online Social Networks, pages 1-6, Barcelona, Spain, 2009.
Decentralized architectures
- Shakimov A., Varshavsky A., Cox L.P., and Caceres R. Privacy, cost, and availability tradeoffs in decentralized osns. In 2nd ACM workshop on Online Social Networks, pages 13-18, Barcelona, Spain, 2009.
- Shakimov A., Lim H., Caceres R., Cox L.P., Li K., Liu D., and Varshavsky A. Vis-a-vis: Privacy-preserving online social networking via virtual individual servers. In 3rd International Conference on Communication Systems and Networks, pages 1-10, Bangalore, India, 2011.
- Senevirathna K. and Atrey P.K. A secure and privacy-aware cloud-based architecture for online social networks. In 7th Multi-Disciplinary International Workshop on Artifcial Intelligence, pages 223-234, Krabi, Thailand, 2013.
- Cutillo L.A., Molva R., and Onen M. Safebook: A distributed privacy preserving online social network. In 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, pages 1-3, Lucca, Italy, 2011.
- Cutillo L.A., Molva R., and Strufe T. Leveraging social links for trust and privacy in networks. IFIP Advances in Information and Communication Technology, 309:27-36, 2009.
- Cutillo L.A., Molva R., and Strufe T. Privacy preserving social networking through decentralization. In 6th International Conference on Wireless On-Demand Systems and Services, pages 133-140, Snowbird, Utah, USA, 2009.
- Cutillo L.A., Molva R., and Strufe T. Safebook: A privacy-preserving online social network leveraging on real-life trust. IEEE Communications Magazine, 47(12):94-101, 2009.
- Cutillo L.A., Molva R., and Strufe T. Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network. In 3rd IEEE World of Wireless, Mobile and Multimedia Networks Workshop on Autonomic and Opportunistic Communications, pages 1-6, Kos, Greece, 2009.
- Aiello L. M. and Ruffo G. Lotusnet: Tunable privacy for distributed online social network services. Computer Communications, 35:75-88, 2012.
- Baden R., Bender A., Spring N., Bhattacharjee B., and Starin D. Persona: An online social network with user-defined privacy. In ACM SIGCOMM 2009 Conference on Data Communication, pages 135-146, Barcelona, Spain, 2009.
- Buchegger S., Schiöberg D., Mittal P., Vu L.H., and Datta A. Peerson: P2p social networking: Early experiences and insights. In 2nd ACM EuroSys Workshop on Social Network Systems, pages 46-52, Nuremberg, Germany, 2009.
- Jahid S., Nilizadeh S., Mittal P., Borisov N., and Kapadia A. Decent: A decentralized architecture for enforcing privacy in online social networks. In 4th International Workshop on Security and Social Networking, pages 326-332, Lugano, Switzerland, 2012.
- Nilizadeh S., Jahid S., Mittal P., Borisov N., and Kapadia A. Cachet: A decentralized architecture for privacy preserving social networking caching. In 8th International Conference on Emerging Networking Experiments and Technologies, pages 337-348, Nice, France, 2012.
- Seong S.W., Seo J., Nasielski M., Sengupta D., Hangal S., Teh S.K., Chu R., Dodson B., and Lam M.S. Prpl: a decentralized social networking infrastructure. In 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond. Article No. 8, San Francisco, California, USA, 2010.
Shamir's Secret Sharing
- Shamir A. How to share a secret. Communications of the ACM, 22(11):612-613, 1979.
- Krawczyk H. Secret sharing made short. Springer Lecture Notes in Computer Science, 773:136-146, 1994.
Text secret sharing
- Atrey P.K., Hildebrand K., and Ramanna S. An efficient method for protection of text documents using secret sharing. In International Conference on Frontiers of Computer Science, Bangalore, India, 2011.
Image secret sharing
- Lin C-C. and Tsai W-H. Secret image sharing with capability of share data reduction. Optical Engineering, 42:2340-2345, 2003.
- Thien C-C. and Lin J-C. Secret image sharing. Computers & Graphics, 26(5):765-770, 2002.
- Alharthi S. and Atrey P.K. Further improvements on secret image sharing scheme. In 2nd ACM Workshop on Multimedia in Forensics, Security and Intelligence, pages 53-58, Firenze, Italy, 2010.
- Alharthi S. and Atrey P.K. An improved scheme for secret image sharing. In 2010 IEEE International Conference on Multimedia and Expo (ICME), pages 1661-1666, Suntec City, Singapore, 2010.
- Bhadravati S., Khabbazian M., and Atrey P.K. On the semantic security of secret image sharing methods. In IEEE Seventh International Conference on Semantic Computing, pages 302-305, Irvine, California, USA, 2013.
Video secret sharing
- Raju N., Ganugula U., Srinathan K., and Jawahar C.V. A novel video encryption technique based on secret sharing. In 15th IEEE International Conference on Image Processing, pages 3136-3139, San Diego, California, USA, 2008.
- Atrey P.K., Alharthi S, Hossain M.A., AlGhamdi A., and El Saddik A. Collective control over sensitive video data using secret sharing. Springer International Journal of Multimedia Tools and Applications, August, published online, 2013.
- Alharthi S., Atrey P.K., and Kankanhalli M.S. Secret video sharing. In APSIPA Annual Summit and Conference 2010, Biopolis, Singapore, 2010.
Cloud Computing and Its Security
- Cloud Security Alliance. Top threats to cloud computing v1.0. Technical report, 2010.
- Chen D. and Zhao H. Data security and privacy protection issues in cloud computing. In the International Conference on Computer Science and Electronics Engineering 2012, pages 647-651, Hangzhou, China, 2012.
- European Network and Information Security Agency. Cloud computing: Benefits, risks and recommendations for information security - ENISA report. Technical report, 2009.
- Jansen W. and Grance T. Guidelines on security and privacy in public cloud computing. Technical report, National Institute of Standards and Technology, 2011.
- Stallings W. and Brown L. Computer Security, Principles and Practice - Second Edition. Prentice Hall, 2012.
Data Communication and Network Security
- Rescorla E. RFC2818-HTTP Over TLS. Network Working Group, Internet Engineering Task Force, 2000.
- Jonsson J. and Kaliski B. RFC3447-Public-Key Cryptography Standards (PKCS) No.1: RSA Cryptography Specifications Version 2.1. Network Working Group, Internet Engineering Task Force, 2003.
- Fielding R., Irvine U. C., Gettys J., Mogul J., Frystyk H., Masinter L., Leach P., and Berners-Lee T. RFC2616-Hypertext Transfer Protocol - HTTP/1.1. Network Working Group, Internet Engineering Task Force, 1999.
- Dierks T. and Allen C. RFC2246-The TLS Protocol Version 1.0. Network Working Group, Internet Engineering Task Force, 1999.
- Stallings W. Cryptography and Network Security, Principles and Practice - Fifth Edition. Prentice Hall, 2011.