skip to main content
10.1145/3205977.3205981acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
research-article

My Friend Leaks My Privacy: Modeling and Analyzing Privacy in Social Networks

Authors Info & Claims
Published:07 June 2018Publication History

ABSTRACT

With the dramatically increasing participation in online social networks (OSNs), huge amount of private information becomes available on such sites. It is critical to preserve users' privacy without preventing them from socialization and sharing. Unfortunately, existing solutions fall short meeting such requirements. We argue that the key component of OSN privacy protection is protecting (sensitive) content -- privacy as having the ability to control information dissemination. We follow the concepts of private information boundaries and restricted access and limited control to introduce a social circle model. We articulate the formal constructs of this model and the desired properties for privacy protection in the model. We show that the social circle model is efficient yet practical, which provides certain level of privacy protection capabilities to users, while still facilitates socialization. We then utilize this model to analyze the most popular social network platforms on the Internet (Facebook, Google+, WeChat, etc), and demonstrate the potential privacy vulnerabilities in some social networks. Finally, we discuss the implications of the analysis, and possible future directions.

References

  1. A. Acquisti. 2004. Privacy in Electronic Commerce and the Economics of Immediate Gratification Proceedings of the 5th ACM Electronic Commerce Conference. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. Acquisti and J. Grossklags. 2005. Privacy and Rationality in Decision Making. IEEE Security and Privacy (2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. I. Altman. 1975. The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Brooks/Cole Publishing, Monterey, CA.Google ScholarGoogle Scholar
  4. Lars Backstrom, Cynthia Dwork, and Jon Kleinberg. 2007. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In WWW. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Randy Baden, Adam Bender, Neil Spring, Bobby Bhattacharjee, and Daniel Starin. 2009. Persona: an online social network with user-defined privacy. SIGCOMM Comput. Commun. Rev. Vol. 39, 4 (2009), 135--146. Chao Lan, Xiaoli Li, Bo Luo, and Jun Huan. 2014. Automatic social circle detection using multi-view clustering ACM CIKM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Yuhao Yang, Jonathan Lutes, Fengjun Li, Bo Luo, and Peng Liu. 2012. Stalking Online: on User Privacy in Social Networks ACM Conference on Data and Application Security and Privacy (CODASPY). Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. H. Yildiz and C. Kruegel. 2012. Detecting social cliques for automated privacy control in online social networks IEEE PERCOM Workshops.Google ScholarGoogle Scholar
  8. A.S. Yuksel, M.E. Yuksel, and A.H. Zaim. 2010. An Approach for Protecting Privacy on Social Networks Systems and Networks Communications (ICSNC), 2010 Fifth International Conference on. 154 --159. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Justin Zhan, Gary Blosser, Chris Yang, and Lisa Singh. 2008. Privacy-Preserving Collaborative Social Networks Pacific Asia Workshop on Intelligence and Security Informatics (PAISI). Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Elena Zheleva and Lise Getoor. 2009. To Join or not to Join: The Illusion of Privacy in Social Networks with Mixed Public and Private User Profiles. In WWW. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Bin Zhou and Jian Pei. 2008. Preserving privacy in social networks against neighborhood attacks Proceedings of the 24th International Conference on Data Engineering (ICDE). Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Bin Zhou, Jian Pei, and WoShun Luk. 2008. A brief survey on anonymization techniques for privacy preserving publishing of social network data. SIGKDD Explor. Newsl. Vol. 10, 2 (2008), 12--22. 1931-0145 Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. My Friend Leaks My Privacy: Modeling and Analyzing Privacy in Social Networks

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SACMAT '18: Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies
          June 2018
          271 pages
          ISBN:9781450356664
          DOI:10.1145/3205977
          • General Chair:
          • Elisa Bertino,
          • Program Chairs:
          • Dan Lin,
          • Jorge Lobo

          Copyright © 2018 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 7 June 2018

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          SACMAT '18 Paper Acceptance Rate14of50submissions,28%Overall Acceptance Rate177of597submissions,30%

          Upcoming Conference

          SACMAT 2024

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader