Skip to main content
Log in

Preventing sensitive relationships disclosure for better social media preservation

  • Regular Contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

A fundamental aspect of all social networks is information sharing. It is one of the most common forms of online interaction that is tightly associated with social media preservation and information disclosure. As such, information sharing is commonly viewed as a key enabler for social media preservation tasks. In the current situation, where information sharing and inter-user communications are made instantly possible via the widespread use of ubiquitous technologies, privacy related, and particularly information disclosure issues, are the obvious, much discussed, immediate consequences of information sharing. As a result, information disclosure, especially when multimedia data come to play, is critical for appropriate social media preservation strategies that consider and respect the privacy of social network users. Social media preservation must align with privacy protection solutions and consequently must protect sensitive information that social network users would like to keep private. In this paper, we propose a new approach to implement a privacy-oriented social media preservation strategy that prevents the disclosure of sensitive information. Instead of using a preserve-all strategy, we present a framework to personalize social media preservation tasks. We then describe our proposed rule-based algorithm to evaluate information disclosure addressing mainly relationship type disclosure and using shared photos. We also provide an experimental study to investigate the efficiency and the relevance of our approach.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Notes

  1. http://www.facebook.com.

  2. http://www.linkedin.com.

  3. http://www.twitter.com.

  4. http://www.digitalpreservationeurope.eu.

  5. Library of Congress, NDIIPP Program Background, http://www.digitalpreservation.gov/library/program_back.html.

  6. It represents any person that will, willingly or unwillingly, breach the user’s privacy and uncover sensitive information.

  7. Friend of a Friend (FOAF), http://xmlns.com/foaf/spec/.

  8. The exchangeable image file format (EXIF), http://www.exif.org.

  9. SIOC Core Ontology Specification, (SIOC), http://sioc-project.org/ontology.

  10. The Dublin Core Metadata Initiative (DCMI), http://dublincore.org.

  11. This type of replication allows to replicate the part of data that was modified without having to copy the entire content of the master database (“Public SN”) at each stimulating event.

  12. http://vocab.org/relationship/.html.

  13. By default, we consider the following categories: child (age \(\le \) 13), teenager ( 14 \(\le \) age \(\le \) 18), adult (19 \(\le \) age \(\le \) 60), and senior (age \(\ge \) 61).

  14. http://www.pewinternet.org/Press-Releases/2011/Socialnetworking-sites-and-our-lives.aspx.

References

  1. Aimeur, E., Gambs, S., Ho, A.: Towards a privacy-enhanced social networking site. In: Availability, Reliability, and Security, 2010. ARES ’10 International Conference on, pp. 172–179 (2010). doi:10.1109/ARES.2010.97

  2. Banos, V., Baltas, N., Manolopoulos, Y.: Trends in blog preservation (2012)

  3. Besmer, A., Richter Lipford, H.: Moving beyond untagging: photo privacy in a tagged world. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’10, pp. 1563–1572. ACM (2010)

  4. Bodriagov, O., Buchegger, S.: P2p social networks with broadcast encryption protected privacy. In: Camenisch, J., Crispo, B., Fischer-Hübner, S., Leenes, R., Russello, G. (eds.) Privacy and Identity Management for Life, IFIP Advances in Information and Communication Technology, vol. 375, pp. 197–206. Springer, Boston (2012)

    Google Scholar 

  5. Boongoen, T., Shen, Q., Price, C.: Disclosing false identity through hybrid link analysis. Artif. Intell. Law 18(1), 77–102 (2010)

    Article  Google Scholar 

  6. Campbell, L.E., Dulabahn, B.: Digital preservation: the twitter archives and NDIIPP. In: iPRES 2010: Proceedings of the International Conference on Preservation of Digital Objects (2010)

  7. Chakaravarthy, V.T., Gupta, H., Roy, P., Mohania, M.K.: Efficient techniques for document sanitization. In: Proceedings of the 17th ACM conference on Information and knowledge management, CIKM ’08, pp. 843–852. ACM, New York, USA (2008). doi:10.1145/1458082.1458194

  8. Clemons, E.: Monetizing the internet: surely there must be something other than advertising. In: System Sciences, 2009. HICSS ’09. 42nd Hawaii International Conference on, pp. 1–10 (2009). doi:10.1109/HICSS.2009.312

