Skip to main content
Erschienen in: Knowledge and Information Systems 1/2017

16.11.2016 | Regular Paper

Shall I post this now? Optimized, delay-based privacy protection in social networks

verfasst von: Javier Parra-Arnau, Félix Gómez Mármol, David Rebollo-Monedero, Jordi Forné

Erschienen in: Knowledge and Information Systems | Ausgabe 1/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Despite the several advantages commonly attributed to social networks such as easiness and immediacy to communicate with acquaintances and friends, significant privacy threats provoked by unexperienced or even irresponsible users recklessly publishing sensitive material are also noticeable. Yet, a different, but equally significant privacy risk might arise from social networks profiling the online activity of their users based on the timestamp of the interactions between the former and the latter. In order to thwart this last type of commonly neglected attacks, this paper proposes an optimized deferral mechanism for messages in online social networks. Such solution suggests intelligently delaying certain messages posted by end users in social networks in a way that the observed online activity profile generated by the attacker does not reveal any time-based sensitive information, while preserving the usability of the system. Experimental results as well as a proposed architecture implementing this approach demonstrate the suitability and feasibility of our mechanism.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Fußnoten
1
Aggregated Facebook and Twitter activity profiles are shown in [7] per country, during and before Ramadan.
 
2
SocialNumber (http://​www.​socialnumber.​com) is an example of such networks, where users must choose a unique number as identifier.
 
3
Clearly, if the attacker was the social networking platform, any information disclosed by the user would be known to the adversary.
 
4
According to [35], the data minimization principle means that a data controller, e.g., the social networking platform, should restrict the collection of personal data to what is strictly necessary to achieve its purpose. Also, it implies that the controller should store the data only for as long as is necessary to fulfill the purpose for which the information was collected.
 
5
A tweet is a message sent using Twitter.
 
6
This is in contrast to other information systems where user data (e.g., tags, queries or ratings) are simpler to process.
 
7
Messages exchanged on Twitter are publicly visible by default.
 
8
Those time instants are, in fact, time periods of 1 h each. In particular, the time index i consists in the interval \((i-1,i]\).
 
9
This would be, in fact, transparent to the user. The software installed on the user’s machine would decide whether a message is to be delayed or not.
 
10
Here users’ profiles do not capture their interests, but their online activity.
 
11
Recall from Sect. 3.5 that Shannon’s entropy is regarded here as a measure of privacy gain, whereas the KL divergence is interpreted as a measure of privacy risk.
 
13
We omit the distribution of the critical deferral rate for the uniform strategy since, as commented in Sect. 6.2, this strategy achieves critical privacy only when \(\varphi =1\). Consequently, the PMF of the critical rate is the trivial Dirac delta function centered at 1.
 
