Characterizing privacy in online social networks

  title={Characterizing privacy in online social networks},
  author={Balachander Krishnamurthy and Craig E. Wills},
  booktitle={WOSN '08},
Online social networks (OSNs) with half a billion users have dramatically raised concerns on privacy leakage. Users, often willingly, share personal identifying information about themselves, but do not have a clear idea of who accesses their private information or what portion of it really needs to be accessed. In this study we examine popular OSNs from a viewpoint of characterizing potential privacy leakage. Our study identifies what bits of information are currently being shared, how widely… 

Figures and Tables from this paper

Friendship and Privacy in Online Social Networks

By sending out friend requests to unknown users in one of the largest OSNs, this work provides evidence that a considerable portion of OSN users are willing to let a stranger, possibly an adversary, into their social network, thus granting her access to the users’ personal information and to some extent to those of their friends.

Privacy Albeit Late

The main findings are: only a low percentage of users change the default privacy settings; women are more concerned about disclosing personal information online; many users share their photo albums and links to everyone; users exercise more control over content that is more potentially dangerous to their reputation.

You are what you type: Privacy in Online Social Networks

This paper will provide an analysis of the privacy issues related to OSNs and using a hypothetical scenario it will argue for the SNS users’ right to privacy.

Inferring Private Attributes in Online Social Networks

Based on friendship links, it is able to infer and predict some of the attributes of a user with good accuracy and show that public friendship links of a person can expose different attributes about him.

Privacy in Online Social Networks

  • Elie RaadR. Chbeir
  • Computer Science
    Security and Privacy Preserving in Social Networks
  • 2013
This chapter describes the fundamental of social networks, their common representations, and the main motivations associated with their use, and shows how privacy attacks can build on social network analysis and link mining techniques to reveal user-sensitive information.

Privacy and security in online social networks: A survey

To Add or Not to Add: Privacy and Social Honeypots

  • H. HaddadiPan Hui
  • Computer Science
    2010 IEEE International Conference on Communications Workshops
  • 2010
It is found that usually users do not accept random friendship requests, but some aggressively search for celebrities, making a perfect case for spammers to form honeypots using such fake profiles.

Will you be my friend? privacy implications of accepting friendships in online social networks

  • S. GhorbaniY. Ganjali
  • Computer Science
    International Conference on Information Society (i-Society 2012)
  • 2012
By sending out friend requests to unknown users in one of the largest OSNs, this work provides evidence that a considerable portion of OSN users are willing to let a stranger, possibly an adversary, into their social network, thus granting her access to the users' personal information and to some extent to those of their friends.

Privacy Threats Related to User Profiling in Online Social Networks

This paper structure different privacy threats related to OSNs and describe six different types of privacy threats and proposes a range of different protection techniques.

A Privacy Protection Model for Online Social Networks

  • J. Ahmed
  • Computer Science
  • 2014
This model uses type, frequency, and initiation factor of social interactions to calculate relationship strength and mimics real life interaction patterns and makes online social networks more privacy friendly.



Information revelation and privacy in online social networks

This paper analyzes the online behavior of more than 4,000 Carnegie Mellon University students who have joined a popular social networking site catered to colleges and evaluates the amount of information they disclose and study their usage of the site's privacy settings.

Generating a privacy footprint on the internet

The results show that the size of the privacy footprint is a legitimate cause for concern across the sets of sites that the study and the effectiveness of existing and new techniques to reduce this diffusion are examined.

Preserving Privacy in Social Networks Against Neighborhood Attacks

  • Bin ZhouJ. Pei
  • Computer Science
    2008 IEEE 24th International Conference on Data Engineering
  • 2008
The empirical study indicates that anonymized social networks generated by the method can still be used to answer aggregate network queries with high accuracy and present a practical solution to battle neighborhood attacks.

Link Privacy in Social Networks

Any social network that wishes to protect the link privacy of its users should take great care in choosing the lookahead of its interface, limiting it to 1 or 2, whenever possible.

Measuring privacy loss and the impact of privacy protection in web browsing

Using objective measures for privacy protection and page quality, this work examines the effectiveness of specific techniques to limit the diffusion of private information to third parties and the impact of these privacy protection techniques on the usability and quality of the Web pages returned.

k-Anonymity: A Model for Protecting Privacy

  • L. Sweeney
  • Computer Science
    Int. J. Uncertain. Fuzziness Knowl. Based Syst.
  • 2002
The solution provided in this paper includes a formal protection model named k-anonymity and a set of accompanying policies for deployment and examines re-identification attacks that can be realized on releases that adhere to k- anonymity unless accompanying policies are respected.

Betrayed By My Shadow: Learning Data Identity via Trail Matching

This work provides a foundation for several new research directions, including the development of methods for learning identity and additional information across disparate datasets, as well as a foundations for methods that enable data holders to share information with guarantees of anonymity.

Key differences between Web 1.0 and Web 2.0

Novel challenges due to the different structures of Web 2.0 sites, richer methods of user interaction, new technologies, and fundamentally different philosophy are identified.

Internet Measurement - Infrastructure, Traffic, and Applications

This book focuses on the role of Internet Measurement in Security, and the challenges and prospects for future work in this area.

A few chirps about twitter

A detailed characterization of Twitter, an application that allows users to send short messages, is presented, which identifies distinct classes of Twitter users and their behaviors, geographic growth patterns and current size of the network.