TY - GEN
T1 - My friend leaks my privacy
T2 - 23rd ACM Symposium on Access Control Models and Technologies, SACMAT 2018
AU - Yu, Lingjing
AU - Motipalli, Sri Mounica
AU - Lee, Dongwon
AU - Liu, Peng
AU - Xu, Heng
AU - Liu, Qingyun
AU - Tan, Jianlong
AU - Luo, Bo
N1 - Publisher Copyright:
© 2018 Association for Computing Machinery.
PY - 2018/6/7
Y1 - 2018/6/7
N2 - With the dramatically increasing participation in online social networks (OSNs), huge amount of private information becomes available on such sites. It is critical to preserve users' privacy without preventing them from socialization and sharing. Unfortunately, existing solutions fall short meeting such requirements. We argue that the key component of OSN privacy protection is protecting (sensitive) content - privacy as having the ability to control information dissemination. We follow the concepts of private information boundaries and restricted access and limited control to introduce a social circle model.We articulate the formal constructs of this model and the desired properties for privacy protection in the model. We show that the social circle model is efficient yet practical, which provides certain level of privacy protection capabilities to users, while still facilitates socialization. We then utilize this model to analyze the most popular social network platforms on the Internet (Facebook, Google+, WeChat, etc), and demonstrate the potential privacy vulnerabilities in some social networks. Finally, we discuss the implications of the analysis, and possible future directions.
AB - With the dramatically increasing participation in online social networks (OSNs), huge amount of private information becomes available on such sites. It is critical to preserve users' privacy without preventing them from socialization and sharing. Unfortunately, existing solutions fall short meeting such requirements. We argue that the key component of OSN privacy protection is protecting (sensitive) content - privacy as having the ability to control information dissemination. We follow the concepts of private information boundaries and restricted access and limited control to introduce a social circle model.We articulate the formal constructs of this model and the desired properties for privacy protection in the model. We show that the social circle model is efficient yet practical, which provides certain level of privacy protection capabilities to users, while still facilitates socialization. We then utilize this model to analyze the most popular social network platforms on the Internet (Facebook, Google+, WeChat, etc), and demonstrate the potential privacy vulnerabilities in some social networks. Finally, we discuss the implications of the analysis, and possible future directions.
UR - http://www.scopus.com/inward/record.url?scp=85049332009&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85049332009&partnerID=8YFLogxK
U2 - 10.1145/3205977.3205981
DO - 10.1145/3205977.3205981
M3 - Conference contribution
AN - SCOPUS:85049332009
T3 - Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
SP - 93
EP - 104
BT - SACMAT 2018 - Proceedings of the 23rd ACM Symposium on Access Control Models and Technologies
PB - Association for Computing Machinery
Y2 - 13 June 2018 through 15 June 2018
ER -