PROTOSS: A Run Time Tool for Detecting Privacy Violations in Online Social Networks

As online social networks are becoming part of both social and work life, preserving privacy of their users is becoming tremendously difficult. While these social networks are promising privacy through privacy agreements, everyday new privacy leakages are emerging. Ideally, online social networks should be able to manage and maintain their agreements through well-founded methods. However, the dynamic nature of the online social networks is making it difficult to keep private information contained. We have developed PROTOSS, a run time tool for detecting privacy leakages in online social networks. PROTOSS captures relations among users, their privacy agreements with an online social network operator, and domain-based inference rules. It then uses model checking to detect if an online social network will leak private information.

[1]  Balachander Krishnamurthy,et al.  On the leakage of personally identifiable information via online social networks , 2009, CCRV.

[2]  Jamal Bentahar,et al.  On the verification of social commitments and time , 2011, AAMAS.

[3]  Edmund M. Clarke,et al.  Design and Synthesis of Synchronization Skeletons Using Branching Time Temporal Logic , 2008, 25 Years of Model Checking.

[4]  Wolfgang Thomas,et al.  Handbook of Theoretical Computer Science, Volume B: Formal Models and Semantics , 1990 .

[5]  Marco Pistore,et al.  Nusmv version 2: an opensource tool for symbolic model checking , 2002, CAV 2002.

[6]  Barbara Carminati,et al.  Privacy-Aware Access Control in Social Networks: Issues and Solutions , 2010 .

[7]  Munindar P. Singh An ontology for commitments in multiagent systems: , 1999, Artificial Intelligence and Law.

[8]  Munindar P. Singh,et al.  Flexible protocol specification and execution: applying event calculus planning using commitments , 2002, AAMAS '02.

[9]  Barbara Carminati,et al.  Privacy in Social Networks: How Risky is Your Social Graph? , 2012, 2012 IEEE 28th International Conference on Data Engineering.

[10]  Kristen LeFevre,et al.  Privacy wizards for social networking sites , 2010, WWW '10.

[11]  Munindar P. Singh An ontology for commitments in multiagent systems: , 1999, Artificial Intelligence and Law.

[12]  Munindar P. Singh,et al.  Specifying and Verifying Cross-Organizational Business Models: An Agent-Oriented Approach , 2012, IEEE Transactions on Services Computing.

[13]  E. Allen Emerson,et al.  Temporal and Modal Logic , 1991, Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics.

[14]  J. Van Leeuwen,et al.  Handbook of theoretical computer science - Part A: Algorithms and complexity; Part B: Formal models and semantics , 1990 .

[15]  Marco Pistore,et al.  NuSMV 2: An OpenSource Tool for Symbolic Model Checking , 2002, CAV.

[16]  Jan van Leeuwen,et al.  Handbook of Theoretical Computer Science, Vol. B: Formal Models and Semantics , 1994 .