PrivacyJudge: Effective Privacy Controls for Online Published Information

With the rise of online social networks, sharing of personal information online has become the rule for many people rather than the exception. However, users have only limited abilities to effectively control privacy of their posted information. Even gaining an overview of posted information is already a difficult task. We propose a privacy control system for personal information online. Privacy Judge allows fine-grained access control to posted information and provides a comprehensive overview of previously posted data. Thereby, Privacy Judge does not require cooperation of service providers, instead operation remains transparent to them. Thus effectively providing privacy protection against other users and service providers alike. Privacy Judge follows a hybrid approach combining cryptographic enforcement with social signaling to achieve privacy protection beyond technical enforcement boundaries by leveraging system trust as well as social trust mechanisms.

[1]  Ramón Cáceres,et al.  Virtual individual servers as privacy-preserving proxies for mobile devices , 2009, MobiHeld '09.

[2]  Fabio Vitali,et al.  Content cloaking: preserving privacy with Google Docs and other web applications , 2010, SAC '10.

[3]  Leonard Shyles,et al.  US teenagers’ perceptions and awareness of digital technology: a focus group approach , 2010, New Media Soc..

[4]  Brent Waters,et al.  Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs , 2010, NDSS.

[5]  Sonja Buchegger,et al.  PeerSoN: P2P social networking: early experiences and insights , 2009, SNS '09.

[6]  Saikat Guha,et al.  NOYB: privacy in online social networks , 2008, WOSN '08.

[7]  Amit A. Levy,et al.  Vanish: Increasing Data Privacy with Self-Destructing Data , 2009, USENIX Security Symposium.

[8]  Lorrie Faith Cranor,et al.  Use of a P3P user agent by early adopters , 2002, WPES '02.

[9]  Qi Xie,et al.  FaceCloak: An Architecture for User Privacy on Social Networking Sites , 2009, 2009 International Conference on Computational Science and Engineering.

[10]  Bobby Bhattacharjee,et al.  Persona: an online social network with user-defined privacy , 2009, SIGCOMM '09.

[11]  Refik Molva,et al.  Safebook: A privacy-preserving online social network leveraging on real-life trust , 2009, IEEE Communications Magazine.

[12]  Ramón Cáceres,et al.  Vis-à-Vis: Privacy-preserving online social networking via Virtual Individual Servers , 2011, 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011).

[13]  Lorrie Faith Cranor,et al.  P3P: Making Privacy Policies More Useful , 2003, IEEE Secur. Priv..

[14]  Lorrie Faith Cranor,et al.  A "nutrition label" for privacy , 2009, SOUPS.

[15]  Nikita Borisov,et al.  FlyByNight: mitigating the privacy risks of social networking , 2008, WPES '08.