skip to main content
10.1145/1526709.1526780acmconferencesArticle/Chapter ViewAbstractPublication PageswwwConference Proceedingsconference-collections
research-article

Collective privacy management in social networks

Published:20 April 2009Publication History

ABSTRACT

Social Networking is one of the major technological phenomena of the Web 2.0, with hundreds of millions of people participating. Social networks enable a form of self expression for users, and help them to socialize and share content with other users. In spite of the fact that content sharing represents one of the prominent features of existing Social Network sites, Social Networks yet do not support any mechanism for collaborative management of privacy settings for shared content. In this paper, we model the problem of collaborative enforcement of privacy policies on shared data by using game theory. In particular, we propose a solution that offers automated ways to share images based on an extended notion of content ownership. Building upon the Clarke-Tax mechanism, we describe a simple mechanism that promotes truthfulness, and that rewards users who promote co-ownership. We integrate our design with inference techniques that free the users from the burden of manually selecting privacy preferences for each picture. To the best of our knowledge this is the first time such a protection mechanism for Social Networking has been proposed. In the paper, we also show a proof-of-concept application, which we implemented in the context of Facebook, one of today's most popular social networks. We show that supporting these type of solutions is not also feasible, but can be implemented through a minimal increase in overhead to end-users.

References

  1. A. Acquisti and R. Gross. Imagined communities: Awareness, Information Sharing, and Privacy on the Facebook. In Proc. of Privacy Enhancing Technologies, pages 36--58. Springer, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. D. Beaver. 10 billion photos. http://www.facebook.com/note.php?note_id=30695603919, October 2008.Google ScholarGoogle Scholar
  3. S. P. Borgatti and M. G. Everett. A graph-theoretic perspective on centrality. Social Networks, 28(4):466--484, October 2006.Google ScholarGoogle ScholarCross RefCross Ref
  4. B. Carminati and E. Ferrari. Privacy-aware collaborative access control in web-based social networks. In DBSec, pages 81--96, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. B. Carminati, E. Ferrari, and A. Perego. Rule-based access control for social networks. In OTM Workshops (2), pages 1734--1744, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. L. Chen, X. Den, Q. Fang, and F. Tian. Condorcet winners for public goods. In Annals of Operations Research, volume 137, pages 229--242, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  7. E. H. Clarke. Multipart pricing of public goods. In Public Choice 11, pages 17--33, 1971.Google ScholarGoogle ScholarCross RefCross Ref
  8. E. H. Clarke. Multipart Pricing of Public Goods: An example. In Public Price for Public Products, Urban Inst., 1972.Google ScholarGoogle Scholar
  9. M. Davis, M. Smith, J. Canny, N. Good, S. King, and R. Janakiraman. Towards context-aware face recognition. In Proceedings of the 13th annual ACM international conference on Multimedia, pages 483--486, New York, NY, USA, 2005. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. E. Ephrati and J. S. Rosenschein. The Clarke-tax as a consensus mechanism among automated agents. In National Conference on Artificial Intelligence, pages 173--178, 1991.Google ScholarGoogle Scholar
  11. E. Ephrati and J. S. Rosenschein. Voting and multi-agent consensus. 1991.Google ScholarGoogle Scholar
  12. E. Ephrati and J. S. Rosenschein. Deriving consensus in multi-agent systems. In Journal of Artificial Intelligence, volume 87, pages 21--74, November 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Facebook. Facebook web site. http://www.facebook.com/.Google ScholarGoogle Scholar
  14. A. Felt. Defacing Facebook: A security case study.Google ScholarGoogle Scholar
  15. A. Felt and D. Evans. Privacy protection for social networking platforms. In Proceedings of Web 2.0 Security and Privacy 2008 (in conjunction with 2008 IEEE Symposium on Security and Privacy), 2008.Google ScholarGoogle Scholar
  16. C. Gates. Access control requirements for Web 2.0 Security and Privacy. In IEEE Web 2.0 Privacy and Security Workshop, 2007.Google ScholarGoogle Scholar
  17. R. Geambasu, M. Balazinska, S. D. Gribble, and H. M. Levy. Homeviews: peer-to-peer middleware for personal data sharing applications. In SIGMOD Conference, pages 235--246, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. K. K. Gollu, S. Saroiu, and A. Wolman. A social networking-based access control scheme for personal content. In Proceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP '07)-- Work-in-Progress Session, 2007.Google ScholarGoogle Scholar
