A Study of Online Social Network Privacy Via the TAPE Framework

While personal information privacy is threatened by online social networks, researchers are seeking for privacy protection tools and methods to assist online social network users. In this paper, we propose a Trust-Aware Privacy Evaluation framework, called TAPE, aiming to address this problem. Under the TAPE framework we investigate how to quantitatively evaluate the privacy risk, as a function of people's awarenesses of privacy risks as well as whether people can be trusted by their friends to protect others' personal information. Simulations are performed to illustrate the key concepts and calculations, as well as the advantages of TAPE. Based on the TAPE framework, we also propose an unfriending strategy in terms of privacy protection, which outperforms other existing unfriending strategies.

[1]  Haiyan Wang,et al.  On the Existence of Positive Solutions of Fourth-Order Ordinary Differential Equations , 1995 .

[2]  Gary Stoneburner,et al.  SP 800-30. Risk Management Guide for Information Technology Systems , 2002 .

[3]  Jongin Lim,et al.  Quantitative Risk Analysis and Evaluation in Information Systems: A Case Study , 2007, International Conference on Computational Science.

[4]  Kristen LeFevre,et al.  Privacy wizards for social networking sites , 2010, WWW '10.

[5]  Saikat Guha,et al.  NOYB: privacy in online social networks , 2008, WOSN '08.

[6]  Balachander Krishnamurthy,et al.  On the leakage of personally identifiable information via online social networks , 2009, CCRV.

[7]  Mohamed Hamdi,et al.  Computer and network security risk management: theory, challenges, and countermeasures , 2005, Int. J. Commun. Syst..

[8]  Young-Gab Kim,et al.  A Security Risk Analysis Model for Information Systems , 2004, AsiaSim.

[9]  John D. Andrews,et al.  Birnbaum's measure of component importance for noncoherent systems , 2003, IEEE Trans. Reliab..

[10]  Steven Walczak,et al.  Unfriending on Facebook: Friend Request and Online/Offline Behavior Analysis , 2011, 2011 44th Hawaii International Conference on System Sciences.

[11]  A. Felt Privacy Protection for Social Networking APIs , 2008 .

[12]  Jennifer Neville,et al.  Modeling relationship strength in online social networks , 2010, WWW '10.

[13]  Zhu Han,et al.  A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[14]  Mick J. Ridley,et al.  Multi agent system approach for vulnerability analysis of online social network profiles over time , 2012, Int. J. Knowl. Web Intell..

[15]  Bobby Bhattacharjee,et al.  Persona: an online social network with user-defined privacy , 2009, SIGCOMM '09.

[16]  C. Wang Manycast and Anycast-Based Infrastructure Communication Reliability for Wireless Sensor Networks , 2012 .

[17]  Keke Chen,et al.  Mining Privacy Settings to Find Optimal Privacy-Utility Tradeoffs for Social Network Services , 2012, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing.

[18]  B EllisonNicole,et al.  Social Network Sites , 2007 .

[19]  Minas Gjoka,et al.  Walking on a graph with a magnifying glass: stratified sampling via weighted random walks , 2011, PERV.

[20]  Krishna P. Gummadi,et al.  A measurement-driven analysis of information propagation in the flickr social network , 2009, WWW '09.

[21]  A. Lee Swindlehurst,et al.  IEEE Journal of Selected Topics in Signal Processing Inaugural Issue: [editor-in-chief's message] , 2007, J. Sel. Topics Signal Processing.

[22]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[23]  Zekeriya Erkin,et al.  Generating private recommendations in a social trust network , 2011, 2011 International Conference on Computational Aspects of Social Networks (CASoN).

[24]  Daniel Neagu,et al.  A vulnerability evaluation framework for online social network profiles: axioms and propositions , 2012 .

[25]  Sonia Livingstone,et al.  Taking risky opportunities in youthful content creation: teenagers' use of social networking sites for intimacy, privacy and self-expression , 2008, New Media Soc..

[26]  Ramanathan V. Guha,et al.  Information diffusion through blogspace , 2004, WWW '04.

[27]  Pieter H. Hartel,et al.  Privacy in Recommender Systems , 2013, Social Media Retrieval.

[28]  Michael D. Smith,et al.  Computer security strength and risk: a quantitative approach , 2004 .

[29]  Michael Nentwich,et al.  Social network sites, privacy and the blurring boundary between public and private spaces , 2013 .

[30]  Danah Boyd,et al.  Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..

[31]  Mick J. Ridley,et al.  Algorithms for Data Retrieval from Online Social Network Graphs , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.

[32]  Kishor S. Trivedi,et al.  A BDD-Based Algorithm for Reliability , 2000 .

[33]  Jure Leskovec,et al.  Correcting for missing data in information cascades , 2011, WSDM '11.

[34]  Hui Xiong,et al.  Information propagation in online social networks: a tie-strength perspective , 2011, Knowledge and Information Systems.

[35]  G. Stoneburner,et al.  Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology , 2002 .

[36]  Ralf De Wolf,et al.  Privacy by Design Through a Social Requirements Analysis of Social Network Sites form a User Perspective , 2013, European Data Protection.

[37]  Muhammad Zubair Shafiq,et al.  Modeling Morphology of Social Network Cascades , 2013, ArXiv.

[38]  Huan Liu,et al.  Exploiting vulnerability to secure user privacy on a social networking site , 2011, KDD.

[39]  Liudong Xing,et al.  Reliability analysis of wireless sensor networks using different network topology characteristics , 2012, 2012 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering.

[40]  Lada A. Adamic,et al.  Tracking information epidemics in blogspace , 2005, The 2005 IEEE/WIC/ACM International Conference on Web Intelligence (WI'05).