{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:20:11Z","timestamp":1761895211902,"version":"3.37.3"},"reference-count":68,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2012,1]]},"DOI":"10.1016\/j.comcom.2010.12.006","type":"journal-article","created":{"date-parts":[[2010,12,20]],"date-time":"2010-12-20T09:05:16Z","timestamp":1292835916000},"page":"75-88","source":"Crossref","is-referenced-by-count":68,"title":["LotusNet: Tunable privacy for distributed online social network services"],"prefix":"10.1016","volume":"35","author":[{"given":"Luca Maria","family":"Aiello","sequence":"first","affiliation":[]},{"given":"Giancarlo","family":"Ruffo","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comcom.2010.12.006_b0005","unstructured":"A. Ostrow, Social networking more popular than email, <http:\/\/mashable.com\/2009\/03\/09\/social-networking-more-popular-than-email>, March, 2009."},{"key":"10.1016\/j.comcom.2010.12.006_b0010","unstructured":"A. Kazeniac, Facebook takes over top spot, Twitter climbs, <http:\/\/blog.compete.com\/2009\/02\/09\/facebook-myspace-twitter-social-network>, February, 2009."},{"key":"10.1016\/j.comcom.2010.12.006_b0015","series-title":"WOSN \u201909: Proceedings of the Second ACM Workshop on Online Social Networks","first-page":"7","article-title":"On the leakage of personally identifiable information via online social networks","author":"Krishnamurthy","year":"2009"},{"key":"10.1016\/j.comcom.2010.12.006_b0020","series-title":"WOSP \u201908: Proceedings of the First Workshop on Online Social Networks","first-page":"37","article-title":"Characterizing privacy in online social networks","author":"Krishnamurthy","year":"2008"},{"key":"10.1016\/j.comcom.2010.12.006_b0025","unstructured":"Facebook Inc., Social plugins and instant personalization, <http:\/\/www.facebook.com\/help\/?page=1068>, April, 2010."},{"key":"10.1016\/j.comcom.2010.12.006_b0030","unstructured":"A. Felt, D. Evans, Privacy protection for social networking platforms, in: Web 2.0 Security and Privacy 2008 (in conjunction with 2008 IEEE Symposium on Security and Privacy), 2008."},{"key":"10.1016\/j.comcom.2010.12.006_b0035","unstructured":"K. Opsahl, Facebook\u2019s eroding privacy policy: a timeline, <http:\/\/www.eff.org\/deeplinks\/2010\/04\/facebook-timeline>, April, 2010."},{"key":"10.1016\/j.comcom.2010.12.006_b0040","series-title":"WPES \u201905: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society","first-page":"71","article-title":"Information revelation and privacy in online social networks","author":"Gross","year":"2005"},{"key":"10.1016\/j.comcom.2010.12.006_b0045","unstructured":"We\u2019re quitting Facebook, <http:\/\/www.quitfacebookday.com>, May, 2010."},{"key":"10.1016\/j.comcom.2010.12.006_b0050","unstructured":"Web 2.0 suicide machine, http:\/\/suicidemachine.org (2010)."},{"key":"10.1016\/j.comcom.2010.12.006_b0055","unstructured":"D. Grippi, M. Salzberg, R. Sofaer, I. Zhitomirskiy, The diaspora project, <http:\/\/www.joindiaspora.com>, 2010."},{"key":"10.1016\/j.comcom.2010.12.006_b0060","unstructured":"P. Antoniadis, B.L. Grand, Self-organised virtual communities; bridging the gap between web-based communities and P2P systems, International Journal of Web Based Communities 5 (2) (2009) 179\u2013194, <http:\/\/dx.doi.org\/10.1504\/IJWBC.2009.023964>."},{"key":"10.1016\/j.comcom.2010.12.006_b0065","doi-asserted-by":"crossref","unstructured":"S. Buchegger, A. Datta, A case for P2P infrastructure for social networks-opportunities and challenges, in: WONS\u201909: Sixth International Conference on Wireless On-demand Network Systems and Services, Snowbird, Utah, USA, 2009.","DOI":"10.1109\/WONS.2009.4801862"},{"key":"10.1016\/j.comcom.2010.12.006_b0070","doi-asserted-by":"crossref","unstructured":"G. Urdaneta, G. Pierre, M. van Steen, A survey of DHT security techniques, ACM Computing Surveys 43 (2) 2011. <http:\/\/www.globule.org\/publi\/SDST_acmcs2009.html>.","DOI":"10.1145\/1883612.1883615"},{"key":"10.1016\/j.comcom.2010.12.006_b0075","unstructured":"H. Lundgren, R. Gold, E. Nordstr\u00f6m, M. Wiggberg, A distributed instant messaging architecture based on the Pastry peer-to-peer routing substrate, in: SNCNW 2003, Swedish National Computer Networking Workshop, Stockholm, 2003."