Literatur
1.
Zurück zum Zitat Rosenblum D (2007) What anyone can know: the privacy risks of social networking sites. IEEE Secur Priv 5(3):40–49CrossRef Rosenblum D (2007) What anyone can know: the privacy risks of social networking sites. IEEE Secur Priv 5(3):40–49CrossRef
2.
Zurück zum Zitat Heatherly R, Kantarcioglu M, Thuraisingham B (2013) Preventing private information inference attacks on social networks. IEEE Trans Knowl Data Eng 25(8):1849–1862CrossRef Heatherly R, Kantarcioglu M, Thuraisingham B (2013) Preventing private information inference attacks on social networks. IEEE Trans Knowl Data Eng 25(8):1849–1862CrossRef
3.
Zurück zum Zitat Lindamood J, Heatherly R, Kantarcioglu M, Thuraisingham B (2009) Inferring private information using social network data. In: Proceedings of the 18th international conference on World wide web. ACM, pp 1145–1146 Lindamood J, Heatherly R, Kantarcioglu M, Thuraisingham B (2009) Inferring private information using social network data. In: Proceedings of the 18th international conference on World wide web. ACM, pp 1145–1146
4.
Zurück zum Zitat Gómez Mármol F, Gil Pérez M, Martínez Pérez G (2014) Reporting offensive content in social networks: toward a reputation-based assessment approach. IEEE Internet Comput 18(2):32–40. doi:10.1109/MIC.2013.132 CrossRef Gómez Mármol F, Gil Pérez M, Martínez Pérez G (2014) Reporting offensive content in social networks: toward a reputation-based assessment approach. IEEE Internet Comput 18(2):32–40. doi:10.​1109/​MIC.​2013.​132 CrossRef
5.
Zurück zum Zitat Pina Ros S, Pina Canelles A, Gil Pérez M, Gómez Mármol F, Martínez Pérez G (2015) Chasing offensive conducts in social networks: a reputation-based practical approach for Frisber. ACM Trans Internet Technol 15(4):1–20. doi:10.1145/2797139 Pina Ros S, Pina Canelles A, Gil Pérez M, Gómez Mármol F, Martínez Pérez G (2015) Chasing offensive conducts in social networks: a reputation-based practical approach for Frisber. ACM Trans Internet Technol 15(4):1–20. doi:10.​1145/​2797139
8.
Zurück zum Zitat Bilge L, Strufe T, Balzarotti D, Kirda E (2009) All your contacts belong to us: automated identity theft attacks on social networks. In: Proceedings of ACM international WWW conference, Sanibel Island, FL, pp 551–560 Bilge L, Strufe T, Balzarotti D, Kirda E (2009) All your contacts belong to us: automated identity theft attacks on social networks. In: Proceedings of ACM international WWW conference, Sanibel Island, FL, pp 551–560
9.
Zurück zum Zitat Douceur JR (2002) The sybil attack. In: Proceedings of international workshop peer-to-peer syst. (IPTPS). Springer, London, UK, pp 251–260 Douceur JR (2002) The sybil attack. In: Proceedings of international workshop peer-to-peer syst. (IPTPS). Springer, London, UK, pp 251–260
10.
Zurück zum Zitat Yu H, Kaminsky M, Gibbons PB, Flaxman A (2006) SybilGuard: defending against Sybil attacks via social networks. In: Proceedings of ACM conference special interest group data Communications (SIGCOMM), Pisa, Italy, pp 267–278 Yu H, Kaminsky M, Gibbons PB, Flaxman A (2006) SybilGuard: defending against Sybil attacks via social networks. In: Proceedings of ACM conference special interest group data Communications (SIGCOMM), Pisa, Italy, pp 267–278
11.
Zurück zum Zitat Yu H, Gibbons PB, Kaminsky M, Xiao F (2010) Sybillimit: a near-optimal social network defense against sybil attacks. IEEE/ACM Trans Netw 18(3):885–898CrossRef Yu H, Gibbons PB, Kaminsky M, Xiao F (2010) Sybillimit: a near-optimal social network defense against sybil attacks. IEEE/ACM Trans Netw 18(3):885–898CrossRef
12.
Zurück zum Zitat Zhou B, Pei J (2008) Preserving privacy in social networks against neighborhood attacks. In: Proceedings of IEEE interantoinal conference on data engineering (ICDE), Cancún, Mexico, pp 506–515 Zhou B, Pei J (2008) Preserving privacy in social networks against neighborhood attacks. In: Proceedings of IEEE interantoinal conference on data engineering (ICDE), Cancún, Mexico, pp 506–515
