{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:26:12Z","timestamp":1759134372362,"version":"3.41.0"},"reference-count":60,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2013,9,1]],"date-time":"2013-09-01T00:00:00Z","timestamp":1377993600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Dutch STW-Sentinel S-MOBILE Project, contract no. VIT.7627"},{"DOI":"10.13039\/501100004963","name":"Seventh Framework Programme","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003407","name":"Ministero dell'Istruzione, dell'Universit\u00e0 e della Ricerca","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003407","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Web"],"published-print":{"date-parts":[[2013,9]]},"abstract":"<jats:p>The popularity of Social Networking Sites (SNS) is growing rapidly, with the largest sites serving hundreds of millions of users and their private information. The privacy settings of these SNSs do not allow the user to avoid sharing some information (e.g., name and profile picture) with all the other users. Also, no matter the privacy settings, this information is always shared with the SNS (that could sell this information or be hacked). To mitigate these threats, we recently introduced the concept of Virtual Private Social Networks (VPSNs).<\/jats:p>\n          <jats:p>In this work we propose the first complete architecture and implementation of VPSNs for Facebook. In particular, we address an important problem left unexplored in our previous research\u2014that is the automatic propagation of updated profiles to all the members of the same VPSN. Furthermore, we made an in-depth study on performance and implemented several optimization to reduce the impact of VPSN on user experience.<\/jats:p>\n          <jats:p>The proposed solution is lightweight, completely distributed, does not depend on the collaboration from Facebook, does not have a central point of failure, it offers (with some limitations) the same functionality as Facebook, and apart from some simple settings, the solution is almost transparent to the user. Thorough experiments, with an extended set of parameters, we have confirmed the feasibility of the proposal and have shown a very limited time-overhead experienced by the user while browsing Facebook pages.<\/jats:p>","DOI":"10.1145\/2516633.2516636","type":"journal-article","created":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T18:14:28Z","timestamp":1380651268000},"page":"1-31","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Virtual private social networks and a facebook implementation"],"prefix":"10.1145","volume":"7","author":[{"given":"Mauro","family":"Conti","sequence":"first","affiliation":[{"name":"University of Padua, Padua, Italy"}]},{"given":"Arbnor","family":"Hasani","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam, Netherlands"}]},{"given":"Bruno","family":"Crispo","sequence":"additional","affiliation":[{"name":"University of Trento, Italy"}]}],"member":"320","published-online":{"date-parts":[[2013,9,30]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIW.2009.45"},{"volume-title":"Proceedings of the International Conference on Availability, Reliability, and Security (ARES'10)","author":"Aimeur E.","key":"e_1_2_1_2_1","unstructured":"Aimeur , E. , Gambs , S. , and Ho , A . 2010. Towards a privacy-enhanced social networking site . In Proceedings of the International Conference on Availability, Reliability, and Security (ARES'10) . 172--179. Aimeur, E., Gambs, S., and Ho, A. 2010. Towards a privacy-enhanced social networking site. In Proceedings of the International Conference on Availability, Reliability, and Security (ARES'10). 172--179."},{"key":"e_1_2_1_3_1","unstructured":"AOL. 2011. Web page test. http:\/\/www.webpagetest.org\/.  AOL. 2011. Web page test. http:\/\/www.webpagetest.org\/."},{"key":"e_1_2_1_4_1","unstructured":"Archiveexploits. 