ABSTRACT
This paper presents the potential for blockchain based solutions to disrupt the world of social networking. We offer Ushare, a user centric blockchain supported social media network that enables users to control, trace and claim ownership of every piece of content they share. Harnessing peer-to-peer capabilities of the blockchain technology allows a truly decentralized, secure, anonymous and traceable content distribution network. Ushare consists of four key components: the blockchain, a hash table with encrypted content shared by a user, a Turing complete relationship system to control the the maximum number of shares performed by user's circle members and a local personal certificate authority that manages the user's circles and encrypts data to be shared before it is broadcasted to the network.
- M. Ali, J. Nelson, R. Shea, and M. J. Freedman. Blockstack: A global naming and storage system secured by blockchains. In 2016 USENIX Annual Technical Conference (USENIX ATC 16), 2016. Google ScholarDigital Library
- M. Andrychowicz, S. Dziembowski, D. Malinowski, and L. Mazurek. Secure multiparty computations on bitcoin. In 2014 IEEE Symposium on Security and Privacy, pages 443--458. IEEE, 2014. Google ScholarDigital Library
- J. Ball. Nsas prism surveillance program: how it works and what it can do. The Guardian, 8, 2013.Google Scholar
- J. P. Barlow. A declarationof the independence of cyberspace, 1996.Google Scholar
- G. Baxendale. Can blockchain revolutionise eprs? ITNOW, 58(1):38--39, 2016.Google ScholarCross Ref
- I. Bentov and R. Kumaresan. How to use bitcoin to design fair protocols. In International Cryptology Conference, pages 421--439. Springer, 2014.Google ScholarCross Ref
- V. Buterin. A next-generation smart contract and decentralized application platform. white paper, 2014.Google Scholar
- R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic. Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation computer systems, 25(6):599--616, 2009. Google ScholarDigital Library
- C. Cachin. Architecture of the hyperledger blockchain fabric. 2016.Google Scholar
- F. Chang, J. Dean, S. Ghemawat, W. C. Hsieh, D. A. Wallach, M. Burrows, T. Chandra, A. Fikes, and R. E. Gruber. Bigtable: A distributed storage system for structured data. ACM Transactions on Computer Systems (TOCS), 26(2):4, 2008. Google ScholarDigital Library
- D. Chaum, A. Fiat, and M. Naor. Untraceable electronic cash. In Proceedings on Advances in cryptology, pages 319--327. Springer-Verlag New York, Inc., 1990. Google ScholarDigital Library
- P. Devanbu, M. Gertz, C. Martel, and S. G. Stubblebine. Authentic third-party data publication. In Data and Application Security, pages 101--112. Springer, 2002. Google ScholarDigital Library
- V. Goel. Facebook tinkers with users emotions in news feed experiment, stirring outcry. The New York Times, 2014.Google Scholar
- S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg. Proofs of ownership in remote storage systems. In Proceedings of the 18th ACM conference on Computer and communications security, pages 491--500. ACM, 2011. Google ScholarDigital Library
- B. Hardekopf. The big data breaches of 2014. Forbes, January, 13, 2015.Google Scholar
- A. Hayes. Evidence for bitcoin. Altcoin Price Efficiency: Miners' Arbitrage in Cryptocurrency Markets, 2014.Google Scholar
- S. King and S. Nadal. Ppcoin: Peer-to-peer crypto-currency with proof-of-stake. self-published paper, August, 19, 2012.Google Scholar
- D. Konforty, Y. Adam, D. Estrada, and L. G. Meredith. Synereo: The decentralized and distributed social network. 2015.Google Scholar
- A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. University of Maryland and Cornell University, 2015.Google Scholar
- P. Linder. Decryption contract enforcement tool (decent): A practical alternative to government decryption backdoors.Google Scholar
- J. Manyika, M. Chui, B. Brown, J. Bughin, R. Dobbs, C. Roxburgh, and A. H. Byers. Big data: The next frontier for innovation, competition, and productivity. 2011.Google Scholar
- S. Nakamoto. Bitcoin: A peer-to-peer electronic cash system, 2008.Google Scholar
- S. D. Norberhuis. MultiChain: A cybercurrency for cooperation. PhD thesis, TU Delft, Delft University of Technology, 2015.Google Scholar
- R. Pass et al. Micropayments for decentralized currencies. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pages 207--218. ACM, 2015. Google ScholarDigital Library
- M. Peck. The bitcoin arms race is on! IEEE Spectrum, 6(50), 2013.Google Scholar
- G. W. Peters and E. Panayi. Understanding modern banking ledgers through blockchain technologies: Future of transaction processing and smart contracts on the internet of money. Available at SSRN 2692487, 2015.Google Scholar
- C. Rong and G. Zhao. System for protecting an encrypted information unit, Oct. 7 2014. US Patent 8,855,317.Google Scholar
- M. Swan. Blockchain: Blueprint for a new economy. "O'Reilly Media, Inc.", 2015. Google ScholarDigital Library
- P. Vasin. Blackcoins proof-of-stake protocol v2, 2014.Google Scholar
- G. Wood. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper, 2014.Google Scholar
- G. Zyskind, O. Nathan, and A. Pentland. Enigma: Decentralized computation platform with guaranteed privacy. arXiv preprint arXiv:1506.03471, 2015.Google Scholar
Index Terms
- Ushare: user controlled social media based on blockchain
Recommendations
When Fitness Meets Social Networks: Investigating Fitness Tracking and Social Practices on WeRun
CHI '17: Proceedings of the 2017 CHI Conference on Human Factors in Computing SystemsThe last two decades have seen growing interest in promoting physical activities by using self-tracking technologies. Previous work has identified social interactions in self-tracking as a crucial factor in motivating users to exercise. However, it is ...
Investigating Homophily in Online Social Networks
WI-IAT '10: Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 01Similarity breeds connections, the principle of homophily, has been well studied in existing sociology literature. %Several studies have observed this phenomena by conducting surveys on human subjects. These studies have concluded that new ties are ...
Research on Blockchain-Based Identity Authentication Scheme in Social Networks
Machine Learning for Cyber SecurityAbstractIn service-oriented social network, aiming at the unreliability problems of reviews submitted by users to the service vendors, this paper puts forword a blockchain-based identity authentication scheme. By considering the features of openness and ...
Comments