Preface |
|
vii | |
About the Authors |
|
xi | |
Acknowledgments |
|
xiii | |
Acronyms |
|
xix | |
|
Part I Understanding Security and Privacy Issues in Online Social Networks |
|
|
1 | (36) |
|
|
3 | (10) |
|
1.1 Overview of OSNs and User Behavior in OSNs |
|
|
4 | (2) |
|
1.2 Overview of Cloud Computing and Cloud Datacenters |
|
|
6 | (2) |
|
1.3 Research Motivation, Goal, Challenges, and Contribution |
|
|
8 | (3) |
|
1.3.1 Research motivation and goal |
|
|
8 | (1) |
|
1.3.2 Research challenges |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
11 | (2) |
|
2 Background and Related Work |
|
|
13 | (24) |
|
2.1 Security and Privacy Threats in OSNs |
|
|
13 | (3) |
|
2.2 Protecting User Privacy in Conventional OSNs |
|
|
16 | (5) |
|
2.3 Recent Alternative Architectures for OSNs to Enhance User Privacy |
|
|
21 | (6) |
|
2.3.1 Centralized client-server architectures |
|
|
21 | (1) |
|
2.3.2 Decentralized architectures |
|
|
22 | (5) |
|
2.4 Shamir's Secret Sharing |
|
|
27 | (7) |
|
2.4.1 Text secret sharing |
|
|
29 | (1) |
|
2.4.2 Image secret sharing |
|
|
30 | (3) |
|
2.4.3 Video secret sharing |
|
|
33 | (1) |
|
|
34 | (3) |
|
Part II SecureCSocial: Network Architecture and Functions |
|
|
37 | (42) |
|
3 The Fundamental Network Architecture and Other Preliminaries of the Proposed Solution |
|
|
39 | (10) |
|
3.1 Preliminaries of the Proposed OSN |
|
|
39 | (4) |
|
3.2 Communications Between Users and CDCs and Advertisers |
|
|
43 | (2) |
|
3.3 Services and Infrastructure at CDCs |
|
|
45 | (2) |
|
|
47 | (2) |
|
4 Operations and Functions in the Proposed OSN |
|
|
49 | (30) |
|
4.1 Primary Operations in the Proposed OSN |
|
|
50 | (17) |
|
|
50 | (3) |
|
4.1.2 Creating user profile |
|
|
53 | (3) |
|
4.1.3 Accessing and updating a user profile |
|
|
56 | (2) |
|
4.1.4 Deleting user profiles |
|
|
58 | (1) |
|
4.1.5 Adding friends and contacts to the network |
|
|
59 | (6) |
|
4.1.6 Removing friends and contacts from the network |
|
|
65 | (1) |
|
4.1.7 Accessing friends' profiles |
|
|
66 | (1) |
|
4.2 Secondary Functionalities of the OSN |
|
|
67 | (11) |
|
4.2.1 Searching for contacts according to different criteria |
|
|
67 | (1) |
|
|
67 | (4) |
|
|
71 | (3) |
|
4.2.4 Sharing information and content |
|
|
74 | (2) |
|
4.2.5 Commenting on shared content |
|
|
76 | (1) |
|
|
77 | (1) |
|
|
78 | (1) |
|
Part III Prototype Implementation and Analysis of SecureC Social |
|
|
79 | (50) |
|
5 Security Analysis of the Proposed Architecture |
|
|
81 | (22) |
|
|
82 | (1) |
|
5.2 Protecting User Privacy from Different Potential Adversaries |
|
|
83 | (7) |
|
5.2.1 Other nonfriend users of the OSN and entities external to the OSN |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
86 | (1) |
|
5.2.4 The Certificate Authority |
|
|
87 | (3) |
|
5.3 Security in Different Functionalities |
|
|
90 | (4) |
|
5.4 Security Against Identified Attacks |
|
|
94 | (4) |
|
5.5 Vulnerability Assessment Against Known Cloud Security Risks |
|
|
98 | (3) |
|
|
101 | (2) |
|
6 Feasibility, Performance, and Scalability Analysis |
|
|
103 | (20) |
|
6.1 Scope of the POC Implementation |
|
|
103 | (2) |
|
|
105 | (8) |
|
6.2.1 Creating a user profile |
|
|
106 | (1) |
|
|
107 | (1) |
|
6.2.3 Accessing user profile |
|
|
107 | (1) |
|
6.2.4 Searching for and adding friends |
|
|
108 | (4) |
|
6.2.5 Accessing a friend's profile |
|
|
112 | (1) |
|
|
112 | (1) |
|
6.3 Performance Analysis of the Proposed OSN |
|
|
113 | (6) |
|
|
119 | (3) |
|
|
122 | (1) |
|
7 Conclusions and Future Works |
|
|
123 | (6) |
|
|
123 | (3) |
|
|
126 | (3) |
References |
|
129 | (4) |
Index |
|
133 | |