Skip to main content

Enabling Interoperable and Selective Data Sharing among Social Networking Sites

  • Conference paper

Abstract

With the widespread use of social networking (SN) sites and even introduction of a social component in non-social oriented services, there is a growing concern over user privacy in general, how to handle and share user profiles across SN sites in particular. Although there have been several proprietary or open source-based approaches to unifying the creation of third party applications, the availability and retrieval of user profile information are still limited to the site where the third party application is run, mostly devoid of the support for data interoperability. In this paper we propose an approach to enabling interopearable and selective data sharing among SN sites. To support selective data sharing, we discuss an authenticated dictionary (ADT)-based credential which enables a user to share only a subset of her information certified by external SN sites with applications running on an SN site. For interoperable data sharing, we propose an extension to the OpenSocial API so that it can provide an open source-based framework for allowing the ADT-based credential to be used seamlessly among different SN sites.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Facebook Connect, http://developers.facebook.com/connect.php

  2. MySpace Data Availability (DA), http://developer.myspace.com

  3. OpenSocial Foundation, http://www.opensocial.org

  4. OpenSocial pages at Google Code, http://code.google.com/apis/opensocial

  5. Anagnostopoulos, A., Goodrich, M.T., Tamassia, R.: Persistent authenticated dictionaries and their applications. In: Proceedings of 4th International Conference on Information Security, Malaga, Spain, October 1-3 (2001)

    Google Scholar 

  6. Brands, S.: Rethinking Public Key Infrastructure and Digital Certificates - Building in Privacy. MIT Press, Cambridge (2000)

    Google Scholar 

  7. Camenisch, J., Herreweghen, E.V.: Design and implementation of the idemix anonymous credential system. In: Proceedings of 9th ACM Conference on Computer and Communication Security, Alexandria, VA, November 7-11 (2002)

    Google Scholar 

  8. Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Proceedings of 3rd Conference on Security in Communication Networks, Amalfi, Italy, September 12-13 (2002)

    Google Scholar 

  9. Chaum, D.: Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM 28(10), 1030–1044 (1985)

    Article  Google Scholar 

  10. Chaum, D.: Achieving electronic privacy. Scientific American, 96–101 (August 1992)

    Google Scholar 

  11. Goodrich, M.T., Tamassia, R., Schwerin, A.: Implementation of an authenticated dictionary with skip lists and commutative hashing. In: DISCEX II (2001)

    Google Scholar 

  12. Gross, R., Acquisti, A., Heinz III., H.J.: Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, Alexandria, VA, November 7 (2005)

    Google Scholar 

  13. Liu, H., Maes, P.: Interestmap: Harvesting social network profiles for recommendations. In: Proceedings of IUI Beyond Personalization 2005: A Workshop on the Next Stage of Recommender Systems Research, San Diego, CA, January 9 (2005)

    Google Scholar 

  14. Lopes, R., Shin, D.: Controlled sharing of identity attributes for better privacy. In: Proceedings of the 2nd International Workshop on Trusted Collaboration, White Plains, USA, November 12-15 (2007)

    Google Scholar 

  15. Merkle, R.C.: A digital signature based on a conventional encryption function. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 369–378. Springer, Heidelberg (1988)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Shin, D., Lopes, R. (2009). Enabling Interoperable and Selective Data Sharing among Social Networking Sites. In: Bertino, E., Joshi, J.B.D. (eds) Collaborative Computing: Networking, Applications and Worksharing. CollaborateCom 2008. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 10. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03354-4_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03354-4_33

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03353-7

  • Online ISBN: 978-3-642-03354-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics