skip to main content
10.1145/1943513.1943521acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
research-article

Virtual private social networks

Published:21 February 2011Publication History

ABSTRACT

Social Networking Sites (SNSs) are having a significant impact on the social life of many people - even beyond the millions of people that use them directly. These websites usually allow users to present a profile of themselves through a long list of very detailed information. However, even when such SNSs have advanced privacy policies, users are often not aware of their settings and, on top of that, users cannot abstain from sharing a minimum set of information (e.g. name and location). Such a small set of information has been proven to be enough to completely re-identify a user [22, 25].

In this work we introduce the concept of Virtual Private Social Networks (VPSNs), a concept inspired by the one of Virtual Private Networks in traditional computer networks. We argue that VPSNs can mitigate the privacy issues of SNSs, building private social networks that leverage architecture publicly available for SNSs. Furthermore, we propose FaceVPSN, which is an implementation of VPSNs for Facebook, one of the most used SNSs. FaceVPSN is the first privacy threats mitigation solution that has a light and completely distributed architecture - no coordinator is required. Furthermore, it can be implemented without any particular collaboration from the SNS platform. Finally, experimental evaluation shows that FaceVPSN adds a limited overhead, which, we argue, is acceptable for the user.

References

  1. Virtual private social networks website. http://sites.google.com/site/fbprivacy2010/.Google ScholarGoogle Scholar
  2. Please rob me, June 2010. http://pleaserobme.com/.Google ScholarGoogle Scholar
  3. E. Aimeur, S. Gambs, and A. Ho. UPP: User privacy policy for social networking sites. In Proceedings of the Fourth International Conference on Internet and Web Applications and Services, pages 267--272. IEEE Computer Society, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. E. Aimeur, S. Gambs, and A. Ho. Towards a privacy-enhanced social networking site. In International Conference on Availability Reliability and Security, volume 0, pages 172--179. IEEE Computer Society, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  5. R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin. Persona: an online social network with user-defined privacy. In Proceedings of the ACM Conference on Data Communication, pages 135--146. ACM Press, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. M. Boyd and N. B. Ellison. Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication., 13(1):Article 11, 2007.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. L. A. Cutillo, R. Molva, and T. Strufe. Safebook: A privacy-preserving online social network leveraging on real-life trust. IEEE Communicaions Magazine, 47(12), December 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. B. Dybwad. Facebook and others caught sending user data to advertisers, 2010. http://mashable.com/2010/05/20/facebook-caught-sending-user-data-to-advertisers/.Google ScholarGoogle Scholar
  9. Facebook. http://www.facebook.com.Google ScholarGoogle Scholar
  10. Facebook. Facebook's privacy policy. http://www.facebook.com/policy.php.Google ScholarGoogle Scholar
  11. A. Felt and D. Evans. Privacy protection for social networking apis. In W2SP '08: in Conjunction with the 2008 IEEE Symposium on Security and Privacy. IEEE Computer Society, 2008.Google ScholarGoogle Scholar
  12. R. Gross and A. Acquisti. Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM workshop on Privacy in the Electronic Society, pages 71--80. ACM Press, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. S. Guha, K. Tang, and P. Francis. Noyb: Privacy in online social networks. In Proceedings of the First Workshop on Online Social Networks, pages 49--54. ACM Press, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. Hay, G. Miklau, D. Jensen, P. Weis, and S. Srivastava. Anonymizing social networks. Technical Report 07-19, University of Massachusetts Amherst, March 2007.Google ScholarGoogle Scholar
  15. M. Kacimi, S. Ortolani, and B. Crispo. Anonymous opinion exchange over untrusted social networks. In SNS '09: Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, pages 26--32. ACM Press, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. A. Korolova, R. Motwani, S. U. Nabar, and Y. Xu. Link privacy in social networks. In Proceeding of the 17th ACM conference on Information and Knowledge Management, pages 289--298. ACM Press, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. M. M. Lucas and N. Borisov. Flybynight: Mitigating the privacy risks of social networking. In Proceedings of the 7th ACM workshop on Privacy in the Electronic Society, pages 1--8. ACM Press, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. W. Luo, Q. Xie, and U. Hengartner. Facecloak: An architecture for user privacy on social networking sites. In Proceedings of the 2009 International Conference on Computational Science and Engineering, pages 26--33. IEEE Computer Society, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. A. Mislove, B. Viswanath, K. P. Gummadi, and P. Druschel. You are who you know: Inferring user profiles in online social networks. In Proceedings of the third ACM International Conference on Web Search and Data Mining, pages 251--260. ACM Press, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Mozilla. Observer notifications. https://developer.mozilla.org/en/Observer_Notifications.Google ScholarGoogle Scholar
  21. Mozilla. Venkman javascript debugger project page. http://www.mozilla.org/projects/venkman/.Google ScholarGoogle Scholar
  22. A. Narayanan and V. Shmatikov. De-anonymizing social networks. In Proceedings of the 30th IEEE Symposium on Security and Privacy, pages 173--187. IEEE Computer Society, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. A. of Exploits. Facebook's servers was hacked again by inj3ct0r team. http://inj3ct0r.com/exploits/13403.Google ScholarGoogle Scholar
  24. A. Sorniotti and R. Molva. Secret interest groups (sigs) in social networks with an implementation on facebook. In Proceedings of the 2008 ACM Symposium on Applied Computing, pages 621--628. ACM Press, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. L. A. Sweeney. http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/sweeney-thesis-draft.pdf.Google ScholarGoogle Scholar
  26. N. Tabakoff. Facebook users are sitting ducks for identity theft, 2009. http://www.dailytelegraph.com.au/news/facebook-users-sitting-ducks-for-identity-theft/story-e6freuy9-122580713389/.Google ScholarGoogle Scholar
  27. L.-H. Vu, K. Aberer, S. Buchegger, and A. Datta. Enabling secure secret sharing in distributed online social networks. In Proceedings of the Annual Computer Security Applications Conference, pages 419--428, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. W. Wolfe-Wylie. The harm of facebook pictures, 2010. http://www.torontosun.com/life/2010/08/10/14978476.html.Google ScholarGoogle Scholar
  29. A. L. Young and A. Quan-Haase. Information revelation and internet privacy concerns on social network sites: a case study of facebook. In Proceedings of the Fourth International Conference on Communities and Technologies, pages 265--274. ACM Press, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. E. Zheleva and L. Getoor. To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles. In Proceedings of the 18th International Conference on World Wide Web, pages 531--540. ACM Press, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Virtual private social networks

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            CODASPY '11: Proceedings of the first ACM conference on Data and application security and privacy
            February 2011
            294 pages
            ISBN:9781450304665
            DOI:10.1145/1943513

            Copyright © 2011 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 21 February 2011

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            Overall Acceptance Rate149of789submissions,19%

            Upcoming Conference

            CODASPY '24

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader