Abstract
The rising popularity of various social networking websites has created a huge problem on Internet privacy. Although it is easy to post photos, comments, opinions on some events, etc. on the Web, some of these data (such as a person’s location at a particular time, criticisms of a politician, etc.) are private and should not be accessed by unauthorized users. Although social networks facilitate sharing, the fear of sending sensitive data to a third party without knowledge or permission of the data owners discourages people from taking full advantage of some social networking applications. We exploit the existing relationships on social networks and build a ‘‘trust network’’ with transitive relationship to allow controlled data sharing so that the privacy and preferences of data owners are respected. The trust network linking private data owners, private data requesters, and intermediary users is a directed weighted graph. The permission value for each private data requester can be automatically assigned in this network based on the transitive relationship. Experiments were conducted to confirm the feasibility of constructing the trust network from existing social networks, and to assess the validity of permission value assignments in the query process. Since the data owners only need to define the access rights of their closest contacts once, this privacy scheme can make private data sharing easily manageable by social network participants.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
N. R. Adam and J. C. Worthmann. Security-control methods for statistical databases: a comparative study. ACM Computing Survey, 21(4):515–556, 1989.
E. Adar and C. R. Managing uncertainty in social networks. IEEE Data Engineering Bulletin, 30(2):15–22, 2007.
D. Brickley and L. Miller. Foaf project. http://www.foaf-project.org/, 2007.
S. Brin and L. Page. The anatomy of a large-scale hypertextual web search engine. In WWW7: Proceedings of the Seventh International Conference on World Wide Web 7, pages 107–117, Amsterdam, The Netherlands, 1998. Elsevier Science Publishers B. V.
J.-W. Byun, E. Bertino, and N. Li. Purpose based access control of complex data for privacy protection. In SACMAT ’05: Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies, pages 102–110, New York, NY, USA, 2005. ACM Press.
M. Conrad, T. French, W. Huang, and C. Maple. A lightweight model of trust propagation in a multi-client network environment: To what extent does experience matter? In ARES ’06: Proceedings of the First International Conference on Availability, Reliability and Security (ARES’06), pages 482–487. Washington, DC, USA, 2006. IEEE Computer Society.
B. Esfandiari and S. Chandrasekharan. On how agents make friends: mechanisms for trust acquisition. In Proceedings of the Fourth Workshop on Deception, Fraud and Trust in Agent Societies 2001, pages 27–34, 2001.
D. F. Ferraiolo, J. F. Barkley, and D. R. Kuhn. A role-based access control model and reference implementation within a corporate intranet. ACM Transactions on Information and System Security, 2(1):34–64, 1999.
L. Garton, C. Haythornthwaite, and B. Wellman. Studying online social networks. Journal of Computer-Mediated Communication, 3(1), June 1997.
Google. Google calendar. www.google.com/calendar.
R. Guha, R. Kumar, P. Raghavan, and A. Tomkins. Propagation of trust and distrust. In WWW ’04: Proceedings of the 13th International Conference on World Wide Web, pages 403–412, New York, NY, USA, 2004. ACM Press.
A. Y. Halevy, A. Rajaraman, and J. J. Ordille. Data integration: The teenage years. In VLDB, pages 9–16, 2006.
D. Hong, M. Yuan, and V. Y. Shen. Dynamic privacy management: a plug-in service for the middleware in pervasive computing. In MobileHCI 2005, pages 1–8, Salzburg, Austria, September 2005. ACM.
S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. The eigentrust algorithm for reputation management in p2p networks. In WWW ’03: Proceedings of the 12th International Conference on World Wide Web, pages 640–651, New York, NY, USA, 2003. ACM Press.
Y. Katz and J. Golbeck. Using social network-based trust for default reasoning on the web. Available online http://www.cs.umd.edu/~golbeck/papers/jwsSocDefaults.pdf, 2007.
P. Kolari, L. Ding, S. G. A. Joshi, T. Finin, and L. Kagal. Enhancing web privacy protection through declarative policies. In POLICY ’05: Proceedings of the Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY’05), pages 57–66, Washington, DC, USA, 2005. IEEE Computer Society.
R. Matthew, R. Agrawal, and P. Domingos. Trust management for the semantic web. In Proceedings of the Second International Semantic Web Conference, 2003.
P. Mika. Ontologies are us: A unified model of social networks and semantics. Web Semantics, 5(1):5–15, 2007.
N. Mishra, R. Schreiber, I. Stanton, and R. E. Tarjan. Clustering social networks. In Workshop On Algorithms And Models For The Web-Graph (WAW2007), 2007.
M. F. Mokbel, C.-Y. Chow, and W. G. Aref. The new casper: Query processing for location services without compromising privacy. In VLDB, pages 763–774, 2006.
L. Sweeney. k-anonymity: A model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10(5):557–570, 2002.
Technorati. State of the blogosphere/state of the live web. http://www.sifry.com/ stateoftheliveweb/, 2007.
W3C. A p3p preference exchange language 1.0 (appel1.0). http://www.w3.org/TR/P3P-preferences/.
W3C. Platform for privacy preferences (p3p) project. http://www.w3.org/TR/P3P/, April 2002.
S. Wasserman and K. Faust. Social Network Analysis : Methods and Applications (Structural Analysis in the Social Sciences). Cambridge, 1994. Cambridge University Press.
C.-N. Ziegler and G. Lausen. Analyzing correlation between trust and user similarity in online communities. In C. Jensen, S. Poslad, and T. Dimitrakos, editors, Proceedings of the 2nd International Conference on Trust Management, volume 2995 of LNCS, pages 251–265, Oxford, UK, March 2004. Springer-Verlag.
C.-N. Ziegler and G. Lausen. Spreading activation models for trust propagation. In EEE ’04: Proceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE’04), pages 83–97, Washington, DC, USA, 2004. IEEE Computer Society.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Hong, D., Shen, V.Y. (2009). Setting Access Permission through Transitive Relationship in Web-based Social Networks. In: King, I., Baeza-Yates, R. (eds) Weaving Services and People on the World Wide Web. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00570-1_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-00570-1_12
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-00569-5
Online ISBN: 978-3-642-00570-1
eBook Packages: Computer ScienceComputer Science (R0)