A privacy self-assessment framework for online social networks

Abstract During our digital social life, we share terabytes of information that can potentially reveal private facts and personality traits to unexpected strangers. Despite the research efforts aiming at providing efficient solutions for the anonymization of huge databases (including networked data), in online social networks the most powerful privacy protection “weapons” are the users themselves. However, most users are not aware of the risks derived by the indiscriminate disclosure of their personal data. Moreover, even when social networking platforms allow their participants to control the privacy level of every published item, adopting a correct privacy policy is often an annoying and frustrating task and many users prefer to adopt simple but extreme strategies such as “visible-to-all” (exposing themselves to the highest risk), or “hidden-to-all” (wasting the positive social and economic potential of social networking websites). In this paper we propose a theoretical framework to i) measure the privacy risk of the users and alert them whenever their privacy is compromised and ii) help the users customize semi-automatically their privacy settings by limiting the number of manual operations. By investigating the relationship between the privacy measure and privacy preferences of real Facebook users, we show the effectiveness of our framework.

[1]  Kristen LeFevre,et al.  Privacy wizards for social networking sites , 2010, WWW '10.

[2]  Stefan Wrobel,et al.  Active Hidden Markov Models for Information Extraction , 2001, IDA.

[3]  Barbara Carminati,et al.  Risks of Friendships on Social Networks , 2012, 2012 IEEE 12th International Conference on Data Mining.

[4]  Ann Cavoukian,et al.  Privacy by Design [Leading Edge] , 2012, IEEE Technol. Soc. Mag..

[5]  Dan Lin,et al.  Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites , 2015, IEEE Transactions on Knowledge and Data Engineering.

[6]  M. Premkumar,et al.  Resolving Multi-party Privacy Conflicts in Social Media , 2018 .

[7]  Anna Cinzia Squicciarini,et al.  PriMa: a comprehensive approach to privacy protection in social network sites , 2014, Ann. des Télécommunications.

[8]  Nishchol Mishra,et al.  Privacy in Social Networks : A Survey , 2013 .

[9]  Yang Wang,et al.  VeilMe: An Interactive Visualization Tool for Privacy Configuration of Using Personality Traits , 2015, CHI.

[10]  T. Graepel,et al.  Private traits and attributes are predictable from digital records of human behavior , 2013, Proceedings of the National Academy of Sciences.

[11]  Chedy Raïssi,et al.  Delineating social network data anonymization via random edge perturbation , 2012, CIKM.

[12]  K. Liu,et al.  Towards identity anonymization on graphs , 2008, SIGMOD Conference.

[13]  Quentin Jones,et al.  Online Anonymity Protection in Computer-Mediated Communication , 2010, IEEE Transactions on Information Forensics and Security.

[14]  Alina Campan,et al.  Data and Structural k-Anonymity in Social Networks , 2009, PinKDD.

[15]  Krishna P. Gummadi,et al.  You are who you know: inferring user profiles in online social networks , 2010, WSDM '10.

[16]  Andrew McCallum,et al.  Reducing Labeling Effort for Structured Prediction Tasks , 2005, AAAI.

[17]  Shlomo Argamon,et al.  Committee-Based Sampling For Training Probabilistic Classi(cid:12)ers , 1995 .

[18]  Sanjay Kumar,et al.  Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites , 2016 .

[19]  Jose M. Such,et al.  How Socially Aware Are Social Media Privacy Controls? , 2016, Computer.

[20]  Evimaria Terzi,et al.  A Framework for Computing the Privacy Scores of Users in Online Social Networks , 2009, 2009 Ninth IEEE International Conference on Data Mining.

[21]  R I M Dunbar,et al.  Do online social media cut through the constraints that limit the size of offline social networks? , 2016, Royal Society Open Science.

[22]  Evimaria Terzi,et al.  Reconstructing Randomized Social Networks , 2010, SDM.

[23]  Balachander Krishnamurthy,et al.  Class-based graph anonymization for social network data , 2009, Proc. VLDB Endow..

[24]  Jon M. Kleinberg,et al.  Wherefore art thou R3579X? , 2011, Commun. ACM.

[25]  Justine Becker Measuring privacy risk in online social networks , 2009 .

[26]  William A. Gale,et al.  A sequential algorithm for training text classifiers , 1994, SIGIR '94.

[27]  Lise Getoor,et al.  Preserving the Privacy of Sensitive Relationships in Graph Data , 2007, PinKDD.

[28]  Ahmed K. Elmagarmid,et al.  Privometer: Privacy protection in social networks , 2010, 2010 IEEE 26th International Conference on Data Engineering Workshops (ICDEW 2010).

[29]  Michael Rovatsos,et al.  Privacy Policy Negotiation in Social Media , 2014, TAAS.

[30]  Jian Pei,et al.  The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks , 2011, Knowledge and Information Systems.

[31]  Lei Zou,et al.  K-Automorphism: A General Framework For Privacy Preserving Network Publication , 2009, Proc. VLDB Endow..

[32]  Thomas V. Pollet,et al.  Exploring variation in active network size: Constraints and ego characteristics , 2009, Soc. Networks.

[33]  Barbara Carminati,et al.  Privacy in Social Networks: How Risky is Your Social Graph? , 2012, 2012 IEEE 28th International Conference on Data Engineering.

[34]  Livio Bioglio,et al.  Modeling the Impact of Privacy on Information Diffusion in Social Networks , 2017 .

[35]  Yong Wang,et al.  Social network privacy measurement and simulation , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).

[36]  Jon Kleinberg,et al.  Maximizing the spread of influence through a social network , 2003, KDD '03.

[37]  Michael Netter,et al.  Friend Inspector: A Serious Game to Enhance Privacy Awareness in Social Networks , 2014, ArXiv.

[38]  Ruggero G. Pensa,et al.  A Semi-supervised Approach to Measuring User Privacy in Online Social Networks , 2016, DS.

[39]  Chris Clifton,et al.  A Guide to Differential Privacy Theory in Social Network Analysis , 2012, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.

[40]  David D. Jensen,et al.  Accurate Estimation of the Degree Distribution of Private Networks , 2009, 2009 Ninth IEEE International Conference on Data Mining.

[41]  Xiaowei Ying,et al.  On link privacy in randomizing social networks , 2010, Knowledge and Information Systems.

[42]  Krishna P. Gummadi,et al.  Analyzing facebook privacy settings: user expectations vs. reality , 2011, IMC '11.

[43]  Donald F. Towsley,et al.  Resisting structural re-identification in anonymized social networks , 2008, The VLDB Journal.

[44]  Eden Litt,et al.  Understanding social network site users' privacy tool use , 2013, Comput. Hum. Behav..

[45]  Daniel Jackoway Wherefore Art Thou R 3579 X ? Anonymized Social Networks , Hidden Patterns , and Structural , 2014 .

[46]  Dino Pedreschi,et al.  Uncovering Hierarchical and Overlapping Communities with a Local-First Approach , 2014, TKDD.