Towards Privacy-Preserving Content Sharing for Online Social Networks

@article{Phithakkitnukoon2018TowardsPC,
  title={Towards Privacy-Preserving Content Sharing for Online Social Networks},
  author={Santi Phithakkitnukoon},
  journal={Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers},
  year={2018}
}
  • S. Phithakkitnukoon
  • Published 2018
  • Computer Science
  • Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers
This paper presents presents an approach to preserve privacy for content sharing in online social networks. The approach is based on the concept of friendship strengths and social ties within a friendship circle. Friends can be categorized into different groups according to social strength e.g., close friends, just friends, and distant friends. Therefore, there are corresponding levels of privacy concerns. The paper describes a mechanism that categorizes a friend list based on "social context… Expand

References

SHOWING 1-10 OF 21 REFERENCES
Privacy-Preserving Friendship Relations for Mobile Social Networking W 3 C Workshop on the Future of Social Networking – Position Paper
This position paper explores the dual nature of friendship relations as an enabler but also as a pitfall for privacy in social networks. The privacy-deteriorating consequences of unilateralExpand
To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles
TLDR
This work shows how an adversary can exploit an online social network with a mixture of public and private user profiles to predict the private attributes of users, and proposes practical models that use friendship and group membership information to infer sensitive attributes. Expand
Privacy suites: shared privacy for social networks
TLDR
A new paradigm is proposed which allows users to easily choose "suites" of privacy settings which have been specified by friends or trusted experts, only modifying them if they wish, which could dramatically increase the privacy protection that most users experience with minimal time investment. Expand
Preserving Privacy in Social Networks Against Neighborhood Attacks
  • Bin Zhou, J. Pei
  • Computer Science
  • 2008 IEEE 24th International Conference on Data Engineering
  • 2008
TLDR
The empirical study indicates that anonymized social networks generated by the method can still be used to answer aggregate network queries with high accuracy and present a practical solution to battle neighborhood attacks. Expand
Characterizing privacy in online social networks
TLDR
This study examines popular OSNs from a viewpoint of characterizing potential privacy leakage, and identifies what bits of information are currently being shared, how widely, and what users can do to prevent such sharing. Expand
Privacy Protection for Social Networking Platforms
Social networking platforms integrate third-party content into social networking sites and give third-party developers access to user data. These open interfaces enable popular site enhancements butExpand
Link Privacy in Social Networks
TLDR
Any social network that wishes to protect the link privacy of its users should take great care in choosing the lookahead of its interface, limiting it to 1 or 2, whenever possible. Expand
Measurement and analysis of online social networks
TLDR
This paper examines data gathered from four popular online social networks: Flickr, YouTube, LiveJournal, and Orkut, and reports that the indegree of user nodes tends to match the outdegree; the networks contain a densely connected core of high-degree nodes; and that this core links small groups of strongly clustered, low-degree node at the fringes of the network. Expand
Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography
TLDR
A family of attacks is described such that even from a single anonymized copy of a social network, it is possible for an adversary to learn whether edges exist or not between specific targeted pairs of nodes. Expand
Analyzing Privacy Designs of Mobile Social Networking Applications
  • G. Chen, Faruq Rahman
  • Computer Science
  • 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
  • 2008
TLDR
It is suggested that today's mobile SNAs need better privacy protection on construction and accessibility, to handle increasingly popular mash-ups between different SNA sites and to identify two unexpected privacy breaches and suggest three potential location misuse scenarios. Expand
...
1
2
3
...