  19. R. Gross and A. Acquisti. Information revelation and privacy in online social networks. In Workshop on Privacy in the Electronic Society, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. J. Grossklags, N. Christin, and J. Chuang. Secure or Insure?: a game-theoretic analysis of information security games. In WWW, pages 209--218, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. Hart, R. Johnson, and A. Stent. More content -- less control: Access control in the Web 2.0. In IEEE Web 2.0 Privacy and Security Workshop, 2007.Google ScholarGoogle Scholar
  22. G. Hobgen. Security issues and recommendations for online social networks. ENISA Position Paper N. 1, 2007.Google ScholarGoogle Scholar
  23. J. Jiang and D. Conrath. Semantic similarity based on corpus statistics and lexical taxonomy. In Proceedings of ROCLING X, Sep 1997.Google ScholarGoogle Scholar
  24. A. Lenhart and M. Madden. Teens, privacy & online social networks. Pew Internet & American Life Project, 18 April 2007.Google ScholarGoogle Scholar
  25. M. Mannan and P. C. van Oorschot. Privacy-enhanced Sharing of Personal Content on the Web. In WWW, pages 487--496, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. A. Mas-Colell and M. D. Whinston. Micro-Economic Theory. Chapter 23. Oxford University Press, fourth edition, 1998.Google ScholarGoogle Scholar
  27. A. Mathes. Folksonomies: Cooperative classification and communication through shared metadata. http://www.adammathes.com/academic/computer-mediated-communication/folk%sonomies.html, 2004.Google ScholarGoogle Scholar
  28. G. A. Miller. Wordnet: a lexical database for English. Commun. ACM, 38(11):39--41, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. M. Naaman, R. B. Yeh, H. Garcia-Molina, and A. Paepcke. Leveraging context to resolve identity in photo albums. In Proceedings of the 5th ACM/IEEE-CS joint conference on Digital libraries, pages 178--187, New York, NY, USA, 2005. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. C. L. NB Ellison, C Steinfield. Benefits of Facebook 'Friends:' social capital and college students' use of online social network. Journal of Computer Mediated Communication-Electronic, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  31. M. E. J. Newman. Scientific collaboration networks. ii. shortest paths, weighted networks, and centrality. Physical Review E, 64(1):016132, June 2001.Google ScholarGoogle ScholarCross RefCross Ref
  32. G. Pirro' and N. Seco. Design, implementation and evaluation of a new semantic similarity metric combining features and intrinsic information content. In Proceedings of On the Move to Meaningful Internet Systems, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. P. Ray. Independence of irrelevant alternatives. In Econometrica, volume 41, pages 987--991, 1973.Google ScholarGoogle ScholarCross RefCross Ref
  34. D. Rosenblum. What anyone can know: The privacy risks of social networking sites. IEEE Security and Privacy, 5(3):40--49, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. S. Spiekermann, J. Grossklags, and B. Berendt. E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior. In EC '01: Proceedings of the 3rd ACM conference on Electronic Commerce, pages 38--47, New York, NY, USA, 2001. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. H. R. Varian. System Reliability and Free Riding. In in Economics of Information Security, pages 1--15. Kluwer Academic Publishers, 2002.Google ScholarGoogle Scholar
  37. C. Wang and H. fung Leung. A secure and private Clarke-Tax voting protocol without trusted authorities. In Proc. of 6th International conference on Electronic Commerce, pages 556--565, New York, NY, USA, 2004. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. X. Wu, L. Zhang, and Y. Yu. Exploring social annotations for the semantic Web. In WWW, pages 417--426, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Collective privacy management in social networks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        WWW '09: Proceedings of the 18th international conference on World wide web
        April 2009
        1280 pages
        ISBN:9781605584874
        DOI:10.1145/1526709

        Copyright © 2009 IW3C2 org

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 20 April 2009

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate1,899of8,196submissions,23%

        Upcoming Conference

        WWW '24
        The ACM Web Conference 2024
        May 13 - 17, 2024
        Singapore , Singapore

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader