A Lightweight Scheme Exploiting Social Networks for Data Minimization According to the GDPR

In many application domains, there is a need to ensure that users satisfy some requirements to use a service: for example, there is a minimum age to buy alcoholic beverages or to watch some videos on YouTube. In these situations, organizations typically collect more personal information than necessary to provide a better service. The consequence is a personal data leakage that violates the data minimization principle stated by the General Data Protection Regulation 2016/679. This article proposes a new approach for allowing individuals to maintain control over the disclosure of their data, deciding which information to disclose and for how long. Our approach is based on the use of social networks, and implementation on Facebook is presented to show that the proposed solution is effective, cheap, friendly, and simple to adopt.

[1]  Xuyun Zhang,et al.  Location-Aware Service Recommendations With Privacy-Preservation in the Internet of Things , 2020, IEEE Transactions on Computational Social Systems.

[2]  Kalman Graffi,et al.  Peer-to-Peer-Based Social Networks: A Comprehensive Survey , 2020, SN Computer Science.

[3]  Tao Wang,et al.  Characterizing the Propagation of Situational Information in Social Media During COVID-19 Epidemic: A Case Study on Weibo , 2020, IEEE Transactions on Computational Social Systems.

[4]  Yichuan Jiang,et al.  Diffusion in Social Networks: A Multiagent Perspective , 2015, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[5]  Blaise Ngonmang,et al.  Monetization and Services on a Real Online Social Network Using Social Network Analysis , 2013, 2013 IEEE 13th International Conference on Data Mining Workshops.

[6]  Doina Cosovan,et al.  Private Data System Enabling Self-Sovereign Storage Managed by Executable Choreographies , 2017, DAIS.

[7]  Abida Ellahi,et al.  Key quality factors affecting users' perception of social networking websites , 2013 .

[8]  R. Joosten,et al.  Self-Sovereign Identity: a Comparison of IRMA and Sovrin , 2019 .

[9]  Jim Groom,et al.  The Path to Self-Sovereign Identity , 2017 .

[10]  Fan Yang,et al.  Anonymous Privacy Preservation Based on m-Signature and Fuzzy Processing for Real-Time Data Release , 2020, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[11]  Shuai Wang,et al.  Blockchain-Enabled Smart Contracts: Architecture, Applications, and Future Trends , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[12]  John Hughes,et al.  Security Assertion Markup Language (SAML) 2.0 Technical Overview , 2004 .

[13]  Simon Josefsson,et al.  The Base16, Base32, and Base64 Data Encodings , 2003, RFC.

[14]  Sebastian Ramacher,et al.  Privacy-Preserving eID Derivation for Self-Sovereign Identity Systems , 2019, ICICS.

[15]  Peter Mell,et al.  A Taxonomic Approach to Understanding Emerging Blockchain Identity Management Systems , 2019, ArXiv.

[16]  Bin Zhou,et al.  A regional adaptive variational PDE model for computed tomography image reconstruction , 2019, Pattern Recognit..

[17]  Gergely Alpár,et al.  Privacy-Preserving Webshopping with Attributes , 2017, 2017 IEEE Symposium on Privacy-Aware Computing (PAC).

[18]  Wei Wei,et al.  Gradient-driven parking navigation using a continuous information potential field based on wireless sensor network , 2017, Inf. Sci..

[19]  Rico Hageman,et al.  Self-Sovereign Identity Solutions: The Necessity of Blockchain Technology , 2019, ArXiv.

[20]  Robertas Damasevicius,et al.  Multi-sink distributed power control algorithm for Cyber-physical-systems in coal mine tunnels , 2019, Comput. Networks.

[21]  Hong-Ning Dai,et al.  SCTSC: A Semicentralized Traffic Signal Control Mode With Attribute-Based Blockchain in IoVs , 2019, IEEE Transactions on Computational Social Systems.

[22]  Yongli Li,et al.  Utility-Based Model for Characterizing the Evolution of Social Networks , 2020, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[23]  D. Richard Kuhn,et al.  Attribute-Based Access Control , 2017, Computer.