Preserving Privacy as Social Responsibility in Online Social Networks

被引:28
|
作者
Kekulluoglu, Dilara [1 ]
Kokciyan, Nadin [2 ]
Yolum, Pinar [1 ,3 ]
机构
[1] Bogazici Univ, Dept Comp Engn, TR-34342 Istanbul, Turkey
[2] Kings Coll London, London WC2B 480, England
[3] Univ Utrecht, Utrecht, Netherlands
关键词
Privacy; agreement; negotiation;
D O I
10.1145/3158373
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Online social networks provide an environment for their users to share content with others, where the user who shares a content item is put in charge, generally ignoring others that might be affected by it. However, a content that is shared by one user can very well violate the privacy of other users. To remedy this, ideally, all users who are related to a content should get a say in how the content should be shared. Recent approaches advocate the use of agreement technologies to enable stakeholders of a post to discuss the privacy configurations of a post. This allows related individuals to express concerns so that various privacy violations are avoided up front. Existing techniques try to establish an agreement on a single post. However, most of the time, agreement should be established over multiple posts such that the user can tolerate slight breaches of privacy in return of a right to share posts themselves in future interactions. As a result, users can help each other preserve their privacy, viewing this as their social responsibility. This article develops a reciprocity-based negotiation for reaching privacy agreements among users and introduces a negotiation architecture that combines semantic privacy rules with utility functions. We evaluate our approach over multiagent simulations with software agents that mimic users based on a user study.
引用
收藏
页数:22
相关论文
共 50 条
  • [21] Target Privacy Preserving for Social Networks
    Jiang, Zhongyuan
    Sun, Lichao
    Yu, Philip S.
    Li, Hui
    Ma, Jianfeng
    Shen, Yulong
    2020 IEEE 36TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2020), 2020, : 1862 - 1865
  • [22] A Privacy-Preserving Scheme for Interactive Messaging Over Online Social Networks
    Cai, Ying
    Zhang, Shunan
    Xia, Hongke
    Fan, Yanfang
    Zhang, Haochen
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (08): : 6817 - 6827
  • [23] Privacy-Preserving Abuse Detection in Future Decentralised Online Social Networks
    Garcia-Recuero, Alvaro
    Burdges, Jeffrey
    Grothoff, Christian
    DATA PRIVACY MANAGEMENT AND SECURITY ASSURANCE, 2016, 9963 : 78 - 93
  • [24] POSTER: Privacy-Preserving Profile Similarity Computation in Online Social Networks
    Jeckmans, Arjan
    Tang, Qiang
    Hartel, Pieter
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 793 - 795
  • [25] PPAD: Privacy Preserving Group-Based ADvertising in Online Social Networks
    Boshrooyeh, Sanaz Taheri
    Kupcu, Alptekin
    Ozkasap, Oznur
    2018 IFIP NETWORKING CONFERENCE (IFIP NETWORKING) AND WORKSHOPS, 2018, : 514 - 522
  • [26] A Comprehensive Analysis of Privacy-Preserving Solutions Developed for Online Social Networks
    Majeed, Abdul
    Khan, Safiullah
    Hwang, Seong Oun
    ELECTRONICS, 2022, 11 (13)
  • [27] Differential Privacy-Preserving User Linkage across Online Social Networks
    Yao, Xin
    Zhang, Rui
    Zhang, Yanchao
    2021 IEEE/ACM 29TH INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS), 2021,
  • [28] PPFQ: Privacy-Preserving Friends Query over Online Social Networks
    Li, Yuxi
    Zhou, Fucai
    Xu, Zifeng
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1349 - 1354
  • [29] Preserving Integrity in Online Social Networks
    Halevy, Alon
    Canton-Ferrer, Cristian
    Ma, Hao
    Ozertem, Umut
    Pantel, Patrick
    Saeidi, Marzieh
    Silvestri, Fabrizio
    Stoyanov, Ves
    COMMUNICATIONS OF THE ACM, 2022, 65 (02) : 92 - 98
  • [30] Recipient Privacy in Online Social Networks
    Beato, Filipe
    Halunen, Kimmo
    Mennink, Bart
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2016, 2016, 9836 : 254 - 264