Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1109/CSE.2009.387guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

FaceCloak: An Architecture for User Privacy on Social Networking Sites

Published: 29 August 2009 Publication History

Abstract

Social networking sites, such as MySpace, Facebook and Flickr, are gaining more and more popularity among Internet users. As users are enjoying this new style of networking, privacy concerns are also attracting increasing public attention due to reports about privacy breaches on social networking sites. We propose FaceCloak, an architecture that protects user privacy on a social networking site by shielding a user's personal information from the site and from other users that were not explicitly authorized by the user. At the same time, FaceCloak seamlessly maintains usability of the site's services. FaceCloak achieves these goals by providing fake information to the social networking site and by storing sensitive information in encrypted form on a separate server. We implemented our solution as a Firefox browser extension for the Facebook platform. Our experiments show that our solution successfully conceals a user's personal information, while allowing the user and her friends to explore Facebook pages and services as usual.

Cited By

View all
  • (2022)Image DePO: Towards Gradual Decentralization of Online Social Networks using Decentralized Privacy OverlaysProceedings of the ACM on Human-Computer Interaction10.1145/35129076:CSCW1(1-28)Online publication date: 7-Apr-2022
  • (2021)Strategic Evasion of Centrality MeasuresProceedings of the 20th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3463952.3464112(1389-1397)Online publication date: 3-May-2021
  • (2021)Enabling Privacy-Preserving Rule Mining in Decentralized Social NetworksProceedings of the 16th International Conference on Availability, Reliability and Security10.1145/3465481.3465482(1-11)Online publication date: 17-Aug-2021
  • Show More Cited By
  1. FaceCloak: An Architecture for User Privacy on Social Networking Sites

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    CSE '09: Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 03
    August 2009
    513 pages
    ISBN:9780769538235

    Publisher

    IEEE Computer Society

    United States

    Publication History

    Published: 29 August 2009

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 20 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Image DePO: Towards Gradual Decentralization of Online Social Networks using Decentralized Privacy OverlaysProceedings of the ACM on Human-Computer Interaction10.1145/35129076:CSCW1(1-28)Online publication date: 7-Apr-2022
    • (2021)Strategic Evasion of Centrality MeasuresProceedings of the 20th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3463952.3464112(1389-1397)Online publication date: 3-May-2021
    • (2021)Enabling Privacy-Preserving Rule Mining in Decentralized Social NetworksProceedings of the 16th International Conference on Availability, Reliability and Security10.1145/3465481.3465482(1-11)Online publication date: 17-Aug-2021
    • (2018)Towards designing a mobile app that creates avatars for privacy protectionProceedings of the 20th International Conference on Human-Computer Interaction with Mobile Devices and Services Adjunct10.1145/3236112.3236123(79-86)Online publication date: 3-Sep-2018
    • (2018)CyberActivist: Tool for Raising Awareness on Privacy and Security of Social Media Use for ActivistsSocial Computing and Social Media. User Experience and Behavior10.1007/978-3-319-91521-0_36(498-510)Online publication date: 15-Jul-2018
    • (2017)Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret QuestionsIEEE Transactions on Mobile Computing10.1109/TMC.2016.254624516:2(552-565)Online publication date: 1-Feb-2017
    • (2017)Privacy requirementsProceedings of the 39th International Conference on Software Engineering: Software Engineering in Society Track10.1109/ICSE-SEIS.2017.3(13-22)Online publication date: 20-May-2017
    • (2017)Situation-based privacy autonomous management for mobile social networksComputer Communications10.1016/j.comcom.2017.04.003107:C(75-92)Online publication date: 15-Jul-2017
    • (2016)Privacy-Preserving IR 2016Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval10.1145/2911451.2917763(1247-1248)Online publication date: 7-Jul-2016
    • (2016)Privacy and Utility of Inference Control Mechanisms for Social Computing ApplicationsProceedings of the 11th ACM on Asia Conference on Computer and Communications Security10.1145/2897845.2897878(829-840)Online publication date: 30-May-2016
    • Show More Cited By

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media