03-related-work.tex 2.6 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768
  1. \chapter{Related Work}
  2. \label{ch:related-work}
  3. This chapter gives a comprehensive overview about different projects trying to protect the users' personal data in online social networks. Hereby, six different approaches are presented. First, extensions are considered that make the use of established social networks more secure. Then, alternative social networks will be presented that have placed the protection of personal data at the center. Thereafter two next generation social networks will be considered, which take advantage of the blockchain technology and belong to the group of dApps. Finally, the ActivityPub protocol is presented, which maps the communication in decentralized platforms. The chapter concludes with a summary of the related work.
  4. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
  5. % For each project, write about
  6. % - how is data stored
  7. % - how is communication realized
  8. % - how is data accessed (authorization)
  9. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
  10. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
  11. % Extensions for better privacy
  12. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
  13. \section{Privacy through Extensions}
  14. \label{sec:extensions}
  15. Existing connections to other people and already created content can bind users to platforms. This so-called lock-in effect prevents users from switching to another platform. In the following, Twitterize and FaceCloak are two approaches that make the use of Twitter and Facebook safer by protecting data.
  16. \subsection{Twitterize}
  17. \label{sec:twitterize}
  18. \input{content/03-related-work/twitterize}
  19. \subsection{FaceCloak}
  20. \label{sec:facecloak}
  21. \input{content/03-related-work/facecloak}
  22. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
  23. % Privacy-protecting Social Networks
  24. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
  25. \section{Privacy-protecting Social Networks}
  26. \label{sec:privacy-protecting-social-networks}
  27. \subsection{diaspora*}
  28. \label{sec:diaspora}
  29. \input{content/03-related-work/diaspora}
  30. \subsection{LifeSocial.KOM}
  31. \label{sec:lifesocial}
  32. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
  33. % dApps
  34. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
  35. \section{dApps - The Next Generation Social Networks}
  36. \subsection{Akasha}
  37. \label{sec:akasha}
  38. \input{content/03-related-work/akasha}
  39. \subsection{Peepeth}
  40. \label{sec:peepeth}
  41. \input{content/03-related-work/peepeth}
  42. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
  43. % Protocols
  44. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
  45. \section{Protocols}
  46. \label{sec:protocols}
  47. \subsection{ActivityPub}
  48. \label{sec:activitypub}
  49. \input{content/03-related-work/activitypub}
  50. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
  51. % Summary
  52. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
  53. \section{Summary}
  54. \label{sec:related-work-summary}