2012. Facebook's servers was hacked again by inj3ct0r team. http:\/\/inj3ct0r.com\/exploits\/13403.  Archiveexploits. 2012. Facebook's servers was hacked again by inj3ct0r team. http:\/\/inj3ct0r.com\/exploits\/13403."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592585"},{"volume-title":"Proceedings of the 11th International Conference on Privacy Enhancing technologies (PETS'11)","author":"Beato F.","key":"e_1_2_1_6_1","unstructured":"Beato , F. , Kohlweiss , M. , and Wouters , K . 2011. Scramble&excl; your social network data . In Proceedings of the 11th International Conference on Privacy Enhancing technologies (PETS'11) . 211--225. Beato, F., Kohlweiss, M., and Wouters, K. 2011. Scramble&excl; your social network data. In Proceedings of the 11th International Conference on Privacy Enhancing technologies (PETS'11). 211--225."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00393.x"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1943513.1943522"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/380749.380767"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1943513.1943521"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.5350374"},{"key":"e_1_2_1_12_1","unstructured":"Daniel G. Maxwell S. Raphael S. and Ilya Z. 2010. Diaspora&ast;. http:\/\/www.joindiaspora.com\/.  Daniel G. Maxwell S. Raphael S. and Ilya Z. 2010. Diaspora&ast;. http:\/\/www.joindiaspora.com\/."},{"key":"e_1_2_1_13_1","volume-title":"Hummingbird: Privacy at the time of twitter. Cryptology ePrint Archive, Report 2011\/640","author":"De Cristofaro E.","year":"2011","unstructured":"De Cristofaro , E. , Soriente , C. , Tsudik , G. , and Williams , A . 2011 . Hummingbird: Privacy at the time of twitter. Cryptology ePrint Archive, Report 2011\/640 . http:\/\/eprint.iacr.org\/. De Cristofaro, E., Soriente, C., Tsudik, G., and Williams, A. 2011. Hummingbird: Privacy at the time of twitter. Cryptology ePrint Archive, Report 2011\/640. http:\/\/eprint.iacr.org\/."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom-CPSCom.2010.18"},{"key":"e_1_2_1_15_1","unstructured":"Dybwad B. 2010. Facebook and others caught sending user data to advertisers. http:\/\/mashable.com\/2010\/05\/20\/facebook-caught-sending-user-data-to-advertisers\/.  Dybwad B. 2010. Facebook and others caught sending user data to advertisers. http:\/\/mashable.com\/2010\/05\/20\/facebook-caught-sending-user-data-to-advertisers\/."},{"key":"e_1_2_1_16_1","unstructured":"Facebook. 2012a. http:\/\/www.facebook.com.  Facebook. 2012a. http:\/\/www.facebook.com."},{"key":"e_1_2_1_17_1","unstructured":"Facebook. 2012b. Facebook data use policy. http:\/\/www.facebook.com\/about\/privacy\/.  Facebook. 2012b. Facebook data use policy. http:\/\/www.facebook.com\/about\/privacy\/."},{"volume-title":"Proceedings of the Workshop on Web 2.0 Security and Privacy (W2SP'08)","author":"Felt A.","key":"e_1_2_1_18_1","unstructured":"Felt , A. and Evans , D . 2008. Privacy protection for social networking apis . In Proceedings of the Workshop on Web 2.0 Security and Privacy (W2SP'08) . Felt, A. and Evans, D. 2008. Privacy protection for social networking apis. In Proceedings of the Workshop on Web 2.0 Security and Privacy (W2SP'08)."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE.2008.43"},{"key":"e_1_2_1_20_1","unstructured":"Foundation X. S. 2012. Xep-0060: Publish-subscribe. http:\/\/xmpp.org\/extensions\/xep-0060.html.  Foundation X. S. 2012. Xep-0060: Publish-subscribe. http:\/\/xmpp.org\/extensions\/xep-0060.html."},{"volume-title":"Proceedings of the International Parallel and Distributed Processing Symposium (IPDPS'06)","author":"Ganguly A.","key":"e_1_2_1_21_1","unstructured":"Ganguly , A. , Agrawal , A. , Boykin , P. O. , and Figueiredo , R . 2006. Ip over p2p: enabling self-configuring virtual ip networks for grid computing . In Proceedings of the International Parallel and Distributed Processing Symposium (IPDPS'06) . 