},{"key":"10.1016\/j.comcom.2010.12.006_b0080","doi-asserted-by":"crossref","unstructured":"S. Buchegger, D. Schi\u00f6berg, L.H. Vu, A. Datta, PeerSoN: P2P Social Networking-Early Experiences and Insights, in: SNS\u201909: Second ACM Workshop on Social Network Systems, N\u00fcrnberg, Germany, 2009.","DOI":"10.1145\/1578002.1578010"},{"key":"10.1016\/j.comcom.2010.12.006_b0085","doi-asserted-by":"crossref","unstructured":"L.A. Cutillo, R. Molva, T. Strufe, Leveraging social links for trust and privacy in networks, in: INet Sec 2009. Open Research Problems in Network Security. Zurich, Switzerland, 2009.","DOI":"10.1007\/978-3-642-05437-2_3"},{"key":"10.1016\/j.comcom.2010.12.006_b0090","doi-asserted-by":"crossref","unstructured":"L.A. Cutillo, R. Molva, T. Strufe, Privacy preserving social networking through decentralization, in: WONS 2009, Sixth International Conference on Wireless On-demand Network Systems and Services, Snowbird, Utah, USA, February 2\u20134, 2009.","DOI":"10.1109\/WONS.2009.4801860"},{"key":"10.1016\/j.comcom.2010.12.006_b0095","doi-asserted-by":"crossref","unstructured":"L.A. Cutillo, R. Molva, T. Strufe, Safebook: feasibility of transitive cooperation for privacy on a decentralized social network, in: AOC 2009, Third IEEE International WoWMoM Workshop on Autonomic and Opportunistic Communications, Kos, Greece, June 15, 2009.","DOI":"10.1109\/WOWMOM.2009.5282446"},{"key":"10.1016\/j.comcom.2010.12.006_b0100","doi-asserted-by":"crossref","unstructured":"R. Narendula, T.G. Papaioannou, K. Aberer, Privacy-aware and highly-available OSN profiles, in: COPS \u201910: the Sixth International Workshop on Collaborative Peer-to-Peer Systems, in: Proceedings of WETICE 2010: 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, in press.","DOI":"10.1109\/WETICE.2010.40"},{"key":"10.1016\/j.comcom.2010.12.006_b0105","doi-asserted-by":"crossref","unstructured":"K. Graffi, P. Mukherjee, B. Menges, D. Hartung, A. Kovacevic, R. Steinmetz, Practical security in p2p-based social networks, in: LCN\u201909: 34th IEEE Conference on Local Computer Networks, 2009.","DOI":"10.1109\/LCN.2009.5355085"},{"key":"10.1016\/j.comcom.2010.12.006_b0110","series-title":"WETICE\u201909: 18th IEEE International Workshops on Enabling Technologies. Groningen, Netherlands","first-page":"93","article-title":"A gossip-based distributed social networking system","author":"Abbas","year":"2009"},{"issue":"2","key":"10.1016\/j.comcom.2010.12.006_b0115","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1002\/cpe.1189","article-title":"TRIBLER: a social-based peer-to-peer system","volume":"20","author":"Pouwelse","year":"2008","journal-title":"Concurrency and Computation"},{"key":"10.1016\/j.comcom.2010.12.006_b0120","series-title":"WOSN \u201909: Proceedings of the Second ACM Workshop on Online Social Networks","first-page":"13","article-title":"Privacy, cost, and availability tradeoffs in decentralized osns","author":"Shakimov","year":"2009"},{"key":"10.1016\/j.comcom.2010.12.006_b0125","series-title":"WOSP \u201908: Proceedings of the First Workshop on Online Social Networks","first-page":"49","article-title":"Noyb: privacy in online social networks","author":"Guha","year":"2008"},{"key":"10.1016\/j.comcom.2010.12.006_b0130","series-title":"WOSP \u201908: Proceedings of the First Workshop on Online Social Networks","first-page":"43","article-title":"Lockr: social access control for web 