Skip to main content
Erschienen in: International Journal of Information Security 2/2016

01.04.2016 | Regular Contribution

Preventing sensitive relationships disclosure for better social media preservation

verfasst von: Elie Raad, Bechara Al Bouna, Richard Chbeir

Erschienen in: International Journal of Information Security | Ausgabe 2/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A fundamental aspect of all social networks is information sharing. It is one of the most common forms of online interaction that is tightly associated with social media preservation and information disclosure. As such, information sharing is commonly viewed as a key enabler for social media preservation tasks. In the current situation, where information sharing and inter-user communications are made instantly possible via the widespread use of ubiquitous technologies, privacy related, and particularly information disclosure issues, are the obvious, much discussed, immediate consequences of information sharing. As a result, information disclosure, especially when multimedia data come to play, is critical for appropriate social media preservation strategies that consider and respect the privacy of social network users. Social media preservation must align with privacy protection solutions and consequently must protect sensitive information that social network users would like to keep private. In this paper, we propose a new approach to implement a privacy-oriented social media preservation strategy that prevents the disclosure of sensitive information. Instead of using a preserve-all strategy, we present a framework to personalize social media preservation tasks. We then describe our proposed rule-based algorithm to evaluate information disclosure addressing mainly relationship type disclosure and using shared photos. We also provide an experimental study to investigate the efficiency and the relevance of our approach.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
6
It represents any person that will, willingly or unwillingly, breach the user’s privacy and uncover sensitive information.
 
7
Friend of a Friend (FOAF), http://​xmlns.​com/​foaf/​spec/​.
 
8
The exchangeable image file format (EXIF), http://​www.​exif.​org.
 
9
SIOC Core Ontology Specification, (SIOC), http://​sioc-project.​org/​ontology.
 
10
The Dublin Core Metadata Initiative (DCMI), http://​dublincore.​org.
 
11
This type of replication allows to replicate the part of data that was modified without having to copy the entire content of the master database (“Public SN”) at each stimulating event.
 
13
By default, we consider the following categories: child (age \(\le \) 13), teenager ( 14 \(\le \) age \(\le \) 18), adult (19 \(\le \) age \(\le \) 60), and senior (age \(\ge \) 61).
 
