Skip to main content

Preserving the User’s Privacy in Social Networking Sites

  • Conference paper
Trust, Privacy, and Security in Digital Business (TrustBus 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8058))

Abstract

In the last years, social networking sites (SNSs) have enjoyed an undeniable success. Those web platforms have huge quantities of active users sharing lots of information everyday. Usually, user-generated content may be almost innocuous, however, some studies have shown that it may also contain very sensitive personal data. This situation may pose a serious privacy threat to the users due to the fact that third parties can gather and exploit that knowledge for their own benefit. There are some proposals in the literature that try to address this situation. Nevertheless, they fail to provide a practical solution capable of working with well-known SNSs. In this paper, we propose a new scheme that fills this gap. More specifically, we present a privacy-preserving system that enables the users to decide which individuals (e.g., other users, third parties or even the SNS itself) can access to their user profiles. We have implemented our scheme to be used by Facebook users. We have run some tests with our prototype and the results show that the added overhead is affordable.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. McMillan, G.: Twitter reveals active user number, how many actually say something. In: Time - Techland (September 2011)

    Google Scholar 

  2. Consumer Reports National Research Center: Annual state of the net survey 2010. Consumer Reports 75(6) (2010)

    Google Scholar 

  3. Zhang, C., Sun, J., Zhu, X., Fang, Y.: Privacy and security for online social networks: Challenges and opportunities. IEEE Network 24(4), 13–18 (2010)

    Article  Google Scholar 

  4. Staddon, J., Huffaker, D., Larking, B., Sedley, A.: Are privacy concerns a turn-off? engagement and privacy in social networks. In: Proc. of the Eighth Symposium on Usable Privacy and Security, SOUPS 2012 (2012)

    Google Scholar 

  5. Zheleva, E., Getoor, L.: To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles. In: Proc. of the 18th International Conference on World Wide Web, WWW 2009, pp. 531–540 (2009)

    Google Scholar 

  6. Van Eecke, P., Truyens, M.: Privacy and social networks. Computer Law & Security Review 26(5), 535–546 (2010)

    Article  Google Scholar 

  7. Bilton, B.: Price of facebook privacy? start clicking. In: The New York Times (May 2010)

    Google Scholar 

  8. Wilson, D.: Users are worried about social network security and privacy. The Inquirer (October 2011)

    Google Scholar 

  9. Crimes, S.: Twitter sells old tweets to marketers - should users be worried? The Inquirer (March 2012)

    Google Scholar 

  10. Dhia, I., Abdessalem, T., Sozio, M.: Primates: a privacy management system for social networks. In: Proc. of the 21st ACM International Conference on Information and Knowledge Management, CIKM 2012, pp. 2746–2748 (2012)

    Google Scholar 

  11. Cheek, G., Shehab, M.: Privacy management for online social networks. In: Proc. of the 21st International Conference Companion on World Wide Web, WWW 2012, pp. 475–476 (2012)

    Google Scholar 

  12. Aimeur, E.: Privacy management for online social networks. In: Proc. of the International Conference on Availability, Reliability, and Security, ARES 2010, pp. 172–179 (2010)

    Google Scholar 

  13. Baden, R., Bender, A., Spring, N., Bhattacharjee, B.: Persona: an online social network with user-defined privacy. In: Proc. of the ACM SIGCOMM 2009 Conference on Data Communication, SIGCOMM 2009, pp. 135–146 (2009)

    Google Scholar 

  14. Diaspora, http://joindiaspora.com (last accessed: February 12, 2013)

  15. Vaughan-Nichols, S.: Diaspora: It’s no facebook ... yet. Computerworld (September 2010)

    Google Scholar 

  16. Cutillo, L., Molva, R., Strufe, T.: Safebook: A privacy-preserving online social network leveraging on real-life trust. IEEE Communications Magazine 47(12), 94–101 (2009)

    Article  Google Scholar 

  17. Vu, L., Aberer, K., Buchegger, S., Datta, A.: Enabling secure secret sharing in distributed online social networks. In: Proc. of the Annual Computer Security Applications Conference, ACSAC 2009, pp. 419–428 (2009)

    Google Scholar 

  18. Nilizadeh, S., Jahid, S., Mittal, P., Borisov, N., Kapadia, A.: Cachet: a decentralized architecture for privacy preserving social networking with caching. In: Proc. of the 8th International Conference on Emerging Networking Experiments and Technologies – CoNEXT 2012, pp. 337–348 (2012)

    Google Scholar 

  19. Scoble, R.: Facebook disabled my account. In: Scobleizer (January 2008)

    Google Scholar 

  20. Guha, S., Tang, K., Francis, P.: NOYB: Privacy in online social networks. In: Proc. of the First Workshop on Online Social Networks (2008)

    Google Scholar 

  21. Luo, W., Xie, Q., Hengartner, U.: Facecloak: an architecture for user privacy on social networking sites. In: Proc. of the 2009 International Conference on Computational Science and Engineering, pp. 26–33 (2009)

    Google Scholar 

  22. Conti, M., Hasani, A., Crispo, B.: Virtual private social networks. In: Proc. of the First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, pp. 39–50 (2011)

    Google Scholar 

  23. Westfeld, A.: F5 - a steganographic algorithm. In: Proc. of the 4th International Workshop on Information Hiding, IHW 2001, pp. 289–302 (2001)

    Google Scholar 

  24. Reed, I., Solomon, G.: Polynomial codes over certain finite fields. Journal of the Society for Industrial and Applied Mathematics (SIAM) 8(2), 300–304 (1960)

    Article  MathSciNet  MATH  Google Scholar 

  25. Naor, D., Naor, M., Lotspiech, J.: Revocation and tracing schemes for stateless receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41–62. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Viejo, A., Castellà-Roca, J., Rufián, G. (2013). Preserving the User’s Privacy in Social Networking Sites. In: Furnell, S., Lambrinoudakis, C., Lopez, J. (eds) Trust, Privacy, and Security in Digital Business. TrustBus 2013. Lecture Notes in Computer Science, vol 8058. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40343-9_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40343-9_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40342-2

  • Online ISBN: 978-3-642-40343-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics