ABSTRACT
With the dramatically increasing participation in online social networks (OSNs), huge amount of private information becomes available on such sites. It is critical to preserve users' privacy without preventing them from socialization and sharing. Unfortunately, existing solutions fall short meeting such requirements. We argue that the key component of OSN privacy protection is protecting (sensitive) content -- privacy as having the ability to control information dissemination. We follow the concepts of private information boundaries and restricted access and limited control to introduce a social circle model. We articulate the formal constructs of this model and the desired properties for privacy protection in the model. We show that the social circle model is efficient yet practical, which provides certain level of privacy protection capabilities to users, while still facilitates socialization. We then utilize this model to analyze the most popular social network platforms on the Internet (Facebook, Google+, WeChat, etc), and demonstrate the potential privacy vulnerabilities in some social networks. Finally, we discuss the implications of the analysis, and possible future directions.
- A. Acquisti. 2004. Privacy in Electronic Commerce and the Economics of Immediate Gratification Proceedings of the 5th ACM Electronic Commerce Conference. Google ScholarDigital Library
- A. Acquisti and J. Grossklags. 2005. Privacy and Rationality in Decision Making. IEEE Security and Privacy (2005). Google ScholarDigital Library
- I. Altman. 1975. The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Brooks/Cole Publishing, Monterey, CA.Google Scholar
- Lars Backstrom, Cynthia Dwork, and Jon Kleinberg. 2007. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In WWW. Google ScholarDigital Library
- Randy Baden, Adam Bender, Neil Spring, Bobby Bhattacharjee, and Daniel Starin. 2009. Persona: an online social network with user-defined privacy. SIGCOMM Comput. Commun. Rev. Vol. 39, 4 (2009), 135--146. Chao Lan, Xiaoli Li, Bo Luo, and Jun Huan. 2014. Automatic social circle detection using multi-view clustering ACM CIKM. Google ScholarDigital Library
- Yuhao Yang, Jonathan Lutes, Fengjun Li, Bo Luo, and Peng Liu. 2012. Stalking Online: on User Privacy in Social Networks ACM Conference on Data and Application Security and Privacy (CODASPY). Google ScholarDigital Library
- H. Yildiz and C. Kruegel. 2012. Detecting social cliques for automated privacy control in online social networks IEEE PERCOM Workshops.Google Scholar
- A.S. Yuksel, M.E. Yuksel, and A.H. Zaim. 2010. An Approach for Protecting Privacy on Social Networks Systems and Networks Communications (ICSNC), 2010 Fifth International Conference on. 154 --159. Google ScholarDigital Library
- Justin Zhan, Gary Blosser, Chris Yang, and Lisa Singh. 2008. Privacy-Preserving Collaborative Social Networks Pacific Asia Workshop on Intelligence and Security Informatics (PAISI). Google ScholarDigital Library
- Elena Zheleva and Lise Getoor. 2009. To Join or not to Join: The Illusion of Privacy in Social Networks with Mixed Public and Private User Profiles. In WWW. Google ScholarDigital Library
- Bin Zhou and Jian Pei. 2008. Preserving privacy in social networks against neighborhood attacks Proceedings of the 24th International Conference on Data Engineering (ICDE). Google ScholarDigital Library
- Bin Zhou, Jian Pei, and WoShun Luk. 2008. A brief survey on anonymization techniques for privacy preserving publishing of social network data. SIGKDD Explor. Newsl. Vol. 10, 2 (2008), 12--22. 1931-0145 Google ScholarDigital Library
Index Terms
- My Friend Leaks My Privacy: Modeling and Analyzing Privacy in Social Networks
Recommendations
Practical Privacy-Preserving Friend Recommendations on Social Networks
WWW '18: Companion Proceedings of the The Web Conference 2018Making friend recommendations is an important task for social networks, as having more friends typically leads to a better user experience. Most current friend recommendations systems grow the existing network at the cost of privacy. In particular, any ...
Privacy antecedents for SNS self-disclosure
Social networking sites privacy issues and self-disclosure are examined.A research model of privacy issues and self-disclosure is built.Structural equations modeling is used to assess the model fit.Path analysis is done to analyze hypothesis whereas 11 ...
Turning privacy leaks into floods: surreptitious discovery of social network friendships and other sensitive binary attribute vectors
WPES '10: Proceedings of the 9th annual ACM workshop on Privacy in the electronic societyWe study methods for attacking the privacy of social networking sites, collaborative filtering sites, databases of genetic signatures, and other data sets that can be represented as vectors of binary relationships. Our methods are based on reductions to ...
Comments