13.
Zurück zum Zitat Zhou B, Pei J (2011) The \(k\)-anonymity and \(l\)-diversity approaches for privacy preservation in social networks against neighborhood attacks. Knowl Inform Syst 28(1):47–77CrossRef Zhou B, Pei J (2011) The \(k\)-anonymity and \(l\)-diversity approaches for privacy preservation in social networks against neighborhood attacks. Knowl Inform Syst 28(1):47–77CrossRef
14.
Zurück zum Zitat Shen X, Tan B, Zhai C (2007) Privacy protection in personalized search. ACM Spec. Interest Group Inform. Retrieval (SIGIR) Forum 41(1):4–17. [Online] doi:10.1145/1273221.1273222 Shen X, Tan B, Zhai C (2007) Privacy protection in personalized search. ACM Spec. Interest Group Inform. Retrieval (SIGIR) Forum 41(1):4–17. [Online] doi:10.​1145/​1273221.​1273222
15.
Zurück zum Zitat Chaum D (1981) Untraceable electronic mail, return addresses, and digital pseudonyms. Commun ACM 24(2):84–88CrossRef Chaum D (1981) Untraceable electronic mail, return addresses, and digital pseudonyms. Commun ACM 24(2):84–88CrossRef
17.
Zurück zum Zitat Danezis G (2003) Mix-networks with restricted routes. In: Proceedings of international symposium on privacy enhancing technologies (PETS). Lecture notes computer science (LNCS), pp 1–17 Danezis G (2003) Mix-networks with restricted routes. In: Proceedings of international symposium on privacy enhancing technologies (PETS). Lecture notes computer science (LNCS), pp 1–17
18.
Zurück zum Zitat Kesdogan D, Egner J, Büschkes R (1998) Stop-and-go mixes: providing probabilistic anonymity in an open system. In: Proceedings of information hiding workshop (IH). Springer, pp 83–98 Kesdogan D, Egner J, Büschkes R (1998) Stop-and-go mixes: providing probabilistic anonymity in an open system. In: Proceedings of information hiding workshop (IH). Springer, pp 83–98
19.
Zurück zum Zitat Berthold O, Pfitzmann A, Standtke R (2000) The disadvantages of free MIX routes and how to overcome them. In: Proceedings of designing privacy enhancing technologies: workshop on design issues in anonymity and unobservability. Series Lecture notes computer science (LNCS). Springer, Berkeley, CA, pp 30–45 Berthold O, Pfitzmann A, Standtke R (2000) The disadvantages of free MIX routes and how to overcome them. In: Proceedings of designing privacy enhancing technologies: workshop on design issues in anonymity and unobservability. Series Lecture notes computer science (LNCS). Springer, Berkeley, CA, pp 30–45
20.
Zurück zum Zitat Díaz C, Seys S, Claessens J, Preneel B (2002) Towards measuring anonymity. In: Proceedings of international symposium on privacy enhancing technologies (PETS), Series Lecture notes on computer science (LNCS), vol 2482. Springer, pp 54–68 Díaz C, Seys S, Claessens J, Preneel B (2002) Towards measuring anonymity. In: Proceedings of international symposium on privacy enhancing technologies (PETS), Series Lecture notes on computer science (LNCS), vol 2482. Springer, pp 54–68
21.
Zurück zum Zitat Serjantov A, Danezis G (2002) Towards an information theoretic metric for anonymity. In: Proceedings of international symposium on privacy enhancing technologies (PETS), vol 2482. Springer, pp 41–53 Serjantov A, Danezis G (2002) Towards an information theoretic metric for anonymity. In: Proceedings of international symposium on privacy enhancing technologies (PETS), vol 2482. Springer, pp 41–53
22.
Zurück zum Zitat Steinbrecher S, Kopsell S (2003) Modelling unlinkability. In: Proceedings of internaional symposium on privacy enhancing technologies (PETS). Springer, pp 32–47 Steinbrecher S, Kopsell S (2003) Modelling unlinkability. In: Proceedings of internaional symposium on privacy enhancing technologies (PETS). Springer, pp 32–47
23.
Zurück zum Zitat Díaz C (2005) Anonymity and privacy in electronic services. Ph.D. dissertation, Katholieke University, Leuven Díaz C (2005) Anonymity and privacy in electronic services. Ph.D. dissertation, Katholieke University, Leuven
24.
Zurück zum Zitat Rebollo-Monedero D, Forné J (2010) Optimal query forgery for private information retrieval. IEEE Trans Inform Theory 56(9):4631–4642MathSciNetCrossRef Rebollo-Monedero D, Forné J (2010) Optimal query forgery for private information retrieval. IEEE Trans Inform Theory 56(9):4631–4642MathSciNetCrossRef
25.
Zurück zum Zitat Howe DC, Nissenbaum H (2009) Lessons from the identity trail: privacy, anonymity and identity in a networked society. NY: Oxford Univ. Press, ch. TrackMeNot: Resisting surveillance in Web search, pp 417–436. [Online]. http://mrl.nyu.edu/~dhowe/trackmenot Howe DC, Nissenbaum H (2009) Lessons from the identity trail: privacy, anonymity and identity in a networked society. NY: Oxford Univ. Press, ch. TrackMeNot: Resisting surveillance in Web search, pp 417–436. [Online]. http://​mrl.​nyu.​edu/​~dhowe/​trackmenot
26.
Zurück zum Zitat Parra-Arnau J, Perego A, Ferrari E, Forné J, Rebollo-Monedero D (Jan. 2014) Privacy-preserving enhanced collaborative tagging. IEEE Trans. Knowl. Data Eng., 26(1):180–193, [Online]. Available: doi:10.1109/TKDE.2012.248 Parra-Arnau J, Perego A, Ferrari E, Forné J, Rebollo-Monedero D (Jan. 2014) Privacy-preserving enhanced collaborative tagging. IEEE Trans. Knowl. Data Eng., 26(1):180–193, [Online]. Available: doi:10.​1109/​TKDE.​2012.​248
27.
Zurück zum Zitat Parra-Arnau J, Rebollo-Monedero D, Forné J, Muñoz JL, Esparza O (2012) Optimal tag suppression for privacy protection in the semantic Web. Data Knowl Eng 81–82:46–66 [Online]. doi:10.1016/j.datak.2012.07.004 Parra-Arnau J, Rebollo-Monedero D, Forné J, Muñoz JL, Esparza O (2012) Optimal tag suppression for privacy protection in the semantic Web. Data Knowl Eng 81–82:46–66 [Online]. doi:10.​1016/​j.​datak.​2012.​07.​004
28.
Zurück zum Zitat Deng M (2010) Privacy preserving content protection. Ph.D. dissertation, Katholieke University, Leuven Deng M (2010) Privacy preserving content protection. Ph.D. dissertation, Katholieke University, Leuven
29.
Zurück zum Zitat Levine BN, Reiter MK, Wang C, Wright M (2004) Timing attacks in low-latency mix systems. In: Proceedings of international financial cryptography conference. Springer, pp 251–265 Levine BN, Reiter MK, Wang C, Wright M (2004) Timing attacks in low-latency mix systems. In: Proceedings of international financial cryptography conference. Springer, pp 251–265
30.
Zurück zum Zitat Bauer K, McCoy D, Grunwald D, Kohno T, Sicker D (2007) Low-resource routing attacks against anonymous systems. University of Colorado, Technical report Bauer K, McCoy D, Grunwald D, Kohno T, Sicker D (2007) Low-resource routing attacks against anonymous systems. University of Colorado, Technical report
31.
Zurück zum Zitat Murdoch SJ, Danezis G (2005) Low-cost traffic analysis of tor. In: Proceedings of IEEE symposium security and privacy (SP), pp 183–195 Murdoch SJ, Danezis G (2005) Low-cost traffic analysis of tor. In: Proceedings of IEEE symposium security and privacy (SP), pp 183–195
32.
Zurück zum Zitat Pfitzmann B, Pfitzmann A (1990) How to break the direct RSA implementation of mixes. In: Proceedings of annual international conference on the theory and applications of cryptographic techniques (EUROCRYPT). Springer, pp 373–381 Pfitzmann B, Pfitzmann A (1990) How to break the direct RSA implementation of mixes. In: Proceedings of annual international conference on the theory and applications of cryptographic techniques (EUROCRYPT). Springer, pp 373–381
37.
Zurück zum Zitat Xu Y, Wang K, Zhang B, Chen Z (2007) Privacy-enhancing personalized Web search. In: Proceedings of the international WWW conference. ACM, pp 591–600 Xu Y, Wang K, Zhang B, Chen Z (2007) Privacy-enhancing personalized Web search. In: Proceedings of the international WWW conference. ACM, pp 591–600
38.
