{"id":109,"date":"2015-04-23T18:34:50","date_gmt":"2015-04-23T18:34:50","guid":{"rendered":"http:\/\/blog.soton.ac.uk\/g3\/?p=109"},"modified":"2015-04-27T12:52:37","modified_gmt":"2015-04-27T12:52:37","slug":"overview-of-standards-of-protocols","status":"publish","type":"post","link":"https:\/\/blog.soton.ac.uk\/g3\/2015\/04\/23\/overview-of-standards-of-protocols\/","title":{"rendered":"Overview of Standards of Protocols"},"content":{"rendered":"<p>Our social network provide 3 main features:<\/p>\n<ul>\n<li>Anonymity<\/li>\n<li>Instant massaging<\/li>\n<li>Live chat<\/li>\n<\/ul>\n<p><strong>&#8211; Data anonymization \u00a0<\/strong><\/p>\n<p>Our application is based on <strong>anonymity<\/strong>, which deals with hidden information such as user\u2019s identity. Even though we ask for university email in the registration, just for verification, system will not store users emails in the database. System will use user nickname to identify users. Even the nickname can be hidden from other users by using \u201cstranger\u201d as identification. In addition, <strong>End-to-end encryption<\/strong> will be used to avoid IP identification.<\/p>\n<p><strong>k-anonymity:<\/strong> can be used to personalize application users without compromising individual privacy. Personalization can helps to provide better services and to identify their interest or issues.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>-Instant messaging<\/strong><\/p>\n<p><strong>I2P:<\/strong> is a serverless instant messenger provided by QT software. The main characteristic of this protocol is <strong>fully anonymous<\/strong> based instant communication. No server can be between 2 user\u2019s conversations. No ISP can log. No information provide about whom the user chats. It is prevents any node between the two users from having access to the chat. So, I2p is ideal instant messaging solution for our social network. In addition, I2p support file transfer between the two parties.<\/p>\n<p>Extensible Messaging and Presence Protocol\u00a0(<strong>XMPP<\/strong>) can be used as instant messaging protocol for our social network. This protocol is open standard. however, it doesn&#8217;t\u00a0support\u00a0End-to-end encryption. To overcome this problem,\u00a0Off-the-Record Messaging\u00a0(<strong>OTR<\/strong>) can be used to provide encryption.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>&#8211; Live chat<\/strong><\/p>\n<p><strong>VPchat<\/strong> can be used to support live chat room. VPchat protocol uses a <strong>TCP<\/strong> connection.<\/p>\n<p><strong>Session Initiation Protocol (SIP)<\/strong> it is protocol for signaling media streams. This could be used in our social network to support voice call in conjunction with <strong>Real-time Transport Protocol (RTP)<\/strong><\/p>\n<p><strong>References:<\/strong><\/p>\n<ul>\n<li>Sweeney. <em>k<\/em>-anonymity (2002) a model for protecting privacy. <em>International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, <\/em>2; 557-570.<\/li>\n<li>Zantout, B., &amp; Haraty, R. (2011, January). I2p data communication system. In ICN 2011, The Tenth International Conference on Networks (pp. 401-409).<\/li>\n<\/ul>\n<ul>\n<li>I2p-bote features [online] <a href=\"http:\/\/i2pbote.i2p.us\">http:\/\/i2pbote.i2p.us<\/a><\/li>\n<li>Neal, L. (1997, November). Virtual classrooms and communities. In Proceedings of the international ACM SIGGROUP conference on Supporting group work: the integration challenge (pp. 81-90). ACM.<\/li>\n<li>Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., &#8230; &amp; Schooler, E. (2002). SIP: session initiation protocol.<\/li>\n<li>Frederick, R., Jacobson, V., &amp; Design, P. (2003). RTP: A transport protocol for real-time applications. IETF RFC3550.<\/li>\n<li>SIP [online] http:\/\/www.voip-info.org\/wiki\/view\/SIP<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Our social network provide 3 main features: Anonymity Instant massaging Live chat &#8211; Data anonymization \u00a0 Our application is based on anonymity, which deals with hidden information such as user\u2019s identity. Even though we ask for university email in the &hellip; <a href=\"https:\/\/blog.soton.ac.uk\/g3\/2015\/04\/23\/overview-of-standards-of-protocols\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":97387,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10539],"tags":[],"class_list":["post-109","post","type-post","status-publish","format-standard","hentry","category-overview-of-standards-and-protocols"],"_links":{"self":[{"href":"https:\/\/blog.soton.ac.uk\/g3\/wp-json\/wp\/v2\/posts\/109","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.soton.ac.uk\/g3\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.soton.ac.uk\/g3\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/g3\/wp-json\/wp\/v2\/users\/97387"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/g3\/wp-json\/wp\/v2\/comments?post=109"}],"version-history":[{"count":5,"href":"https:\/\/blog.soton.ac.uk\/g3\/wp-json\/wp\/v2\/posts\/109\/revisions"}],"predecessor-version":[{"id":151,"href":"https:\/\/blog.soton.ac.uk\/g3\/wp-json\/wp\/v2\/posts\/109\/revisions\/151"}],"wp:attachment":[{"href":"https:\/\/blog.soton.ac.uk\/g3\/wp-json\/wp\/v2\/media?parent=109"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/g3\/wp-json\/wp\/v2\/categories?post=109"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/g3\/wp-json\/wp\/v2\/tags?post=109"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}