49--49. Ganguly, A., Agrawal, A., Boykin, P. O., and Figueiredo, R. 2006. Ip over p2p: enabling self-configuring virtual ip networks for grid computing. In Proceedings of the International Parallel and Distributed Processing Symposium (IPDPS'06). 49--49."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1594173.1594174"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102214"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1397735.1397747"},{"key":"e_1_2_1_25_1","unstructured":"Hasani A. 2012. Virtual private social networks website. http:\/\/sites.google.com\/site\/fbprivacy2010\/.  Hasani A. 2012. Virtual private social networks website. http:\/\/sites.google.com\/site\/fbprivacy2010\/."},{"key":"e_1_2_1_26_1","unstructured":"Hay M. Miklau G. Jensen D. Weis P. and Srivastava S. 2007. Anonymizing social networks. Tech. rep. 07-19 University of Massachusetts Amherst.  Hay M. Miklau G. Jensen D. Weis P. and Srivastava S. 2007. Anonymizing social networks. Tech. rep. 07-19 University of Massachusetts Amherst."},{"key":"e_1_2_1_27_1","unstructured":"Isode.com. 2012. M-link server. http:\/\/www.isode.com\/products\/m-link.html.  Isode.com. 2012. M-link server. http:\/\/www.isode.com\/products\/m-link.html."},{"key":"e_1_2_1_28_1","unstructured":"Jabberes.Org. 2011. http:\/\/www.jabberes.org\/servers\/.  Jabberes.Org. 2011. http:\/\/www.jabberes.org\/servers\/."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1943513.1943520"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1578002.1578007"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1458082.1458123"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1943513.1943526"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456403.1456405"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.387"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.19"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718519"},{"key":"e_1_2_1_37_1","unstructured":"Mozilla. 2012a. Chrome registration. https:\/\/developer.mozilla.org\/en-US\/docs\/Chrome_Registration&num;content accessible.  Mozilla. 2012a. Chrome registration. https:\/\/developer.mozilla.org\/en-US\/docs\/Chrome_Registration&num;content accessible."},{"key":"e_1_2_1_38_1","unstructured":"Mozilla. 2012b. Http requests observers. https:\/\/developer.mozilla.org\/en-US\/docs\/Setting_HTTP_request_headers.  Mozilla. 2012b. Http requests observers. https:\/\/developer.mozilla.org\/en-US\/docs\/Setting_HTTP_request_headers."},{"key":"e_1_2_1_39_1","unstructured":"Mozilla. 2012c. Observer notifications. https:\/\/developer.mozilla.org\/en\/Observer_Notifications.  Mozilla. 2012c. Observer notifications. https:\/\/developer.mozilla.org\/en\/Observer_Notifications."},{"key":"e_1_2_1_40_1","unstructured":"Mozilla. 2012d. Venkman javascript debugger project page. https:\/\/developer.mozilla.org\/en-US\/docs\/Venkman.  Mozilla. 2012d. Venkman javascript debugger project page. https:\/\/developer.mozilla.org\/en-US\/docs\/Venkman."},{"key":"e_1_2_1_41_1","unstructured":"Mozilla. 2012e. Xpcom nsiprocess interface. https:\/\/developer.mozilla.org\/en-US\/docs\/Code_snippets\/Running_applications.  Mozilla. 2012e. Xpcom nsiprocess interface. https:\/\/developer.mozilla.org\/en-US\/docs\/Code_snippets\/Running_applications."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.22"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993053.1993055"},{"key":"e_1_2_1_44_1","unstructured":"Primelife. 2011. Clique. http:\/\/clique.primelife.eu\/.  Primelife. 2011. Clique. http:\/\/clique.primelife.eu\/."},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1513876.1513878"},{"volume-title":"Proceedings of the Third International COST264 Workshop on Networked Group Communication. 30--43","author":"Rowstron A.","key":"e_1_2_1_46_1","unstructured":"Rowstron , A. , Kermarrec , A.-M. , Castro , M. , and Druschel , P . 2001. Scribe: The design of a large-scale event notification infrastructure . In Proceedings of the Third International COST264 Workshop on Networked Group Communication. 