ABSTRACT
Social Networking is one of the major technological phenomena of the Web 2.0, with hundreds of millions of people participating. Social networks enable a form of self expression for users, and help them to socialize and share content with other users. In spite of the fact that content sharing represents one of the prominent features of existing Social Network sites, Social Networks yet do not support any mechanism for collaborative management of privacy settings for shared content. In this paper, we model the problem of collaborative enforcement of privacy policies on shared data by using game theory. In particular, we propose a solution that offers automated ways to share images based on an extended notion of content ownership. Building upon the Clarke-Tax mechanism, we describe a simple mechanism that promotes truthfulness, and that rewards users who promote co-ownership. We integrate our design with inference techniques that free the users from the burden of manually selecting privacy preferences for each picture. To the best of our knowledge this is the first time such a protection mechanism for Social Networking has been proposed. In the paper, we also show a proof-of-concept application, which we implemented in the context of Facebook, one of today's most popular social networks. We show that supporting these type of solutions is not also feasible, but can be implemented through a minimal increase in overhead to end-users.
- A. Acquisti and R. Gross. Imagined communities: Awareness, Information Sharing, and Privacy on the Facebook. In Proc. of Privacy Enhancing Technologies, pages 36--58. Springer, 2006. Google ScholarDigital Library
- D. Beaver. 10 billion photos. http://www.facebook.com/note.php?note_id=30695603919, October 2008.Google Scholar
- S. P. Borgatti and M. G. Everett. A graph-theoretic perspective on centrality. Social Networks, 28(4):466--484, October 2006.Google ScholarCross Ref
- B. Carminati and E. Ferrari. Privacy-aware collaborative access control in web-based social networks. In DBSec, pages 81--96, 2008. Google ScholarDigital Library
- B. Carminati, E. Ferrari, and A. Perego. Rule-based access control for social networks. In OTM Workshops (2), pages 1734--1744, 2006. Google ScholarDigital Library
- L. Chen, X. Den, Q. Fang, and F. Tian. Condorcet winners for public goods. In Annals of Operations Research, volume 137, pages 229--242, 2005.Google ScholarCross Ref
- E. H. Clarke. Multipart pricing of public goods. In Public Choice 11, pages 17--33, 1971.Google ScholarCross Ref
- E. H. Clarke. Multipart Pricing of Public Goods: An example. In Public Price for Public Products, Urban Inst., 1972.Google Scholar
- M. Davis, M. Smith, J. Canny, N. Good, S. King, and R. Janakiraman. Towards context-aware face recognition. In Proceedings of the 13th annual ACM international conference on Multimedia, pages 483--486, New York, NY, USA, 2005. ACM. Google ScholarDigital Library
- E. Ephrati and J. S. Rosenschein. The Clarke-tax as a consensus mechanism among automated agents. In National Conference on Artificial Intelligence, pages 173--178, 1991.Google Scholar
- E. Ephrati and J. S. Rosenschein. Voting and multi-agent consensus. 1991.Google Scholar
- E. Ephrati and J. S. Rosenschein. Deriving consensus in multi-agent systems. In Journal of Artificial Intelligence, volume 87, pages 21--74, November 1996. Google ScholarDigital Library
- Facebook. Facebook web site. http://www.facebook.com/.Google Scholar
- A. Felt. Defacing Facebook: A security case study.Google Scholar
- A. Felt and D. Evans. Privacy protection for social networking platforms. In Proceedings of Web 2.0 Security and Privacy 2008 (in conjunction with 2008 IEEE Symposium on Security and Privacy), 2008.Google Scholar
- C. Gates. Access control requirements for Web 2.0 Security and Privacy. In IEEE Web 2.0 Privacy and Security Workshop, 2007.Google Scholar
- R. Geambasu, M. Balazinska, S. D. Gribble, and H. M. Levy. Homeviews: peer-to-peer middleware for personal data sharing applications. In SIGMOD Conference, pages 235--246, 2007. Google ScholarDigital Library
- K. K. Gollu, S. Saroiu, and A. Wolman. A social networking-based access control scheme for personal content. In Proceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP '07)-- Work-in-Progress Session, 2007.Google Scholar
- R. Gross and A. Acquisti. Information revelation and privacy in online social networks. In Workshop on Privacy in the Electronic Society, 2005. Google ScholarDigital Library
