Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1526709.1526780acmconferencesArticle/Chapter ViewAbstractPublication PagesthewebconfConference Proceedingsconference-collections
research-article

Collective privacy management in social networks

Published: 20 April 2009 Publication History

Abstract

Social Networking is one of the major technological phenomena of the Web 2.0, with hundreds of millions of people participating. Social networks enable a form of self expression for users, and help them to socialize and share content with other users. In spite of the fact that content sharing represents one of the prominent features of existing Social Network sites, Social Networks yet do not support any mechanism for collaborative management of privacy settings for shared content. In this paper, we model the problem of collaborative enforcement of privacy policies on shared data by using game theory. In particular, we propose a solution that offers automated ways to share images based on an extended notion of content ownership. Building upon the Clarke-Tax mechanism, we describe a simple mechanism that promotes truthfulness, and that rewards users who promote co-ownership. We integrate our design with inference techniques that free the users from the burden of manually selecting privacy preferences for each picture. To the best of our knowledge this is the first time such a protection mechanism for Social Networking has been proposed. In the paper, we also show a proof-of-concept application, which we implemented in the context of Facebook, one of today's most popular social networks. We show that supporting these type of solutions is not also feasible, but can be implemented through a minimal increase in overhead to end-users.

References

[1]
A. Acquisti and R. Gross. Imagined communities: Awareness, Information Sharing, and Privacy on the Facebook. In Proc. of Privacy Enhancing Technologies, pages 36--58. Springer, 2006.
[2]
D. Beaver. 10 billion photos. http://www.facebook.com/note.php?note_id=30695603919, October 2008.
[3]
S. P. Borgatti and M. G. Everett. A graph-theoretic perspective on centrality. Social Networks, 28(4):466--484, October 2006.
[4]
B. Carminati and E. Ferrari. Privacy-aware collaborative access control in web-based social networks. In DBSec, pages 81--96, 2008.
[5]
B. Carminati, E. Ferrari, and A. Perego. Rule-based access control for social networks. In OTM Workshops (2), pages 1734--1744, 2006.
[6]
L. Chen, X. Den, Q. Fang, and F. Tian. Condorcet winners for public goods. In Annals of Operations Research, volume 137, pages 229--242, 2005.
[7]
E. H. Clarke. Multipart pricing of public goods. In Public Choice 11, pages 17--33, 1971.
[8]
E. H. Clarke. Multipart Pricing of Public Goods: An example. In Public Price for Public Products, Urban Inst., 1972.
[9]
M. Davis, M. Smith, J. Canny, N. Good, S. King, and R. Janakiraman. Towards context-aware face recognition. In Proceedings of the 13th annual ACM international conference on Multimedia, pages 483--486, New York, NY, USA, 2005. ACM.
[10]
E. Ephrati and J. S. Rosenschein. The Clarke-tax as a consensus mechanism among automated agents. In National Conference on Artificial Intelligence, pages 173--178, 1991.
[11]
E. Ephrati and J. S. Rosenschein. Voting and multi-agent consensus. 1991.
[12]
E. Ephrati and J. S. Rosenschein. Deriving consensus in multi-agent systems. In Journal of Artificial Intelligence, volume 87, pages 21--74, November 1996.
[13]
Facebook. Facebook web site. http://www.facebook.com/.
[14]
A. Felt. Defacing Facebook: A security case study.
[15]
A. Felt and D. Evans. Privacy protection for social networking platforms. In Proceedings of Web 2.0 Security and Privacy 2008 (in conjunction with 2008 IEEE Symposium on Security and Privacy), 2008.
[16]
C. Gates. Access control requirements for Web 2.0 Security and Privacy. In IEEE Web 2.0 Privacy and Security Workshop, 2007.
[17]
R. Geambasu, M. Balazinska, S. D. Gribble, and H. M. Levy. Homeviews: peer-to-peer middleware for personal data sharing applications. In SIGMOD Conference, pages 235--246, 2007.
[18]
K. K. Gollu, S. Saroiu, and A. Wolman. A social networking-based access control scheme for personal content. In Proceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP '07)-- Work-in-Progress Session, 2007.
[19]
R. Gross and A. Acquisti. Information revelation and privacy in online social networks. In Workshop on Privacy in the Electronic Society, 2005.
[20]
J. Grossklags, N. Christin, and J. Chuang. Secure or Insure?: a game-theoretic analysis of information security games. In WWW, pages 209--218, 2008.
[21]
M. Hart, R. Johnson, and A. Stent. More content -- less control: Access control in the Web 2.0. In IEEE Web 2.0 Privacy and Security Workshop, 2007.
[22]
G. Hobgen. Security issues and recommendations for online social networks. ENISA Position Paper N. 1, 2007.
[23]
J. Jiang and D. Conrath. Semantic similarity based on corpus statistics and lexical taxonomy. In Proceedings of ROCLING X, Sep 1997.
[24]
A. Lenhart and M. Madden. Teens, privacy & online social networks. Pew Internet & American Life Project, 18 April 2007.
[25]
M. Mannan and P. C. van Oorschot. Privacy-enhanced Sharing of Personal Content on the Web. In WWW, pages 487--496, 2008.
[26]
A. Mas-Colell and M. D. Whinston. Micro-Economic Theory. Chapter 23. Oxford University Press, fourth edition, 1998.
[27]
A. Mathes. Folksonomies: Cooperative classification and communication through shared metadata. http://www.adammathes.com/academic/computer-mediated-communication/folk%sonomies.html, 2004.
[28]
G. A. Miller. Wordnet: a lexical database for English. Commun. ACM, 38(11):39--41, 1995.
[29]
M. Naaman, R. B. Yeh, H. Garcia-Molina, and A. Paepcke. Leveraging context to resolve identity in photo albums. In Proceedings of the 5th ACM/IEEE-CS joint conference on Digital libraries, pages 178--187, New York, NY, USA, 2005. ACM Press.
[30]
C. L. NB Ellison, C Steinfield. Benefits of Facebook 'Friends:' social capital and college students' use of online social network. Journal of Computer Mediated Communication-Electronic, 2007.
[31]
M. E. J. Newman. Scientific collaboration networks. ii. shortest paths, weighted networks, and centrality. Physical Review E, 64(1):016132, June 2001.
[32]
G. Pirro' and N. Seco. Design, implementation and evaluation of a new semantic similarity metric combining features and intrinsic information content. In Proceedings of On the Move to Meaningful Internet Systems, 2008.
[33]
P. Ray. Independence of irrelevant alternatives. In Econometrica, volume 41, pages 987--991, 1973.
[34]
D. Rosenblum. What anyone can know: The privacy risks of social networking sites. IEEE Security and Privacy, 5(3):40--49, 2007.
[35]
S. Spiekermann, J. Grossklags, and B. Berendt. E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior. In EC '01: Proceedings of the 3rd ACM conference on Electronic Commerce, pages 38--47, New York, NY, USA, 2001. ACM.
[36]
H. R. Varian. System Reliability and Free Riding. In in Economics of Information Security, pages 1--15. Kluwer Academic Publishers, 2002.
[37]
C. Wang and H. fung Leung. A secure and private Clarke-Tax voting protocol without trusted authorities. In Proc. of 6th International conference on Electronic Commerce, pages 556--565, New York, NY, USA, 2004. ACM.
[38]
X. Wu, L. Zhang, and Y. Yu. Exploring social annotations for the semantic Web. In WWW, pages 417--426, 2006.