Literatur
1.
Zurück zum Zitat Aimeur, E., Gambs, S., Ho, A.: Towards a privacy-enhanced social networking site. In: Availability, Reliability, and Security, 2010. ARES ’10 International Conference on, pp. 172–179 (2010). doi:10.1109/ARES.2010.97 Aimeur, E., Gambs, S., Ho, A.: Towards a privacy-enhanced social networking site. In: Availability, Reliability, and Security, 2010. ARES ’10 International Conference on, pp. 172–179 (2010). doi:10.​1109/​ARES.​2010.​97
2.
Zurück zum Zitat Banos, V., Baltas, N., Manolopoulos, Y.: Trends in blog preservation (2012) Banos, V., Baltas, N., Manolopoulos, Y.: Trends in blog preservation (2012)
3.
Zurück zum Zitat Besmer, A., Richter Lipford, H.: Moving beyond untagging: photo privacy in a tagged world. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’10, pp. 1563–1572. ACM (2010) Besmer, A., Richter Lipford, H.: Moving beyond untagging: photo privacy in a tagged world. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’10, pp. 1563–1572. ACM (2010)
4.
Zurück zum Zitat Bodriagov, O., Buchegger, S.: P2p social networks with broadcast encryption protected privacy. In: Camenisch, J., Crispo, B., Fischer-Hübner, S., Leenes, R., Russello, G. (eds.) Privacy and Identity Management for Life, IFIP Advances in Information and Communication Technology, vol. 375, pp. 197–206. Springer, Boston (2012) Bodriagov, O., Buchegger, S.: P2p social networks with broadcast encryption protected privacy. In: Camenisch, J., Crispo, B., Fischer-Hübner, S., Leenes, R., Russello, G. (eds.) Privacy and Identity Management for Life, IFIP Advances in Information and Communication Technology, vol. 375, pp. 197–206. Springer, Boston (2012)
5.
Zurück zum Zitat Boongoen, T., Shen, Q., Price, C.: Disclosing false identity through hybrid link analysis. Artif. Intell. Law 18(1), 77–102 (2010)CrossRef Boongoen, T., Shen, Q., Price, C.: Disclosing false identity through hybrid link analysis. Artif. Intell. Law 18(1), 77–102 (2010)CrossRef
6.
Zurück zum Zitat Campbell, L.E., Dulabahn, B.: Digital preservation: the twitter archives and NDIIPP. In: iPRES 2010: Proceedings of the International Conference on Preservation of Digital Objects (2010) Campbell, L.E., Dulabahn, B.: Digital preservation: the twitter archives and NDIIPP. In: iPRES 2010: Proceedings of the International Conference on Preservation of Digital Objects (2010)
7.
Zurück zum Zitat Chakaravarthy, V.T., Gupta, H., Roy, P., Mohania, M.K.: Efficient techniques for document sanitization. In: Proceedings of the 17th ACM conference on Information and knowledge management, CIKM ’08, pp. 843–852. ACM, New York, USA (2008). doi:10.1145/1458082.1458194 Chakaravarthy, V.T., Gupta, H., Roy, P., Mohania, M.K.: Efficient techniques for document sanitization. In: Proceedings of the 17th ACM conference on Information and knowledge management, CIKM ’08, pp. 843–852. ACM, New York, USA (2008). doi:10.​1145/​1458082.​1458194
8.
Zurück zum Zitat Clemons, E.: Monetizing the internet: surely there must be something other than advertising. In: System Sciences, 2009. HICSS ’09. 42nd Hawaii International Conference on, pp. 1–10 (2009). doi:10.1109/HICSS.2009.312 Clemons, E.: Monetizing the internet: surely there must be something other than advertising. In: System Sciences, 2009. HICSS ’09. 42nd Hawaii International Conference on, pp. 1–10 (2009). doi:10.​1109/​HICSS.​2009.​312
9.
Zurück zum Zitat Damiani, E., Pagano, F., Pagano, D.: iprivacy: a distributed approach to privacy on the cloud. Int. J. Adv. Secur. 4(3 and 4), 185–197 (2012) Damiani, E., Pagano, F., Pagano, D.: iprivacy: a distributed approach to privacy on the cloud. Int. J. Adv. Secur. 4(3 and 4), 185–197 (2012)
11.
Zurück zum Zitat Esslimani, I., Brun, A., Boyer, A.: From social networks to behavioral networks in recommender systems. In: Social Network Analysis and Mining, 2009. ASONAM’09. International Conference on Advances in, pp. 143–148. IEEE (2009) Esslimani, I., Brun, A., Boyer, A.: From social networks to behavioral networks in recommender systems. In: Social Network Analysis and Mining, 2009. ASONAM’09. International Conference on Advances in, pp. 143–148. IEEE (2009)
12.
Zurück zum Zitat Fong, P.W.: Relationship-based access control: protection model and policy language. In: Proceedings of the first ACM conference on Data and application security and privacy, CODASPY ’11, pp. 191–202. ACM (2011) Fong, P.W.: Relationship-based access control: protection model and policy language. In: Proceedings of the first ACM conference on Data and application security and privacy, CODASPY ’11, pp. 191–202. ACM (2011)
