Sweets: A Decentralized Social Networking Service Application Using Data Synchronization on Mobile Devices

  • Rongchang Lai
  • Yasushi Shinjo
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 201)


Conventional Social Networking Services (SNSs) or Online Social Networks (OSNs) are implemented based on a centralized architecture, and this centralization causes privacy problems. This paper describes Sweets, a decentralized SNS application that synchronizes tweets among users’ own mobile devices and enables users to retain ownership of their data. Sweets provides user authentication and access control without centralized servers. Sweets improves the data availability using an indirect replication scheme. Experimental results show that Sweets has a feasible performance over a 4G cellular network.


Decentralized Social Networking Services (DSNSs) Decentralized Online Social Networks (DOSNs) Data synchronization Decentralized user authentication High data availability Access control 


  1. 1.
    Baden, R., Bender, A., Spring, N., Bhattacharjee, B., Starin, D.: Persona: an online social network with user-defined privacy. In: The ACM SIGCOMM 2009 Conference on Data Communication, pp. 135–146 (2009)Google Scholar
  2. 2.
    Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321–334 (2007)Google Scholar
  3. 3.
  4. 4.
    Daemen, J., Rijmen, V.: The Design of Rijndael: AES-The Advanced Encryption Standard. Springer Science & Business Media, Heidelberg (2013)zbMATHGoogle Scholar
  5. 5.
    Datta, A., Buchegger, S., Vu, L.H., Strufe, T., Rzadca, K.: Decentralized online social networks. In: Furht, B. (ed.) Handbook of Social Network Technologies and Applications, pp. 349–378. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  6. 6.
    Durr, M., Maier, M., Dorfmeister, F.: Vegas-a secure and privacy-preserving peer-to-peer online social network. In: 2012 International Conference on Privacy, Security, Risk and Trust (PASSAT), pp. 868–874. IEEE (2012)Google Scholar
  7. 7.
    Figueiredo, R.J., Boykin, P.O., Juste, P.S., Wolinsky, D.: Integrating overlay and social networks for seamless P2P networking. In: Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 93–98. IEEE (2008)Google Scholar
  8. 8.
    Freitas, M.: Twister-a P2P microblogging platform. arXiv preprint (2013). arXiv:1312.7152
  9. 9.
    Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM (2006)Google Scholar
  10. 10.
    Greenwald, G.: No Place to Hide. Metropolitan Books, New York (2014)Google Scholar
  11. 11.
    Huang, L., Wang, S., Hsu, C.H., Zhang, J., Yang, F.: Using reputation measurement to defend mobile social networks against malicious feedback ratings. J. Supercomput. 71(6), 2190–2203 (2015)CrossRefGoogle Scholar
  12. 12.
  13. 13.
  14. 14.
  15. 15.
    Shinjo, Y., Kunyao, X., Kainuma, N., Nobori, D., Sato, A.: Friend news system: a modern implementation of Usenet over social VPNs. In: 7th IEEE International Conference on Social Computing and Networking, pp. 432–440 (2014)Google Scholar
  16. 16.
    Softether VPN Project.

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2017

Authors and Affiliations

  • Rongchang Lai
    • 1
  • Yasushi Shinjo
    • 1
  1. 1.Department of Computer ScienceUniversity of TsukubaTsukubaJapan

Personalised recommendations