  9. Damiani, E., Pagano, F., Pagano, D.: iprivacy: a distributed approach to privacy on the cloud. Int. J. Adv. Secur. 4(3 and 4), 185–197 (2012)

    Google Scholar 

  10. Dwork, C.: Differential privacy. ICALP 2, 1–12 (2006)

    MathSciNet  MATH  Google Scholar 

  11. Esslimani, I., Brun, A., Boyer, A.: From social networks to behavioral networks in recommender systems. In: Social Network Analysis and Mining, 2009. ASONAM’09. International Conference on Advances in, pp. 143–148. IEEE (2009)

  12. Fong, P.W.: Relationship-based access control: protection model and policy language. In: Proceedings of the first ACM conference on Data and application security and privacy, CODASPY ’11, pp. 191–202. ACM (2011)

  13. Freni, D.: Ruiz Vicente, C., Mascetti, S., Bettini, C., Jensen, C.S.: Preserving location and absence privacy in geo-social networks. In: Proceedings of the 19th ACM International Conference on Information and Knowledge Management, CIKM ’10, pp. 309–318. ACM, New York, USA (2010)

  14. Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42(4), 14:1–14:53 (2010). doi:10.1145/1749603.1749605

    Article  Google Scholar 

  15. Gessiou, E., Vu, Q.H., Ioannidis, S.: Irild: An information retrieval based method for information leak detection. In: Computer Network Defense (EC2ND), 2011 Seventh European Conference on, pp. 33–40 (2011). doi:10.1109/EC2ND.2011.21

  16. Hart, J., Ridley, C., Taher, F., Sas, C., Dix, A.: Exploring the facebook experience: a new approach to usability. In: Proceedings of the 5th Nordic Conference on Human-Computer Interaction: Building Bridges. NordiCHI ’08, pp. 471–474. ACM, New York, USA (2008)

  17. Hedges, M., Blanke, T., Hasan, A.: Rule-based curation and preservation of data: a data grid approach using irods. Future Gener. Comput. Syst. 25(4), 446–452 (2009). doi:10.1016/j.future.2008.10.003

    Article  Google Scholar 

  18. Houghton, D.J., Joinson, A.N.: Privacy, social network sites, and social relations. J. Technol. Hum. Serv. 28(1–2), 74–94 (2010). doi:10.1080/15228831003770775

    Article  Google Scholar 

  19. Hunter, J., Choudhury, S.: Panic: an integrated approach to the preservation of composite digital objects using semantic web services. Int. J. Digit. Libr. 6, 174–183 (2006). doi:10.1007/s00799-005-0134-z

    Article  Google Scholar 

  20. Johnson, M., Egelman, S., Bellovin, S.M.: Facebook and privacy: it’s complicated. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS ’12, pp. 1–15. ACM (2012)

  21. Kifer, D.: Attacks on privacy and definetti’s theorem. In: SIGMOD Conference, pp. 127–138 (2009)

  22. Li, N., Zhang, N., Das, S.: Relationship privacy preservation in publishing online social networks. In: Privacy, Security, Risk and Trust (passat), 2011 IEEE Third International Conference on Social Computing (socialcom), pp. 443–450 (2011). doi:10.1109/PASSAT/SocialCom.191

  23. Liu, Y., Gummadi, K.P., Krishnamurthy, B., Mislove, A.: Analyzing facebook privacy settings: user expectations vs. reality. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, IMC ’11, pp. 61–70. ACM (2011)

  24. Lu, X., Wang, C., Yang, J.M., Pang, Y., Zhang, L.: Photo2trip: generating travel routes from geo-tagged photos for trip planning. In: Proceedings of the International Conference on Multimedia. MM ’10, pp. 143–152. ACM, New York, USA (2010)

  25. Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: L-diversity: privacy beyond k-anonymity. In: Data Engineering, 2006. ICDE ’06. Proceedings of the 22nd International Conference on, pp. 24–24 (2006). doi:10.1109/ICDE.2006.1

  26. Marketakis, Y., Tzanakis, M., Tzitzikas, Y.: Prescan: towards automating the preservation of digital objects. In: Proceedings of the International Conference on Management of Emergent Digital EcoSystems, MEDES ’09, pp. 60:404–60:411. ACM, New York, USA (2009)

  27. McCown, F., Nelson, M.: What happens when facebook is gone. In: Proceedings of the 9th ACM/IEEE-CS Joint Conference on Digital Libraries, pp. 251–254. ACM (2009)