Cited By

View all
  • (2024)Collective Privacy Sensemaking on Social Media about Period and Fertility Tracking post Roe v. WadeProceedings of the ACM on Human-Computer Interaction10.1145/36410008:CSCW1(1-35)Online publication date: 26-Apr-2024
  • (2023)Privacy Filtering Using Word Embedding for 3D Point Cloud Based Spatial Sharing Systems2023 Fourteenth International Conference on Mobile Computing and Ubiquitous Network (ICMU)10.23919/ICMU58504.2023.10412252(1-7)Online publication date: 29-Nov-2023
  • (2023)An Approach to Multi-Party Privacy Conflict Resolution for Co-owned Images on Content Sharing PlatformsProceedings of the 2023 8th International Conference on Machine Learning Technologies10.1145/3589883.3589923(264-268)Online publication date: 10-Mar-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
WWW '09: Proceedings of the 18th international conference on World wide web
April 2009
1280 pages
ISBN:9781605584874
DOI:10.1145/1526709

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 April 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. game theory
  2. privacy
  3. social networks

Qualifiers

  • Research-article

Conference

WWW '09
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,899 of 8,196 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)78
  • Downloads (Last 6 weeks)12
Reflects downloads up to 26 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Collective Privacy Sensemaking on Social Media about Period and Fertility Tracking post Roe v. WadeProceedings of the ACM on Human-Computer Interaction10.1145/36410008:CSCW1(1-35)Online publication date: 26-Apr-2024
  • (2023)Privacy Filtering Using Word Embedding for 3D Point Cloud Based Spatial Sharing Systems2023 Fourteenth International Conference on Mobile Computing and Ubiquitous Network (ICMU)10.23919/ICMU58504.2023.10412252(1-7)Online publication date: 29-Nov-2023
  • (2023)An Approach to Multi-Party Privacy Conflict Resolution for Co-owned Images on Content Sharing PlatformsProceedings of the 2023 8th International Conference on Machine Learning Technologies10.1145/3589883.3589923(264-268)Online publication date: 10-Mar-2023
  • (2023)Do Streamers Care about Bystanders' Privacy? An Examination of Live Streamers' Considerations and Strategies for Bystanders' Privacy ManagementProceedings of the ACM on Human-Computer Interaction10.1145/35796037:CSCW1(1-29)Online publication date: 16-Apr-2023
  • (2023)Multiuser Privacy and Security Conflicts in the CloudProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581307(1-16)Online publication date: 19-Apr-2023
  • (2023)Bottom-up psychosocial interventions for interdependent privacy: Effectiveness based on individual and content differencesProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581117(1-20)Online publication date: 19-Apr-2023
  • (2022)Towards Automated Content-based Photo Privacy Control in User-Centered Social NetworksProceedings of the Twelfth ACM Conference on Data and Application Security and Privacy10.1145/3508398.3511517(65-76)Online publication date: 14-Apr-2022
  • (2022)Truthfully Negotiating Usage Policy for Data Sovereignty2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)10.1109/TrustCom56396.2022.00014(20-27)Online publication date: Dec-2022
  • (2022)Privacy and Trust in the Internet of VehiclesIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2021.312112523:8(10126-10141)Online publication date: Aug-2022
  • (2022)Birds of a featherComputers and Security10.1016/j.cose.2022.102614115:COnline publication date: 1-Apr-2022
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media