13.
Zurück zum Zitat Freni, D.: Ruiz Vicente, C., Mascetti, S., Bettini, C., Jensen, C.S.: Preserving location and absence privacy in geo-social networks. In: Proceedings of the 19th ACM International Conference on Information and Knowledge Management, CIKM ’10, pp. 309–318. ACM, New York, USA (2010) Freni, D.: Ruiz Vicente, C., Mascetti, S., Bettini, C., Jensen, C.S.: Preserving location and absence privacy in geo-social networks. In: Proceedings of the 19th ACM International Conference on Information and Knowledge Management, CIKM ’10, pp. 309–318. ACM, New York, USA (2010)
15.
Zurück zum Zitat Gessiou, E., Vu, Q.H., Ioannidis, S.: Irild: An information retrieval based method for information leak detection. In: Computer Network Defense (EC2ND), 2011 Seventh European Conference on, pp. 33–40 (2011). doi:10.1109/EC2ND.2011.21 Gessiou, E., Vu, Q.H., Ioannidis, S.: Irild: An information retrieval based method for information leak detection. In: Computer Network Defense (EC2ND), 2011 Seventh European Conference on, pp. 33–40 (2011). doi:10.​1109/​EC2ND.​2011.​21
16.
Zurück zum Zitat Hart, J., Ridley, C., Taher, F., Sas, C., Dix, A.: Exploring the facebook experience: a new approach to usability. In: Proceedings of the 5th Nordic Conference on Human-Computer Interaction: Building Bridges. NordiCHI ’08, pp. 471–474. ACM, New York, USA (2008) Hart, J., Ridley, C., Taher, F., Sas, C., Dix, A.: Exploring the facebook experience: a new approach to usability. In: Proceedings of the 5th Nordic Conference on Human-Computer Interaction: Building Bridges. NordiCHI ’08, pp. 471–474. ACM, New York, USA (2008)
19.
Zurück zum Zitat Hunter, J., Choudhury, S.: Panic: an integrated approach to the preservation of composite digital objects using semantic web services. Int. J. Digit. Libr. 6, 174–183 (2006). doi:10.1007/s00799-005-0134-z CrossRef Hunter, J., Choudhury, S.: Panic: an integrated approach to the preservation of composite digital objects using semantic web services. Int. J. Digit. Libr. 6, 174–183 (2006). doi:10.​1007/​s00799-005-0134-z CrossRef
20.
Zurück zum Zitat Johnson, M., Egelman, S., Bellovin, S.M.: Facebook and privacy: it’s complicated. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS ’12, pp. 1–15. ACM (2012) Johnson, M., Egelman, S., Bellovin, S.M.: Facebook and privacy: it’s complicated. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS ’12, pp. 1–15. ACM (2012)
21.
Zurück zum Zitat Kifer, D.: Attacks on privacy and definetti’s theorem. In: SIGMOD Conference, pp. 127–138 (2009) Kifer, D.: Attacks on privacy and definetti’s theorem. In: SIGMOD Conference, pp. 127–138 (2009)
22.
Zurück zum Zitat Li, N., Zhang, N., Das, S.: Relationship privacy preservation in publishing online social networks. In: Privacy, Security, Risk and Trust (passat), 2011 IEEE Third International Conference on Social Computing (socialcom), pp. 443–450 (2011). doi:10.1109/PASSAT/SocialCom.191 Li, N., Zhang, N., Das, S.: Relationship privacy preservation in publishing online social networks. In: Privacy, Security, Risk and Trust (passat), 2011 IEEE Third International Conference on Social Computing (socialcom), pp. 443–450 (2011). doi:10.​1109/​PASSAT/​SocialCom.​191
23.
Zurück zum Zitat Liu, Y., Gummadi, K.P., Krishnamurthy, B., Mislove, A.: Analyzing facebook privacy settings: user expectations vs. reality. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, IMC ’11, pp. 61–70. ACM (2011) Liu, Y., Gummadi, K.P., Krishnamurthy, B., Mislove, A.: Analyzing facebook privacy settings: user expectations vs. reality. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, IMC ’11, pp. 61–70. ACM (2011)
24.
Zurück zum Zitat Lu, X., Wang, C., Yang, J.M., Pang, Y., Zhang, L.: Photo2trip: generating travel routes from geo-tagged photos for trip planning. In: Proceedings of the International Conference on Multimedia. MM ’10, pp. 143–152. ACM, New York, USA (2010) Lu, X., Wang, C., Yang, J.M., Pang, Y., Zhang, L.: Photo2trip: generating travel routes from geo-tagged photos for trip planning. In: Proceedings of the International Conference on Multimedia. MM ’10, pp. 143–152. ACM, New York, USA (2010)
25.
Zurück zum Zitat Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: L-diversity: privacy beyond k-anonymity. In: Data Engineering, 2006. ICDE ’06. Proceedings of the 22nd International Conference on, pp. 24–24 (2006). doi:10.1109/ICDE.2006.1 Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: L-diversity: privacy beyond k-anonymity. In: Data Engineering, 2006. ICDE ’06. Proceedings of the 22nd International Conference on, pp. 24–24 (2006). doi:10.​1109/​ICDE.​2006.​1
