论文标题
基于点对点的社交网络:一项综合调查
Peer-to-Peer based Social Networks: A Comprehensive Survey
论文作者
论文摘要
在线社交网络(例如Facebook和Twitter)是当今世界上日益增长的现象,各种平台为个人提供了通过消息传递和聊天以及分享内容(例如视频和照片)协作的功能。这些平台中的大多数(如果不是全部)基于集中式计算系统,这意味着系统的控制和管理位于一个提供商的手中,必须信任该提供商以安全地处理数据和通信跟踪。尽管用户旨在寻求隐私和数据主权,但提供商通常旨在使他们存储的数据获利。即使,联邦私人运行的社交网络都需要一些为社区服务的爱好者,并可以通过这些爱好者访问他们管理的数据。作为零信任替代方案,对等对点(P2P)技术承诺的网络是自组织和安全的,其中最终数据主权在于相应的用户。此类网络支持端到端通信,毫不妥协的访问控制,匿名性和抵御审查制度以及通过滥用信任的大规模数据泄漏。这项调查的目标是三倍。首先,调查详细阐述了基于P2P的在线社交网络的属性,并定义了此类(零值)平台的要求。其次,它详细介绍了P2P框架的构建块,这些框架允许创建如此复杂且苛刻的应用程序,例如用户/身份管理,可靠的数据存储,安全通信,访问控制和通用可扩展性,其他P2P调查中未解决的功能。第三点,它概述了拟议的基于P2P的在线社交网络应用程序,框架和体系结构。具体而言,它探讨了可用解决方案的技术细节,相互依存关系和成熟度。
Online social networks, such as Facebook and twitter, are a growing phenomenon in today's world, with various platforms providing capabilities for individuals to collaborate through messaging and chatting as well as sharing of content such as videos and photos. Most, if not all, of these platforms are based on centralized computing systems, meaning that the control and management of the systems lies in the hand of one provider, which must be trusted to treat the data and communication traces securely. While users aim for privacy and data sovereignty, often the providers aim to monetize the data they store. Even, federated privately run social networks require a few enthusiasts that serve the community and have, through that, access to the data they manage. As a zero-trust alternative, peer-to-peer (P2P) technologies promise networks that are self organizing and secure-by-design, in which the final data sovereignty lies at the corresponding user. Such networks support end-to-end communication, uncompromising access control, anonymity and resilience against censorship and massive data leaks through misused trust. The goals of this survey are three-fold. Firstly, the survey elaborates the properties of P2P-based online social networks and defines the requirements for such (zero-trust) platforms. Secondly, it elaborates on the building blocks for P2P frameworks that allow the creation of such sophisticated and demanding applications, such as user/identity management, reliable data storage, secure communication, access control and general-purpose extensibility, features that are not addressed in other P2P surveys. As a third point, it gives an overview of proposed P2P-based online social network applications, frameworks and architectures. In specific, it explores the technical details, inter-dependencies and maturity of the available solutions.