Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1654988.1654991acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Inferring privacy policies for social networking services

Published: 09 November 2009 Publication History

Abstract

Social networking sites have come under criticism for their poor privacy protection track record. Yet, there is an inherent difficulty in deciding which principals should have access to user's information or actions, without requiring them to constantly manage their privacy settings. We propose to extract automatically such privacy settings, based on the policy that information produced within a social context should remain in that social context, both to ensure privacy as well as maximising utility. A machine learning approach is used to extract automatically such social contexts, as well as a tentative evaluation.

References

[1]
Alessandro Acquisti and Ralph Gross. Imagined communities: Awareness, information sharing, and privacy on the facebook. In George Danezis and Philippe Golle, editors, Privacy Enhancing Technologies, volume 4258 of Lecture Notes in Computer Science, pages 36--58. Springer, 2006.
[2]
Rakesh Agrawal, Roberto J. Bayardo Jr., Christos Faloutsos, Jerry Kiernan, Ralf Rantzau, and Ramakrishnan Srikant. Auditing compliance with a hippocratic database. In Mario A. Nascimento, M. Tamer Özsu, Donald Kossmann, Renée J. Miller, José A. Blakeley, and K. Bernhard Schiefer, editors, VLDB, pages 516--527. Morgan Kaufmann, 2004.
[3]
Adam Barth, Anupam Datta, John C. Mitchell, and Helen Nissenbaum. Privacy and contextual integrity: Framework and applications. In IEEE Symposium on Security and Privacy, pages 184--198. IEEE Computer Society, 2006.
[4]
Moritz Y. Becker, Cédric Fournet, and Andrew D. Gordon. Design and semantics of a decentralized authorization language. In CSF, pages 3--15. IEEE Computer Society, 2007.
[5]
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, and Elisa Bertino. Trust negotiation in identity management. IEEE Security & Privacy, 5(2):55--63, 2007.
[6]
Joseph Bonneau, Jonathan Anderson, and Luke Church. Privacy suites: Shared privacy for social networks. In SOUPS 2009: Symposium On Usable Privacy and Security, Mountain View, CA, USA, July 15 2009.
[7]
Joseph Bonneau, Jonathan Anderson, and George Danezis. Prying data out of a social network. In ASONAM 2009: The 2009 International Conference on Social Network Analysis and Mining, Athens, Greece, July 20 2009.
[8]
Joseph Bonneau and Soren Preibusch. The privacy jungle: On the market for data protection in social networks. In The Eighth Workshop on the Economics of Information Security (WEIS 2009), June 2009.
[9]
Luke Church, Jonathan Anderson, Joseph Bonneau, and Frank Stajano. Privacy stories: Confidence in privacy behaviors through end user programming. In SOUPS 2009: Symposium On Usable Privacy and Security, Mountain View, CA, USA, July 15 2009.
[10]
George Danezis and Prateek Mittal. Sybilinfer: Detecting sybil nodes using social networks. In NDSS. The Internet Society, 2009.
[11]
S. C. Hansen and E. A. Unger. An extended memoryless inference control method: Accounting for dependence in table-level controls. In James Clifford and Roger King, editors, Proceedings of the 1991 ACM SIGMOD International Conference on Management of Data, Denver, Colorado, May 29-31, 1991, pages 348--356. ACM Press, 1991.
[12]
Eleni Kosta, Martin Meints, Marit Hansen, and Mark Gasson. An analysis of security and privacy issues relating to rfid enabled epassports. In Hein S. Venter, Mariki M. Eloff, Les Labuschagne, Jan H. P. Eloff, and Rossouw von Solms, editors, SEC, volume 232 of IFIP, pages 467--472. Springer, 2007.
[13]
Birgit Pfitzmann. Privacy in enterprise identity federation - policies for liberty single signon. In Roger Dingledine, editor, Privacy Enhancing Technologies, volume 2760 of Lecture Notes in Computer Science, pages 189--204. Springer, 2003.
[14]
Jaideep Vaidya, Vijayalakshmi Atluri, and Qi Guo. The role mining problem: finding a minimal descriptive set of roles. In Volkmar Lotz and Bhavani M. Thuraisingham, editors, SACMAT, pages 175--184. ACM, 2007.
[15]
Stanley Wasserman, Katherine Faust, and Dawn Iacobucci. Social Network Analysis : Methods and Applications (Structural Analysis in the Social Sciences). Cambridge University Press, November 1994.

Cited By

View all
  • (2021)Privacy-Aware Personal Data Storage (P-PDS): Learning how to Protect User Privacy from External ApplicationsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2019.290380218:2(889-903)Online publication date: 1-Mar-2021
  • (2020)Image Privacy Prediction Using Deep Neural NetworksACM Transactions on the Web10.1145/338608214:2(1-32)Online publication date: 9-Apr-2020
  • (2019)Privacy-aware Tag Recommendation for Accurate Image Privacy PredictionACM Transactions on Intelligent Systems and Technology10.1145/333505410:4(1-28)Online publication date: 12-Aug-2019
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
AISec '09: Proceedings of the 2nd ACM workshop on Security and artificial intelligence
November 2009
72 pages
ISBN:9781605587813
DOI:10.1145/1654988
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 09 November 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cohesive groups
  2. privacy
  3. social networks

Qualifiers

  • Research-article

Conference

CCS '09
Sponsor:

Acceptance Rates

Overall Acceptance Rate 94 of 231 submissions, 41%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2021)Privacy-Aware Personal Data Storage (P-PDS): Learning how to Protect User Privacy from External ApplicationsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2019.290380218:2(889-903)Online publication date: 1-Mar-2021
  • (2020)Image Privacy Prediction Using Deep Neural NetworksACM Transactions on the Web10.1145/338608214:2(1-32)Online publication date: 9-Apr-2020
  • (2019)Privacy-aware Tag Recommendation for Accurate Image Privacy PredictionACM Transactions on Intelligent Systems and Technology10.1145/333505410:4(1-28)Online publication date: 12-Aug-2019
  • (2018)Understanding Privacy Dichotomy in TwitterProceedings of the 29th on Hypertext and Social Media10.1145/3209542.3209564(156-164)Online publication date: 3-Jul-2018
  • (2018)Leveraging Content Sensitiveness and User Trustworthiness to Recommend Fine-Grained Privacy Settings for Social Image SharingIEEE Transactions on Information Forensics and Security10.1109/TIFS.2017.278798613:5(1317-1332)Online publication date: 1-May-2018
  • (2018)Graphical User Interfaces for Privacy SettingsEncyclopedia of Social Network Analysis and Mining10.1007/978-1-4939-7131-2_360(966-978)Online publication date: 12-Jun-2018
  • (2017)REACTProceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 201710.1145/3110025.3110073(421-426)Online publication date: 31-Jul-2017
  • (2017)Privacy preference modeling and prediction in a simulated campuswide IoT environment2017 IEEE International Conference on Pervasive Computing and Communications (PerCom)10.1109/PERCOM.2017.7917874(276-285)Online publication date: Mar-2017
  • (2017)Privacy Setting Recommendation for Image Sharing2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA)10.1109/ICMLA.2017.00-73(726-730)Online publication date: Dec-2017
  • (2017)Learning Privacy Habits of PDS Owners2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)10.1109/ICDCS.2017.65(151-161)Online publication date: Jun-2017
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media