Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3205977.3205981acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
research-article

My Friend Leaks My Privacy: Modeling and Analyzing Privacy in Social Networks

Published: 07 June 2018 Publication History

Abstract

With the dramatically increasing participation in online social networks (OSNs), huge amount of private information becomes available on such sites. It is critical to preserve users' privacy without preventing them from socialization and sharing. Unfortunately, existing solutions fall short meeting such requirements. We argue that the key component of OSN privacy protection is protecting (sensitive) content -- privacy as having the ability to control information dissemination. We follow the concepts of private information boundaries and restricted access and limited control to introduce a social circle model. We articulate the formal constructs of this model and the desired properties for privacy protection in the model. We show that the social circle model is efficient yet practical, which provides certain level of privacy protection capabilities to users, while still facilitates socialization. We then utilize this model to analyze the most popular social network platforms on the Internet (Facebook, Google+, WeChat, etc), and demonstrate the potential privacy vulnerabilities in some social networks. Finally, we discuss the implications of the analysis, and possible future directions.

References

[1]
A. Acquisti. 2004. Privacy in Electronic Commerce and the Economics of Immediate Gratification Proceedings of the 5th ACM Electronic Commerce Conference.
[2]
A. Acquisti and J. Grossklags. 2005. Privacy and Rationality in Decision Making. IEEE Security and Privacy (2005).
[3]
I. Altman. 1975. The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Brooks/Cole Publishing, Monterey, CA.
[4]
Lars Backstrom, Cynthia Dwork, and Jon Kleinberg. 2007. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In WWW.
[5]
Randy Baden, Adam Bender, Neil Spring, Bobby Bhattacharjee, and Daniel Starin. 2009. Persona: an online social network with user-defined privacy. SIGCOMM Comput. Commun. Rev. Vol. 39, 4 (2009), 135--146. Chao Lan, Xiaoli Li, Bo Luo, and Jun Huan. 2014. Automatic social circle detection using multi-view clustering ACM CIKM.
[6]
Yuhao Yang, Jonathan Lutes, Fengjun Li, Bo Luo, and Peng Liu. 2012. Stalking Online: on User Privacy in Social Networks ACM Conference on Data and Application Security and Privacy (CODASPY).
[7]
H. Yildiz and C. Kruegel. 2012. Detecting social cliques for automated privacy control in online social networks IEEE PERCOM Workshops.
[8]
A.S. Yuksel, M.E. Yuksel, and A.H. Zaim. 2010. An Approach for Protecting Privacy on Social Networks Systems and Networks Communications (ICSNC), 2010 Fifth International Conference on. 154 --159.
[9]
Justin Zhan, Gary Blosser, Chris Yang, and Lisa Singh. 2008. Privacy-Preserving Collaborative Social Networks Pacific Asia Workshop on Intelligence and Security Informatics (PAISI).
[10]
Elena Zheleva and Lise Getoor. 2009. To Join or not to Join: The Illusion of Privacy in Social Networks with Mixed Public and Private User Profiles. In WWW.
[11]
Bin Zhou and Jian Pei. 2008. Preserving privacy in social networks against neighborhood attacks Proceedings of the 24th International Conference on Data Engineering (ICDE).
[12]
Bin Zhou, Jian Pei, and WoShun Luk. 2008. A brief survey on anonymization techniques for privacy preserving publishing of social network data. SIGKDD Explor. Newsl. Vol. 10, 2 (2008), 12--22. 1931-0145

Cited By

View all
  • (2024)The Intrusion on Social Media Users’ Privacy: Challenges and Negative ImpactsFrontiers of Human Centricity in the Artificial Intelligence-Driven Society 5.010.1007/978-3-031-73545-5_54(647-658)Online publication date: 8-Dec-2024
  • (2023)A privacy-dependent condition-based privacy-preserving information sharing scheme in online social networksComputer Communications10.1016/j.comcom.2023.01.010200:C(149-160)Online publication date: 15-Feb-2023
  • (2022)Security and Privacy of Customer Data as an Element Creating the Image of the CompanyManagement Systems in Production Engineering10.2478/mspe-2022-001930:2(156-162)Online publication date: 19-May-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SACMAT '18: Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies
June 2018
271 pages
ISBN:9781450356664
DOI:10.1145/3205977
  • General Chair:
  • Elisa Bertino,
  • Program Chairs:
  • Dan Lin,
  • Jorge Lobo
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 June 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. privacy
  2. social circles
  3. social networks

Qualifiers

  • Research-article

Funding Sources

  • International Collaboration Project of Institute of Information Engineering, Chinese Academy of Sciences
  • US National Science Foundation
  • National Key R&D Program of China

Conference

SACMAT '18
Sponsor:

Acceptance Rates

SACMAT '18 Paper Acceptance Rate 14 of 50 submissions, 28%;
Overall Acceptance Rate 177 of 597 submissions, 30%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)39
  • Downloads (Last 6 weeks)3
Reflects downloads up to 14 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)The Intrusion on Social Media Users’ Privacy: Challenges and Negative ImpactsFrontiers of Human Centricity in the Artificial Intelligence-Driven Society 5.010.1007/978-3-031-73545-5_54(647-658)Online publication date: 8-Dec-2024
  • (2023)A privacy-dependent condition-based privacy-preserving information sharing scheme in online social networksComputer Communications10.1016/j.comcom.2023.01.010200:C(149-160)Online publication date: 15-Feb-2023
  • (2022)Security and Privacy of Customer Data as an Element Creating the Image of the CompanyManagement Systems in Production Engineering10.2478/mspe-2022-001930:2(156-162)Online publication date: 19-May-2022
  • (2022)A Review of Privacy Decision-making Mechanisms in Online Social NetworksACM Computing Surveys10.1145/349406755:2(1-32)Online publication date: 18-Jan-2022
  • (2022)A policy-aware epistemic framework for social networksJournal of Logic and Computation10.1093/logcom/exac02532:6(1234-1271)Online publication date: 11-Apr-2022
  • (2022)Community detection for access-control decisions: Analysing the role of homophily and information diffusion in Online Social NetworksOnline Social Networks and Media10.1016/j.osnem.2022.10020329(100203)Online publication date: May-2022
  • (2022)New trends in influence maximization modelsComputer Science Review10.1016/j.cosrev.2021.10039340:COnline publication date: 6-May-2022
  • (2022)Toward pragmatic modeling of privacy information propagation in online social networksComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2022.109429219:COnline publication date: 24-Dec-2022
  • (2021)Privacy-preserving policy evaluation in multi-party access controlJournal of Computer Security10.3233/JCS-200007(1-38)Online publication date: 30-Sep-2021
  • (2021)Privacy Monitoring Service for ConversationsProceedings of the 14th ACM International Conference on Web Search and Data Mining10.1145/3437963.3441706(1093-1096)Online publication date: 8-Mar-2021
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media