Skip to main content

Privacy and E-Authentication: The Dangers of Self-disclosure in Social Networks

  • Conference paper
Exploring the Grand Challenges for Next Generation E-Business (WEB 2009)

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 52))

Included in the following conference series:

  • 1235 Accesses

Abstract

We propose a Bayesian model of privacy in e-authentication and develop associated entropy-based metrics. A major contribution of this work is the application of weighted entropy to characterize the user’s privacy preferences. Further, we model the effects of side information on privacy and relate it to self-disclosure on Internet web sites and social networks. Specifically, our empirical study of Internet users’ information disclosure habits within social networks along with the theoretical results provide insights into building a regulatory framework to address privacy concerns in e-authentication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Belis, M., Guiasu, S.: Quantitative-Qualitative Measure of Information in Cybernetic Systems. IEEE Transactions on Information Theory 14, 593–594 (1968)

    Article  Google Scholar 

  2. Bennett, C.H., Brassard, G., Crépeau, C., Maurer, U.M.: Generalized Privacy Amplification. IEEE Transactions on Information Theory 41, 1915–1923 (1995)

    Article  Google Scholar 

  3. Burr, W.E., Dodson, D.F., Polk, W.T.: Electronic Authentication Guideline: Recommendations of the National Institute of Standards and Technology. NIST Special Publication 800-63 Version 1.0.2, National Institute of Standards and Technology, NIST (2006)

    Google Scholar 

  4. Caroline, H.: Comparison of Insiders’ Optimal Strategies Depending on the Type of Side-Information. Stochastic Processes and their Applications 115, 1603–1627 (2005)

    Article  Google Scholar 

  5. Chen, Y., Liginlal, D.: Bayesian Networks for Knowledge-Based Authentication. IEEE Transactions on Knowledge and Data Engineering 19, 695–710 (2007)

    Article  Google Scholar 

  6. Chen, Y., Liginlal, D.: Information Disclosure on the Internet-A Machine Learning Perspective. Working Paper, University of Wisconsin-Madison (2008)

    Google Scholar 

  7. Chokhani, S.: Knowledge Based Authentication (KBA) Metrics. In: KBA Symposium-Knowledge Based Authentication: Is It Quantifiable?, Gaithersburg, MD (2004)

    Google Scholar 

  8. Cover, T., Thomas, J.: Elements of Information Theory. Wiley, Chichester (2006)

    Google Scholar 

  9. Dunbar, R.I.M.: Neocortex Size as a Constraint on Group Size in Primates. Journal of Human Evolution 20, 469–493 (1992)

    Article  Google Scholar 

  10. Ellison, C., Hall, C., Milbert, R., Schneier, B.: Protecting Secret Keys with Personal Entropy. Future Generation Computer Systems 16, 311–318 (2000)

    Article  Google Scholar 

  11. Guiasu, S.: Weighted Entropy. Reports on Mathematical Physics 2, 165–179 (1971)

    Article  Google Scholar 

  12. Haga, W.J., Zviran, M.: Cognitive passwords: from theory to practice. Data Processing and Communications Security 3, 19–23 (1989)

    Google Scholar 

  13. Hastings, N.E., Dodson, D.F.: Quantifying Assurance of Knowledge Based Authentication. In: 3rd European Conference on Information Warfare and Security, ECIW 2004 (2004)

    Google Scholar 

  14. He, J., Chu, W.W., Liu, Z.: Inferring Privacy Information from Social Networks. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, F.-Y. (eds.) ISI 2006. LNCS, vol. 3975, pp. 154–165. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  15. Hillairet, C.: Comparison of Insiders’ Optimal Strategies Depending on the Type of Side-Information. Stochastic Processes and their Applications 114, 1603–1627 (2005)

    Article  Google Scholar 

  16. Karmeshu, J.: Entropy Measures, Maximum Entropy Principle and Emerging Applications. Springer, Heidelberg (2003)

    Book  Google Scholar 

  17. Lawler, B.: Models of Knowledge Based Authentication (KBA). In: KBA Symposium-Knowledge Based Authentication: Is It Quantifiable?, Gaithersburg, MD (2004)

    Google Scholar 

  18. Lowry, S.: Challenge & Response within E-Authentication Framework. In: KBA Symposium-Knowledge Based Authentication: Is It Quantifiable?, Gaithersburg, MD (2004)

    Google Scholar 

  19. Milgram, S.: The Small-World Problem. Psychology Today 1, 61–67 (1967)

    Google Scholar 

  20. Millett, L.I., Holden, H.S.: Authentication and its Privacy Effects. IEEE Internet Computing 6, 54–58 (2003)

    Article  Google Scholar 

  21. Pearl, J.: Probabilistic Reasoning in Intelligence Systems. Morgan, San Maleo (1988)

    Google Scholar 

  22. Shannon, C.E.: Channels with Side Information at the Transmitter. IBM J. Res. Develop, 289–293 (1958)

    Google Scholar 

  23. Theil, H.: Disutility as a Probability. Management Science 20, 109–116 (1980)

    Google Scholar 

  24. US National Research Council. Who Goes There? Authentication through the Lens of Privacy. Nat’l Academy Press, Washington (2003)

    Google Scholar 

  25. Watts, D.J., Dodds, P.S., Newman, M.E.J.: Identity and Search in Social Networks. Science 296, 1302–1305 (2002)

    Article  Google Scholar 

  26. Westin, A.: Privacy and Freedom. Atheneum, New York (1967)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liginlal, D., Khansa, L. (2010). Privacy and E-Authentication: The Dangers of Self-disclosure in Social Networks. In: Sharman, R., Rao, H.R., Raghu, T.S. (eds) Exploring the Grand Challenges for Next Generation E-Business. WEB 2009. Lecture Notes in Business Information Processing, vol 52. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17449-0_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17449-0_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17448-3

  • Online ISBN: 978-3-642-17449-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics