Long-Lived Broadcast Encryption
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Friendster and publicly articulated social networking
CHI '04 Extended Abstracts on Human Factors in Computing Systems
Information revelation and privacy in online social networks
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Modeling cryptographic properties of voice and voice-based entity authentication
Proceedings of the 2007 ACM workshop on Digital identity management
Characterizing privacy in online social networks
Proceedings of the first workshop on Online social networks
Privacy-preserving social network analysis for criminal investigations
Proceedings of the 7th ACM workshop on Privacy in the electronic society
Link privacy in social networks
Proceedings of the 17th ACM conference on Information and knowledge management
Collective privacy management in social networks
Proceedings of the 18th international conference on World wide web
User-centric privacy preservation in data-sharing applications
NPC'10 Proceedings of the 2010 IFIP international conference on Network and parallel computing
Measuring profile distance in online social networks
Proceedings of the International Conference on Web Intelligence, Mining and Semantics
Hi-index | 0.00 |
We study the problem of limiting privacy loss due to data shared in a social network, where the basic underlying assumptions are that users are interested in sharing data and cannot be assumed to constantly follow appropriate privacy policies. Note that if these two assumptions do not hold, social network privacy is theoretically very easy to achieve; for instance, via some form of access control and confidentiality transformation on the data. In this paper we observe that users-regulated access control has shown to be unsuccessful for practical social network, and propose that social networks deploy an additional layer of server-assisted access control which, even under no action from a user, automatically evolves over time, by restricting access to the user's data. The evolving access control mechanism provides non-trivial quantifiable guarantees for formally specified requirements of utility (i.e., users share as much data as possible to all other users) and privacy (i.e., users expose combinations of sensitive data only with low probability and over a long time). To the best of our knowledge, this is the first research solution attempting to simultaneously maximizes utility and safeguards privacy of users sharing data in social networking websites.