30--43 . Rowstron, A., Kermarrec, A.-M., Castro, M., and Druschel, P. 2001. Scribe: The design of a large-scale event notification infrastructure. In Proceedings of the Third International COST264 Workshop on Networked Group Communication. 30--43."},{"key":"e_1_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Saint-Andre P. 2010. Extensible Messaging and Presence Protocol (XMPP): Instant Messaging and Presence. http:\/\/xmpp.org\/rfcs\/rfc3921.html.  Saint-Andre P. 2010. Extensible Messaging and Presence Protocol (XMPP): Instant Messaging and Presence. http:\/\/xmpp.org\/rfcs\/rfc3921.html.","DOI":"10.17487\/rfc6121"},{"key":"e_1_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Saint-Andre P. 2011a. Extensible Messaging and Presence Protocol (XMPP): Core. RFC 6120.  Saint-Andre P. 2011a. Extensible Messaging and Presence Protocol (XMPP): Core. RFC 6120.","DOI":"10.17487\/rfc6120"},{"key":"e_1_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Saint-Andre P. 2011b. Extensible Messaging and Presence Protocol (XMPP): Instant Messaging and Presence. RFC 6121.  Saint-Andre P. 2011b. Extensible Messaging and Presence Protocol (XMPP): Instant Messaging and Presence. RFC 6121.","DOI":"10.17487\/rfc6121"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774219"},{"key":"e_1_2_1_51_1","unstructured":"Tabakoff N. 2009. Facebook users are sitting ducks for identity theft. http:\/\/www.dailytelegraph.com.au\/news\/facebook-users-sitting-ducks-for-identity-theft\/story-e6freuy9-122580713389\/.  Tabakoff N. 2009. Facebook users are sitting ducks for identity theft. http:\/\/www.dailytelegraph.com.au\/news\/facebook-users-sitting-ducks-for-identity-theft\/story-e6freuy9-122580713389\/."},{"key":"e_1_2_1_52_1","unstructured":"TheCoccinella.Org. 2011. http:\/\/thecoccinella.org\/servers\/servers_by_pubsub_pep.html.  TheCoccinella.Org. 2011. http:\/\/thecoccinella.org\/servers\/servers_by_pubsub_pep.html."},{"key":"e_1_2_1_53_1","unstructured":"van Amstel B. Groeneveld F. and Borsboom B. 2010. Please rob me. http:\/\/pleaserobme.com\/.  van Amstel B. Groeneveld F. and Borsboom B. 2010. Please rob me. http:\/\/pleaserobme.com\/."},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.46"},{"key":"e_1_2_1_55_1","unstructured":"Wolfe-Wylie W. 2010. The harm of facebook pictures. http:\/\/www.torontosun.com\/life\/2010\/08\/10\/14978476.html.  Wolfe-Wylie W. 2010. The harm of facebook pictures. http:\/\/www.torontosun.com\/life\/2010\/08\/10\/14978476.html."},{"key":"e_1_2_1_56_1","unstructured":"XMPP Protocol. 2011. http:\/\/xmpp.org\/\/.  XMPP Protocol. 2011. http:\/\/xmpp.org\/\/."},{"key":"e_1_2_1_57_1","unstructured":"XMPP.org. 2011. http:\/\/xmpp.org\/services\/.  XMPP.org. 2011. http:\/\/xmpp.org\/services\/."},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1556460.1556499"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSNC.2010.30"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526781"}],"container-title":["ACM Transactions on the Web"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2516633.2516636","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2516633.2516636","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:10:12Z","timestamp":1750234212000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2516633.2516636"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9]]},"references-count":60,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,9]]}},"alternative-id":["10.1145\/2516633.2516636"],"URL":"https:\/\/doi.org\/10.1145\/2516633.2516636","relation":{},"ISSN":["1559-1131","1559-114X"],"issn-type":[{"type":"print","value":"1559-1131"},{"type":"electronic","value":"1559-114X"}],"subject":[],"published":{"date-parts":[[2013,9]]},"assertion":[{"value":"2011-11-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2013-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2013-09-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}