Reference Hub3
Centralized to Decentralized Social Networks: Factors that Matter

Centralized to Decentralized Social Networks: Factors that Matter

Maryam Qamar, Mehwish Malik, Saadia Batool, Sidra Mehmood, Asad W. Malik, Anis Rahman
Copyright: © 2016 |Pages: 18
ISBN13: 9781466697676|ISBN10: 1466697679|EISBN13: 9781466697683
DOI: 10.4018/978-1-4666-9767-6.ch003
Cite Chapter Cite Chapter

MLA

Qamar, Maryam, et al. "Centralized to Decentralized Social Networks: Factors that Matter." Managing and Processing Big Data in Cloud Computing, edited by Rajkumar Kannan, et al., IGI Global, 2016, pp. 37-54. https://doi.org/10.4018/978-1-4666-9767-6.ch003

APA

Qamar, M., Malik, M., Batool, S., Mehmood, S., Malik, A. W., & Rahman, A. (2016). Centralized to Decentralized Social Networks: Factors that Matter. In R. Kannan, R. Rasool, H. Jin, & S. Balasundaram (Eds.), Managing and Processing Big Data in Cloud Computing (pp. 37-54). IGI Global. https://doi.org/10.4018/978-1-4666-9767-6.ch003

Chicago

Qamar, Maryam, et al. "Centralized to Decentralized Social Networks: Factors that Matter." In Managing and Processing Big Data in Cloud Computing, edited by Rajkumar Kannan, et al., 37-54. Hershey, PA: IGI Global, 2016. https://doi.org/10.4018/978-1-4666-9767-6.ch003

Export Reference

Mendeley
Favorite

Abstract

This work covers the research work on decentralization of Online Social Networks (OSNs), issues with centralized design are studied with possible decentralized solutions. Centralized architecture is prone to privacy breach, p2p architecture for data and thus authority decentralization with encryption seems a possible solution. OSNs' users grow exponentially causing scalability issue, a natural solution is decentralization where users bring resources with them via personal machines or paid services. Also centralized services are not available unremittingly, to this end decentralization proposes replication. Decentralized solutions are also proposed for reliability issues arising in centralized systems and the potential threat of a central authority. Yet key to all problems isn't found, metadata may be enough for inferences about data and network traffic flow can lead to information on users' relationships. First issue can be mitigated by data padding or splitting in uniform blocks. Caching, dummy traffic or routing through a mix of nodes can be some possible solutions to the second.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.