- J. Grossklags, N. Christin, and J. Chuang. Secure or Insure?: a game-theoretic analysis of information security games. In WWW, pages 209--218, 2008. Google ScholarDigital Library
- M. Hart, R. Johnson, and A. Stent. More content -- less control: Access control in the Web 2.0. In IEEE Web 2.0 Privacy and Security Workshop, 2007.Google Scholar
- G. Hobgen. Security issues and recommendations for online social networks. ENISA Position Paper N. 1, 2007.Google Scholar
- J. Jiang and D. Conrath. Semantic similarity based on corpus statistics and lexical taxonomy. In Proceedings of ROCLING X, Sep 1997.Google Scholar
- A. Lenhart and M. Madden. Teens, privacy & online social networks. Pew Internet & American Life Project, 18 April 2007.Google Scholar
- M. Mannan and P. C. van Oorschot. Privacy-enhanced Sharing of Personal Content on the Web. In WWW, pages 487--496, 2008. Google ScholarDigital Library
- A. Mas-Colell and M. D. Whinston. Micro-Economic Theory. Chapter 23. Oxford University Press, fourth edition, 1998.Google Scholar
- A. Mathes. Folksonomies: Cooperative classification and communication through shared metadata. http://www.adammathes.com/academic/computer-mediated-communication/folk%sonomies.html, 2004.Google Scholar
- G. A. Miller. Wordnet: a lexical database for English. Commun. ACM, 38(11):39--41, 1995. Google ScholarDigital Library
- M. Naaman, R. B. Yeh, H. Garcia-Molina, and A. Paepcke. Leveraging context to resolve identity in photo albums. In Proceedings of the 5th ACM/IEEE-CS joint conference on Digital libraries, pages 178--187, New York, NY, USA, 2005. ACM Press. Google ScholarDigital Library
- C. L. NB Ellison, C Steinfield. Benefits of Facebook 'Friends:' social capital and college students' use of online social network. Journal of Computer Mediated Communication-Electronic, 2007.Google ScholarCross Ref
- M. E. J. Newman. Scientific collaboration networks. ii. shortest paths, weighted networks, and centrality. Physical Review E, 64(1):016132, June 2001.Google ScholarCross Ref
- G. Pirro' and N. Seco. Design, implementation and evaluation of a new semantic similarity metric combining features and intrinsic information content. In Proceedings of On the Move to Meaningful Internet Systems, 2008. Google ScholarDigital Library
- P. Ray. Independence of irrelevant alternatives. In Econometrica, volume 41, pages 987--991, 1973.Google ScholarCross Ref
- D. Rosenblum. What anyone can know: The privacy risks of social networking sites. IEEE Security and Privacy, 5(3):40--49, 2007. Google ScholarDigital Library
- S. Spiekermann, J. Grossklags, and B. Berendt. E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior. In EC '01: Proceedings of the 3rd ACM conference on Electronic Commerce, pages 38--47, New York, NY, USA, 2001. ACM. Google ScholarDigital Library
- H. R. Varian. System Reliability and Free Riding. In in Economics of Information Security, pages 1--15. Kluwer Academic Publishers, 2002.Google Scholar
- C. Wang and H. fung Leung. A secure and private Clarke-Tax voting protocol without trusted authorities. In Proc. of 6th International conference on Electronic Commerce, pages 556--565, New York, NY, USA, 2004. ACM. Google ScholarDigital Library
- X. Wu, L. Zhang, and Y. Yu. Exploring social annotations for the semantic Web. In WWW, pages 417--426, 2006. Google ScholarDigital Library
Index Terms
- Collective privacy management in social networks
Recommendations
Privacy preserving on social networks: new Policies and approaches
SCA '18: Proceedings of the 3rd International Conference on Smart City ApplicationsThanks to online social networks services such as Facebook, Twitter, YouTube, etc...., users have the opportunity to communicate easily without constraints by providing them with free and open platforms. Because of their crucial role in spreading ...
Privacy policies for shared content in social network sites
Social networking is one of the major technological phenomena of the Web 2.0, with hundreds of millions of subscribed users. Social networks enable a form of self-expression for users and help them to socialize and share content with other users. In ...
Practical Privacy-Preserving Friend Recommendations on Social Networks
WWW '18: Companion Proceedings of the The Web Conference 2018Making friend recommendations is an important task for social networks, as having more friends typically leads to a better user experience. Most current friend recommendations systems grow the existing network at the cost of privacy. In particular, any ...
Comments