The walls have ears: optimize sharing for visibility and privacy in online social networks

With a rapid expansion of online social networks (OSNs), millions of users are tweeting and sharing their personal status daily without being aware of where that information eventually travels to. Likewise, with a huge magnitude of data available on OSNs, it poses a substantial challenge to track how a piece of information leaks to specific targets. In this paper, we study the problem of smartly sharing information to control the propagation of sensitive information in OSNs. In particular, we formulate and investigate the Maximum Circle of Trust problem of which we seek to construct a circle of trust on the fly so that OSN users can safely share their information knowing that it will not be propagated to their unwanted targets (whom they are not willing to share with). Since most of messages in OSNs are propagated within 2 to 5 hops, we first investigate this problem under 2-hop information propagation by showing the hardness of obtaining an optimal solution, along with an algorithm with proven performance guarantee. In a general case where information can be propagated more than two hops, the problem is #P-hard i.e. the problem cannot be solved in a polynomial time. Thus we propose a novel greedy algorithm, hybridizing the handy but costly sampling method with a novel cut-based estimation. The quality of the hybrid algorithm is comparable to that of the sampling method while taking only a tiny fraction of the time. We have validated the effectiveness of our solutions in many real-world traces. Such an extensive experiment also highlights several important observations on information leakage which help to sharpen the security of OSNs in the future.

[1]  Minas Gjoka,et al.  Walking in Facebook: A Case Study of Unbiased Sampling of OSNs , 2010, 2010 Proceedings IEEE INFOCOM.

[2]  Krishna P. Gummadi,et al.  Measuring User Influence in Twitter: The Million Follower Fallacy , 2010, ICWSM.

[3]  My T. Thai,et al.  Maximizing circle of trust in online social networks , 2012, HT '12.

[4]  Hosung Park,et al.  What is Twitter, a social network or a news media? , 2010, WWW '10.

[5]  Éva Tardos,et al.  Influential Nodes in a Diffusion Model for Social Networks , 2005, ICALP.

[6]  Laks V. S. Lakshmanan,et al.  Learning influence probabilities in social networks , 2010, WSDM '10.

[7]  Krishna P. Gummadi,et al.  A measurement-driven analysis of information propagation in the flickr social network , 2009, WWW '09.

[8]  Ramanathan V. Guha,et al.  Information diffusion through blogspace , 2004, WWW '04.

[9]  Sanjeev Arora,et al.  Computational Complexity: A Modern Approach , 2009 .

[10]  Ravi Kumar,et al.  Influence and correlation in social networks , 2008, KDD.

[11]  Jacob Goldenberg,et al.  Talk of the Network: A Complex Systems Look at the Underlying Process of Word-of-Mouth , 2001 .

[12]  Wei Chen,et al.  Scalable influence maximization for prevalent viral marketing in large-scale social networks , 2010, KDD.

[13]  Bart De Decker,et al.  conf/cse/NigusseDN09 conf/dbsec/VerslypeDNNLV08 Girma Nigusse = Girma Enideg Nigusse Privacy Codes of Practice for the Social Web: The Analysis of Existing Privacy Codes and Emerging Social-Centric Privacy Risks , 2010, AAAI Spring Symposium: Intelligent Information Privacy Management.

[14]  Kuan-Ta Chen,et al.  Involuntary Information Leakage in Social Network Services , 2008, IWSEC.

[15]  Ed H. Chi,et al.  Talking in circles: selective sharing in google+ , 2012, CHI.

[16]  Johan Håstad,et al.  Clique is hard to approximate within n/sup 1-/spl epsiv// , 1996, Proceedings of 37th Conference on Foundations of Computer Science.

[17]  Noga Alon,et al.  The Probabilistic Method , 2015, Fundamentals of Ramsey Theory.

[18]  Krishna P. Gummadi,et al.  On the evolution of user interaction in Facebook , 2009, WOSN '09.

[19]  Rizal Setya Perdana What is Twitter , 2013 .

[20]  Karen Rose,et al.  What is Twitter , 2009 .

[21]  Jimeng Sun,et al.  Social influence analysis in large-scale networks , 2009, KDD.

[22]  Isao Echizen,et al.  New Approach to Quantification of Privacy on Social Network Sites , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[23]  Jonas Holmerin,et al.  Clique Is Hard to Approximate within n1-o(1) , 2000, ICALP.

[24]  Scott T Walters,et al.  Feedback interventions for college alcohol misuse: what, why and for whom? , 2005, Addictive behaviors.