2.0","author":"Tootoonchian","year":"2008"},{"key":"10.1016\/j.comcom.2010.12.006_b0135","series-title":"WPES \u201908: Proceedings of the Seventh ACM Workshop on Privacy in the Electronic Society","first-page":"1","article-title":"Flybynight: mitigating the privacy risks of social networking","author":"Lucas","year":"2008"},{"key":"10.1016\/j.comcom.2010.12.006_b0140","series-title":"SIGCOMM \u201909: Proceedings of the ACM SIGCOMM 2009 Conference on Data Communication","first-page":"135","article-title":"Persona: an online social network with user-defined privacy","author":"Baden","year":"2009"},{"key":"10.1016\/j.comcom.2010.12.006_b0145","series-title":"WOSN \u201909: Proceedings of the Second ACM Workshop on Online Social Networks","first-page":"1","article-title":"Privacy-enabling social networking over untrusted networks","author":"Anderson","year":"2009"},{"key":"10.1016\/j.comcom.2010.12.006_b0150","series-title":"WWW \u201910: Proceedings of the 19th International Conference on World Wide Web","first-page":"351","article-title":"Privacy wizards for social networking sites","author":"Fang","year":"2010"},{"key":"10.1016\/j.comcom.2010.12.006_b0155","unstructured":"Facebook Inc., Terms of use, <http:\/\/www.facebook.com\/terms.php>, April, 2010."},{"key":"10.1016\/j.comcom.2010.12.006_b0160","series-title":"Proceedings of SESOC \u201910: Security and Social Networking Workshop","article-title":"Secure and flexible framework for decentralized social network services","author":"Aiello","year":"2010"},{"issue":"2","key":"10.1016\/j.comcom.2010.12.006_b0165","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/1117454.1117456","article-title":"Link mining: a survey","volume":"7","author":"Getoor","year":"2005","journal-title":"ACM SIGKDD Explorations Newsletter"},{"issue":"10","key":"10.1016\/j.comcom.2010.12.006_b0170","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1145\/1290958.1290968","article-title":"Social phishing","volume":"50","author":"Jagatic","year":"2007","journal-title":"Communications of the ACM"},{"key":"10.1016\/j.comcom.2010.12.006_b0175","series-title":"WWW \u201909: Proceedings of the 18th International Conference on World Wide Web","first-page":"551","article-title":"All your contacts are belong to us: automated identity theft attacks on social networks","author":"Bilge","year":"2009"},{"key":"10.1016\/j.comcom.2010.12.006_b0180","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/COMST.2005.1610546","article-title":"A survey and comparison of peer-to-peer overlay network schemes","volume":"7","author":"Lua","year":"2005","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"10.1016\/j.comcom.2010.12.006_b0185","series-title":"P2P\u201908: Eighth International Conference on Peer-to-Peer Computing","first-page":"30","article-title":"Tempering Kademlia with a robust identity based system","author":"Aiello","year":"2008"},{"key":"10.1016\/j.comcom.2010.12.006_b0190","doi-asserted-by":"crossref","unstructured":"P. Maymounkov, D. Mazi\u00e8res, Kademlia: A peer-to-peer information system based on the XOR metric, in: IPTPS \u201902: First International Workshop on Peer-to-Peer Systems, 2002, pp. 53\u201365.","DOI":"10.1007\/3-540-45748-8_5"},{"key":"10.1016\/j.comcom.2010.12.006_b0195","series-title":"IPTPS \u201901: Revised Papers from the First International Workshop on Peer-to-Peer Systems","first-page":"261","article-title":"Security considerations for peer-to-peer distributed hash tables","author":"Sit","year":"2002"},{"key":"10.1016\/j.comcom.2010.12.006_b0200","doi-asserted-by":"crossref","unstructured":"J. Douceur, The sybil attack, in: IPTPS \u201902: First International Workshop on Peer-to-Peer Systems, 2002.","DOI":"10.1007\/3-540-45748-8_24"},{"key":"10.1016\/j.comcom.2010.12.006_b0205","series-title":"InfoCom \u201906: 25th Conference on Computer Communications","article-title":"Eclipse attacks on overlays: threats and defenses","author":"Singh","year":"2006"},{"key":"10.1016\/j.comcom.2010.12.006_b0210","series-title":"P2P\u201909: Ninth International Conference on Peer-to-Peer Computing","article-title":"An efficient distributed PKI for structured P2P networks","author":"Lesueur","year":"2009"},{"key":"10.1016\/j.comcom.2010.12.006_b0215","unstructured":"C.M.A. Yeung, I. Liccardi, K. Lu, O. Seneviratne, T. Berners-Lee, Decentralization: The Future of Online Social Networking, in: W3C Workshop on the Future of Social Networking, 2009."