  28. McNealy, J.: Privacy implications of digital preservation: social media archives and the social networks theory of privacy. Elon L. Rev. 3, 133 (2011)

    Google Scholar 

  29. Musial, K., Kazienko, P.: Social networks on the internet. World Wide Web pp. 1–42 (2012). doi:10.1007/s11280-011-0155-z

  30. Nettleton, D.F., Abril, D.: Document sanitization: measuring search engine information loss and risk of disclosure for the wikileaks cables. In: Domingo-Ferrer, J., Tinnirello, I. (eds.) Privacy in Statistical Databases, Lecture Notes in Computer Science, vol. 7556, pp. 308–321. Springer, Berlin Heidelberg (2012). doi:10.1007/978-3-642-33627-0_24

    Chapter  Google Scholar 

  31. Nourian, A., Maheswaran, M.: Measuring the availability of images posted on social media sites. In: Computer Communications and Networks (ICCCN), 2012 21st International Conference on, pp. 1–5 (2012). doi:10.1109/ICCCN.2012.6289206

  32. Onnela, J.P., Saramki, J., Hyvnen, J., Szab, G., Lazer, D., Kaski, K., Kertsz, J., Barabsi, A.L.: Structure and tie strengths in mobile communication networks. Proc. Natl. Acad. Sci. 104(18), 7332–7336 (2007). doi:10.1073/pnas.0610245104

    Article  Google Scholar 

  33. Raad, E., Chbeir, R., Dipanda, A.: Discovering relationship types between users using profiles and shared photos in a social network. Multimed. Tools Appl. 64(1), 141–170 (2013). doi:10.1007/s11042-011-0853-7

    Article  Google Scholar 

  34. Ranjbar, A., Maheswaran, M.: Community-centric approaches for confidentiality management in online systems. In: Computer Communications and Networks (ICCCN), 2011 Proceedings of 20th International Conference on, pp. 1–6. IEEE (2011)

  35. Ren, F., Wu, Y.: Predicting user-topic opinions in twitter with social and topical context. Affect. Comput. IEEE Trans. 4(4), 412–424 (2013)

    Article  Google Scholar 

  36. Ross, S.: Digital preservation, archival science and methodological foundations for digital libraries. New Rev. Inf. Netw. 17(1), 43–68 (2012). doi:10.1080/13614576.2012.679446

    Article  Google Scholar 

  37. Sawant, N., Li, J., Wang, J.: Automatic image semantic interpretation using social action and tagging data. Multimed. Tools Appl. 51, 213–246 (2011). doi:10.1007/s11042-010-0650-8

    Article  Google Scholar 

  38. Scheffer, T.: Finding association rules that trade support optimally against confidence. In: De Raedt, L., Siebes, A. (eds.) Principles of Data Mining and Knowledge Discovery, Lecture Notes in Computer Science, vol. 2168, pp. 424–435. Springer, Berlin / Heidelberg (2001)

  39. Singla, P., Kautz, H., Luo, J., Gallagher, A.: Discovery of social relationships in consumer photo collections using markov logic. In: Computer Vision and Pattern Recognition Workshops, 2008. CVPRW ’08. IEEE Computer Society Conference on, pp. 1–7 (2008)

  40. Staddon, J., Golle, P., Zimny, B.: Web-based inference detection. In: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, SS’07, pp. 6:1–6:16. USENIX Association, Berkeley, USA (2007)

  41. Surowiecki, J.: The wisdom of crowds: Why the Many are smarter than the few. Doubleday Books, New York (2004)

    Google Scholar 

  42. Watry, P.: Digital preservation theory and application: transcontinental persistent archives testbed activity. Int. J. Digit. Curation 2(2), 41–68 (2008)

    Article  Google Scholar 

  43. Zhang, C., Sun, J., Zhu, X., Fang, Y.: Privacy and security for online social networks: challenges and opportunities. Network IEEE 24(4), 13–18 (2010). doi:10.1109/MNET.2010.5510913

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bechara Al Bouna.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Raad, E., Al Bouna, B. & Chbeir, R. Preventing sensitive relationships disclosure for better social media preservation. Int. J. Inf. Secur. 15, 173–194 (2016). https://doi.org/10.1007/s10207-015-0278-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-015-0278-9

Keywords

Navigation