Peer-to-Peer-Based Social Networks: A Comprehensive Survey

  • PDF / 1,658,201 Bytes
  • 51 Pages / 595.276 x 790.866 pts Page_size
  • 0 Downloads / 235 Views

DOWNLOAD

REPORT


SURVEY ARTICLE

Peer‑to‑Peer‑Based Social Networks: A Comprehensive Survey Newton Masinde1   · Kalman Graffi2 Received: 31 May 2020 / Accepted: 28 August 2020 © The Author(s) 2020

Abstract The use of online social networks, such as Facebook and Twitter, has grown at a phenomenal rate. These platforms offer services that support interactions via messaging, chatting or audio/video conferencing, and also sharing of content. Most, if not all, of these platforms use centralized computing systems; therefore, the control and management of the systems lies entirely in the hands of one provider, who must be trusted to treat the data and communication traces securely. As a zerotrust alternative, peer-to-peer (P2P) technologies promise to support end-to-end communication, uncompromising access control, anonymity and resilience against censorship and massive data leaks through misused trust. The goals of this survey are threefold. First, the survey elaborates the properties of P2P-based online social networks and defines the requirements for such (zero-trust) platforms. Second, it gives an exposition of the building blocks for P2P frameworks that allow the creation of such sophisticated and demanding applications, such as user/identity management, reliable data storage, secure communication, access control and general-purpose extensibility, which are not properly addressed in other P2P surveys. As a third point, it gives a comprehensive analysis of proposed P2P-based online social network applications, frameworks and architectures by exploring the technical details, inter-dependencies and maturity of these solutions. Keywords  Computer networks · Distributed networks · Peer-to-Peer networks · Online social networks

Introduction As a means of online user interaction, social networking has experienced unparalleled growth over the last 10 years, a fact that is attested to by the number of providers and the users registered, with the top ten providers shown in Table 1. To date, the most utilized computing model by the popular online social networks (OSNs) is still the centralized model. Several studies OSNs such as [1–5] have enumerated operational and design challenges directly or indirectly related to this computing model. These issues include, but are not limited to, seamless scaling of the network without straining

* Newton Masinde [email protected] https://tsn.hhu.de Kalman Graffi kalman.graffi@honda‑ri.de https://www.honda-ri.de 1



Technology of Social Networks, Heinrich Heine University, Universitätsstr. 1, 40225 Düsseldorf, Germany



Honda Research Institute Europe GmbH, Carl‑Legien‑Strasse 30, Offenbach am Main 63073, Germany

2

of the available resources (both monetary and physical) and ability of users to control their data and maintain their privacy while using the social networks. While the first issue, challenges due to scaling, have been generally mastered by the providers, the privacy and trust issues have not been extensively considered. In the centralized service provision model, a single operator av