},{"key":"10.1016\/j.comcom.2010.12.006_b0220","unstructured":"M. Mostarda, D. Palmisano, F. Zani, S. Tripodi, Towards an OpenID-based solution to the Social Network Interoperability problem, in: W3C Workshop on the Future of Social Networking, 2009."},{"key":"10.1016\/j.comcom.2010.12.006_b0225","unstructured":"K. Fu, S. Kamara, T. Kohno, Key regression: Enabling efficient key distribution for secure distributed storage, in: NDSS\u201906: Proceedings of Network and Distributed Systems Security Symposium, 2006."},{"key":"10.1016\/j.comcom.2010.12.006_b0230","unstructured":"K.E. Fu, R.L. Rivest, Group sharing and random access in cryptographic storage file systems, Tech. rep., Master\u2019s thesis, MIT, 1999."},{"key":"10.1016\/j.comcom.2010.12.006_b0235","unstructured":"M. Backes, C. Cachin, A. Oprea, Lazy revocation in cryptographic file systems, in: SISW\u201905: Proceedings of the Third IEEE International Security in Storage Workshop, 2005."},{"key":"10.1016\/j.comcom.2010.12.006_b0240","unstructured":"A.C. Squicciarini, F. Paci, E. Bertino, A. Trombetta, S. Braghin, Group-based negotiations in p2p systems, IEEE Transactions on Parallel and Distributed Systems 99 (PrePrints). doi:http:\/\/doi.ieeecomputersociety.org\/10.1109\/TPDS.2010.25."},{"key":"10.1016\/j.comcom.2010.12.006_b0245","series-title":"Databases, Information Systems, and Peer-to-Peer Computing","first-page":"385","article-title":"A comparative study of pub\/sub methods in structured p2p networks","author":"Bender","year":"2006"},{"key":"10.1016\/j.comcom.2010.12.006_b0250","series-title":"Networked Group Communication","first-page":"30","article-title":"Scribe: the design of a large-scale event notification infrastructure","author":"Rowstron","year":"2001"},{"key":"10.1016\/j.comcom.2010.12.006_b0255","series-title":"INFOCOM \u201906: 25th IEEE International Conference on Computer Communications","article-title":"SmartSeer: using a DHT to process continuous queries over peer-to-peer networks","author":"Kannan","year":"2006"},{"key":"10.1016\/j.comcom.2010.12.006_b0260","series-title":"HOT-P2P \u201910: Seventh International Workshop on Hot Topics in Peer-to-Peer Systems","article-title":"Efficient DHT attack mitigation through peers\u2019 ID distribution","author":"Cholez","year":"2010"},{"key":"10.1016\/j.comcom.2010.12.006_b0265","series-title":"IPTPS \u201901: Revised Papers from the First International Workshop on Peer-to-Peer Systems","first-page":"242","article-title":"Complex queries in dht-based peer-to-peer networks","author":"Harren","year":"2002"},{"key":"10.1016\/j.comcom.2010.12.006_b0270","series-title":"WSDM \u201910: Proceedings of the third ACM international conference on Web search and data mining","first-page":"51","article-title":"Tagging human knowledge","author":"Heymann","year":"2010"},{"key":"10.1016\/j.comcom.2010.12.006_b0275","unstructured":"Google Wonder Wheel explained, <http:\/\/www.googlewonderwheel.com>, 2009."},{"key":"10.1016\/j.comcom.2010.12.006_b0280","unstructured":"Yahoo! Tag Explorer, <http:\/\/tagexplorer.sandbox.yahoo.com>, 2008."