Zurück zum Zitat Ye S, Wu F, Pandey R, Chen H (2009) Noise injection for search privacy protection. In: Proceedings of international conference on computer science engineering. IEEE Computer Society, pp 1–8 Ye S, Wu F, Pandey R, Chen H (2009) Noise injection for search privacy protection. In: Proceedings of international conference on computer science engineering. IEEE Computer Society, pp 1–8
40.
Zurück zum Zitat Parra-Arnau J, Rebollo-Monedero D, Forné J (2014) Measuring the privacy of user profiles in personalized information systems. Future Gen Comput Syst (FGCS), Special Issue Data, Knowl Eng 33:53–63 [Online]. doi:10.1016/j.future.2013.01.001 Parra-Arnau J, Rebollo-Monedero D, Forné J (2014) Measuring the privacy of user profiles in personalized information systems. Future Gen Comput Syst (FGCS), Special Issue Data, Knowl Eng 33:53–63 [Online]. doi:10.​1016/​j.​future.​2013.​01.​001
41.
Zurück zum Zitat Hildebrandt M, Backhouse J, Andronikou V, Benoist E, Canhoto A, Diaz C, Gasson M, Geradts Z, Meints M, Nabeth T, Bendegem JPV, der Hof SV, Vedder A, Yannopoulos A (2005) Descriptive analysis and inventory of profiling practices—deliverable 7.2. Future Identity Information Society (FIDIS), Technical report Hildebrandt M, Backhouse J, Andronikou V, Benoist E, Canhoto A, Diaz C, Gasson M, Geradts Z, Meints M, Nabeth T, Bendegem JPV, der Hof SV, Vedder A, Yannopoulos A (2005) Descriptive analysis and inventory of profiling practices—deliverable 7.2. Future Identity Information Society (FIDIS), Technical report
42.
Zurück zum Zitat Hildebrandt M, Gutwirth S (eds) (2008) Profiling the European citizen: cross-disciplinary perspectives. Springer, Berlin Hildebrandt M, Gutwirth S (eds) (2008) Profiling the European citizen: cross-disciplinary perspectives. Springer, Berlin
43.
Zurück zum Zitat Jaynes ET (1982) On the rationale of maximum-entropy methods. Proc IEEE 70(9):939–952CrossRef Jaynes ET (1982) On the rationale of maximum-entropy methods. Proc IEEE 70(9):939–952CrossRef
44.
Zurück zum Zitat Cover TM, Thomas JA (2006) Elements of information theory, 2nd edn. Wiley, New YorkMATH Cover TM, Thomas JA (2006) Elements of information theory, 2nd edn. Wiley, New YorkMATH
45.
Zurück zum Zitat Boyd S, Vandenberghe L (2004) Convex optimization. Cambridge University Press, CambridgeCrossRefMATH Boyd S, Vandenberghe L (2004) Convex optimization. Cambridge University Press, CambridgeCrossRefMATH
47.
Zurück zum Zitat Apostol TM (1974) Mathematical analysis. A modern approach to advanced calculus, 2nd edn. Addison Wesley, Boston Apostol TM (1974) Mathematical analysis. A modern approach to advanced calculus, 2nd edn. Addison Wesley, Boston
48.
Zurück zum Zitat Viswanath B, Mislove A, Cha M, Gummadi KP (2009) On the evolution of user interaction in facebook. In: Proceedings of the 2nd ACM SIGCOMM workshop on social networks (WOSN’09), Viswanath B, Mislove A, Cha M, Gummadi KP (2009) On the evolution of user interaction in facebook. In: Proceedings of the 2nd ACM SIGCOMM workshop on social networks (WOSN’09),
49.
Zurück zum Zitat Ferrara E, Interdonato R, Tagarelli A (2014) Online popularity and topical interests through the lens of instagram. In: Proceedings of ACM conference on hypertext and social media (HT), pp 24–34 Ferrara E, Interdonato R, Tagarelli A (2014) Online popularity and topical interests through the lens of instagram. In: Proceedings of ACM conference on hypertext and social media (HT), pp 24–34
Metadaten
Titel
Shall I post this now? Optimized, delay-based privacy protection in social networks
verfasst von
Javier Parra-Arnau
Félix Gómez Mármol
David Rebollo-Monedero
Jordi Forné
Publikationsdatum
16.11.2016
Verlag
Springer London
Erschienen in
Knowledge and Information Systems / Ausgabe 1/2017
Print ISSN: 0219-1377
Elektronische ISSN: 0219-3116
DOI
https://doi.org/10.1007/s10115-016-1010-4

Weitere Artikel der Ausgabe 1/2017

Knowledge and Information Systems 1/2017 Zur Ausgabe