[. Androulaki, S. M. Choi, T. Bellovin, and . Malkin, Reputation Systems for Anonymous Networks, Proceedings of the 8th International Symposium on Privacy Enhancing Technologies, PETS '08, pp.202-218, 2008.
DOI : 10.1007/978-3-540-70630-4_13

[. Anderson, C. Diaz, J. Bonneau, and F. Stajano, Privacy-enabling social networking over untrusted networks, Proceedings of the 2nd ACM workshop on Online social networks, WOSN '09, pp.1-6, 2009.
DOI : 10.1145/1592665.1592667

[. Aiello and G. Ruffo, LotusNet: Tunable privacy for distributed online social network services, Computer Communications, vol.35, issue.1, pp.75-88, 2012.
DOI : 10.1016/j.comcom.2010.12.006

R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin, Persona: An Online Social Network with User-defined Privacy, Proceedings of the ACM SIGCOMM 2009 Conference on Data Communication , SIGCOMM '09, pp.135-146, 2009.

[. Bodriagov, G. Kreitz, and S. Buchegger, Access control in decentralized online social networks: Applying a policy-hiding cryptographic scheme and evaluating its performance, 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS), pp.622-628, 2014.
DOI : 10.1109/PerComW.2014.6815278

[. Buchegger, D. Schiöberg, L. Vu, and A. Datta, PeerSoN: P2P social networking, Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, SNS '09, pp.46-52, 2009.
DOI : 10.1145/1578002.1578010

[. Bethencourt, A. Sahai, and B. Waters, Ciphertext-Policy Attribute-Based Encryption, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.321-334, 2007.
DOI : 10.1109/SP.2007.11

P. Castro, A. Druschel, A. Ganesh, D. S. Rowstron, and . Wallach, Secure routing for structured peer-to-peer overlay networks, ACM SIGOPS Operating Systems Review, vol.36, issue.SI, pp.299-314, 2002.
DOI : 10.1145/844128.844156

R. [. Cutillo, T. Molva, O. Strufe-[-cswh01-]-ian-clarke, B. Sandberg, T. W. Wiley et al., Safebook: A privacy-preserving online social network leveraging on real-life trust Freenet: A Distributed Anonymous Information Storage and Retrieval System, International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability, pp.4794-101, 2001.

[. Dingledine, N. Mathewson, and P. Syverson, Tor: The second-generation onion router, Proceedings of the 13th USENIX Security Symposium, 2008.
DOI : 10.21236/ADA465464

[. Günther, M. Manulis, and T. Strufe, Cryptographic Treatment of Private User Profiles, Proceedings of the 2011 International Conference on Financial Cryptography and Data Security, pp.40-54, 2012.
DOI : 10.1007/978-3-642-29889-9_5

M. [. Gracia-tinedo, P. Artigas, . García, and . López, Analysis of data availability in F2F storage systems: When correlations matter, 2012 IEEE 12th International Conference on Peer-to-Peer Computing (P2P), pp.225-236, 2012.
DOI : 10.1109/P2P.2012.6335803

[. Ioannidis, L. Massoulie, and A. Chaintreau, Distributed Caching over Heterogeneous Mobile Networks, Proceedings of the ACM SIG- METRICS International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS '10, pp.311-322, 2010.

[. Isdal, M. Piatek, A. Krishnamurthy, and T. Anderson, Privacy-preserving P2p Data Sharing with OneSwarm, Proceedings of the ACM SIGCOMM 2010 Conference, SIGCOMM '10, pp.111-122, 2010.

[. John, F. , and Y. Heather, Handbook of Peer-to- Peer Networking

S. S. Jahid, P. Nilizadeh, N. Mittal, A. Borisov, and . Kapadia, DECENT: A decentralized architecture for enforcing privacy in online social networks, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, pp.326-332, 2012.
DOI : 10.1109/PerComW.2012.6197504

[. Katz, A. Sahai, and B. Waters, Predicate Encryption Supporting Disjunctions, Polynomial Equations , and Inner Products, Proceedings of the Theory and Applications of Cryptographic Techniques 27th Annual International Conference on Advances in Cryptology , EUROCRYPT'08, pp.146-162, 2008.

A. Menezes and B. Ustaoglu, On reusing ephemeral keys in Diffie-Hellman key agreement protocols, International Journal of Applied Cryptography, vol.2, issue.2, pp.154-158, 2010.
DOI : 10.1504/IJACT.2010.038308

[. Nilizadeh, N. Alam, N. Husted, and A. Kapadia, Pythia, Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, WPES '11, pp.43-48, 2011.
DOI : 10.1145/2046556.2046562

S. Njm-+-12-]-shirin-nilizadeh, P. Jahid, N. Mittal, A. Borisov, and . Kapadia, Cachet: A Decentralized Architecture for Privacy Preserving Social Networking with Caching, Proceedings of the 8th International Conference on Emerging Networking Experiments and Technologies, CoNEXT '12, pp.337-348, 2012.

B. [. Popescu, A. S. Crispo, and . Tanenbaum, Safe and private data sharing with turtle: Friends team-up and beat the system. Lectures notes in computer science, 2004.

[. Pietilänen and C. Diot, Dissemination in opportunistic social networks, Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing, MobiHoc '12, pp.165-174
DOI : 10.1145/2248371.2248396

A. [. Sharma, M. Datta, P. Deh-'amico, and . Michiardi, An empirical study of availability in friend-to-friend storage systems, 2011 IEEE International Conference on Peer-to-Peer Computing, pp.348-351, 2011.
DOI : 10.1109/P2P.2011.6038754

G. Russell, K. M. Shirey, K. E. Hopkinson, D. D. Stewart, B. J. Hodson et al., Analysis of Implementations to Secure Git for Use As an Encrypted Distributed Version Control System, Proceedings of the 2015 48th Hawaii International Conference on System Sciences, HICSS '15, pp.5310-5319, 2015.

. Soler, The retroshare Project https://retroshare, p.2017

]. M. Tmb-+-13, K. Taghizadeh, S. Micinski, C. Biswas, E. Ofria et al., Distributed Cooperative Caching in Social Wireless Networks, IEEE Transactions on Mobile Computing, vol.12, issue.6, pp.1037-1053, 2013.

G. Toth, Design of a Social Messaging System Using Stateful Multicast

A. [. Thilakarathna, A. Viana, H. Seneviratne, and . Petander, Design and Analysis of an Efficient Friend-to-Friend Content Dissemination System, IEEE Transactions on Mobile Computing, vol.16, issue.3, pp.702-715, 2017.
DOI : 10.1109/TMC.2016.2570747

URL : https://hal.archives-ouvertes.fr/hal-01369954

[. Wachs, A Secure and Resilient Communication Infrastructure for Decentralized Networking Applications

[. Wilcox-o-'hearn and B. Warner, Tahoe: The Least-authority Filesystem, Proceedings of the 4th ACM International Workshop on Storage Security and Survivability, StorageSS '08, pp.21-26, 2008.

[. Zantout and R. Haraty, I2p data communication system, Proceedings of ICN 2011 The Tenth International Conference on Networks, 2011.

[. Zuo and A. Iamnitchi, A Survey of Socially Aware Peer-to-Peer Systems, ACM Computing Surveys, vol.49, issue.1, pp.1-928, 2016.
DOI : 10.1016/j.comcom.2015.07.013

R. N°-9107 and R. Centre-grenoble-?-rhône-alpes, Inovallée 655 avenue de l'Europe Montbonnot 38334 Saint Ismier Cedex Publisher Inria Domaine de Voluceau -Rocquencourt BP 105 -78153 Le Chesnay Cedex inria, pp.249-6399