},{"key":"10.1016\/j.comcom.2010.12.006_b0285","series-title":"HOT-P2P \u201910: Seventh International Workshop on Hot Topics in Peer-to-Peer Systems","article-title":"Tagging with DHARMA, a DHT-based approach for resource mapping through approximation","author":"Aiello","year":"2010"},{"key":"10.1016\/j.comcom.2010.12.006_b0290","doi-asserted-by":"crossref","unstructured":"B. Markines, C. Cattuto, F. Menczer, D. Benz, A. Hotho, G. Stumme, Evaluating similarity measures for emergent semantics of social tagging, in: WWW \u201909: 18th World Wide Web conference, 2009.","DOI":"10.1145\/1526709.1526796"},{"key":"10.1016\/j.comcom.2010.12.006_b0295","doi-asserted-by":"crossref","unstructured":"M. Srivatsa, L. Xiong, L. Liu, TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks, in: WWW \u201905: 14th international conference on World Wide Web, 2005, pp. 422\u2013431, <http:\/\/doi.acm.org\/10.1145\/1060745.1060808>.","DOI":"10.1145\/1060745.1060808"},{"key":"10.1016\/j.comcom.2010.12.006_b0300","unstructured":"D.J. Watts, S.H. Strogatz, Collective dynamics of \u2018small-world\u2019 networks, Nature 393 (6684) (1998) 440\u2013442. URL <http:\/\/dx.doi.org\/10.1038\/30918>."},{"key":"10.1016\/j.comcom.2010.12.006_b0305","doi-asserted-by":"crossref","unstructured":"B. Yu, P.M. Singh, Incentive mechanisms for peer-to-peer systems, in: Second International Workshop on Agents and Peer-to-Peer Computing, 2003, pp. 77\u201388.","DOI":"10.1007\/978-3-540-25840-7_9"},{"key":"10.1016\/j.comcom.2010.12.006_b0310","doi-asserted-by":"crossref","unstructured":"K.G. Anagnostakis, F.C. Harmantzis, S. Ioannidis, M. Zghaibeh, On the impact of practical p2p incentive mechanisms on user behavior, Tech. rep., NET Institute, 2006.","DOI":"10.2139\/ssrn.941168"},{"issue":"5","key":"10.1016\/j.comcom.2010.12.006_b0315","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1145\/502059.502053","article-title":"Storage management and caching in past, a large-scale, persistent peer-to-peer storage utility","volume":"35","author":"Rowstron","year":"2001","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"10.1016\/j.comcom.2010.12.006_b0320","series-title":"HOTOS \u201901: Proceedings of the Eighth Workshop on Hot Topics in Operating Systems","first-page":"113","article-title":"Don\u2019t trust your file server","author":"Mazieres","year":"2001"},{"key":"10.1016\/j.comcom.2010.12.006_b0325","unstructured":"E.-J. Goh, H. Shacham, N. Modadugu, D. Boneh, Sirius: Securing remote untrusted storage, in: NDSS\u201903: Internet Society (ISOC) Network and Distributed Systems Security Symposium, 2003, pp. 131\u2013145."},{"issue":"5895","key":"10.1016\/j.comcom.2010.12.006_b0330","doi-asserted-by":"crossref","first-page":"1465","DOI":"10.1126\/science.1160379","article-title":"reCAPTCHA: human-based character recognition via web security measures","volume":"321","author":"von Ahn","year":"2008","journal-title":"Science"},{"key":"10.1016\/j.comcom.2010.12.006_b0335","doi-asserted-by":"crossref","unstructured":"D. Romero, J. Kleinberg, The directed closure process in hybrid social-information networks, with an analysis of link formation on twitter, in: AIII \u201910: Proceedings of Fourth International AAAI Conference on Weblogs and Social Media, 2010.","DOI":"10.1609\/icwsm.v4i1.14015"},{"key":"10.1016\/j.comcom.2010.12.006_b0340","unstructured":"Likir official website, <http:\/\/likir.di.unito.it>, 2010."}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366410005037?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366410005037?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,6,4]],"date-time":"2023-06-04T15:17:30Z","timestamp":1685891850000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366410005037"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1]]},"references-count":68,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,1]]}},"alternative-id":["S0140366410005037"],"URL":"https:\/\/doi.org\/10.1016\/j.comcom.2010.12.006","relation":{},"ISSN":["0140-3664"],"issn-type":[{"type":"print","value":"0140-3664"}],"subject":[],"published":{"date-parts":[[2012,1]]}}}