26.
Zurück zum Zitat Marketakis, Y., Tzanakis, M., Tzitzikas, Y.: Prescan: towards automating the preservation of digital objects. In: Proceedings of the International Conference on Management of Emergent Digital EcoSystems, MEDES ’09, pp. 60:404–60:411. ACM, New York, USA (2009) Marketakis, Y., Tzanakis, M., Tzitzikas, Y.: Prescan: towards automating the preservation of digital objects. In: Proceedings of the International Conference on Management of Emergent Digital EcoSystems, MEDES ’09, pp. 60:404–60:411. ACM, New York, USA (2009)
27.
Zurück zum Zitat McCown, F., Nelson, M.: What happens when facebook is gone. In: Proceedings of the 9th ACM/IEEE-CS Joint Conference on Digital Libraries, pp. 251–254. ACM (2009) McCown, F., Nelson, M.: What happens when facebook is gone. In: Proceedings of the 9th ACM/IEEE-CS Joint Conference on Digital Libraries, pp. 251–254. ACM (2009)
28.
Zurück zum Zitat McNealy, J.: Privacy implications of digital preservation: social media archives and the social networks theory of privacy. Elon L. Rev. 3, 133 (2011) McNealy, J.: Privacy implications of digital preservation: social media archives and the social networks theory of privacy. Elon L. Rev. 3, 133 (2011)
30.
Zurück zum Zitat Nettleton, D.F., Abril, D.: Document sanitization: measuring search engine information loss and risk of disclosure for the wikileaks cables. In: Domingo-Ferrer, J., Tinnirello, I. (eds.) Privacy in Statistical Databases, Lecture Notes in Computer Science, vol. 7556, pp. 308–321. Springer, Berlin Heidelberg (2012). doi:10.1007/978-3-642-33627-0_24 CrossRef Nettleton, D.F., Abril, D.: Document sanitization: measuring search engine information loss and risk of disclosure for the wikileaks cables. In: Domingo-Ferrer, J., Tinnirello, I. (eds.) Privacy in Statistical Databases, Lecture Notes in Computer Science, vol. 7556, pp. 308–321. Springer, Berlin Heidelberg (2012). doi:10.​1007/​978-3-642-33627-0_​24 CrossRef
31.
Zurück zum Zitat Nourian, A., Maheswaran, M.: Measuring the availability of images posted on social media sites. In: Computer Communications and Networks (ICCCN), 2012 21st International Conference on, pp. 1–5 (2012). doi:10.1109/ICCCN.2012.6289206 Nourian, A., Maheswaran, M.: Measuring the availability of images posted on social media sites. In: Computer Communications and Networks (ICCCN), 2012 21st International Conference on, pp. 1–5 (2012). doi:10.​1109/​ICCCN.​2012.​6289206
32.
Zurück zum Zitat Onnela, J.P., Saramki, J., Hyvnen, J., Szab, G., Lazer, D., Kaski, K., Kertsz, J., Barabsi, A.L.: Structure and tie strengths in mobile communication networks. Proc. Natl. Acad. Sci. 104(18), 7332–7336 (2007). doi:10.1073/pnas.0610245104 CrossRef Onnela, J.P., Saramki, J., Hyvnen, J., Szab, G., Lazer, D., Kaski, K., Kertsz, J., Barabsi, A.L.: Structure and tie strengths in mobile communication networks. Proc. Natl. Acad. Sci. 104(18), 7332–7336 (2007). doi:10.​1073/​pnas.​0610245104 CrossRef
33.
Zurück zum Zitat Raad, E., Chbeir, R., Dipanda, A.: Discovering relationship types between users using profiles and shared photos in a social network. Multimed. Tools Appl. 64(1), 141–170 (2013). doi:10.1007/s11042-011-0853-7 CrossRef Raad, E., Chbeir, R., Dipanda, A.: Discovering relationship types between users using profiles and shared photos in a social network. Multimed. Tools Appl. 64(1), 141–170 (2013). doi:10.​1007/​s11042-011-0853-7 CrossRef
34.
Zurück zum Zitat Ranjbar, A., Maheswaran, M.: Community-centric approaches for confidentiality management in online systems. In: Computer Communications and Networks (ICCCN), 2011 Proceedings of 20th International Conference on, pp. 1–6. IEEE (2011) Ranjbar, A., Maheswaran, M.: Community-centric approaches for confidentiality management in online systems. In: Computer Communications and Networks (ICCCN), 2011 Proceedings of 20th International Conference on, pp. 1–6. IEEE (2011)
35.
Zurück zum Zitat Ren, F., Wu, Y.: Predicting user-topic opinions in twitter with social and topical context. Affect. Comput. IEEE Trans. 4(4), 412–424 (2013)CrossRef Ren, F., Wu, Y.: Predicting user-topic opinions in twitter with social and topical context. Affect. Comput. IEEE Trans. 4(4), 412–424 (2013)CrossRef
38.
Zurück zum Zitat Scheffer, T.: Finding association rules that trade support optimally against confidence. In: De Raedt, L., Siebes, A. (eds.) Principles of Data Mining and Knowledge Discovery, Lecture Notes in Computer Science, vol. 2168, pp. 424–435. Springer, Berlin / Heidelberg (2001) Scheffer, T.: Finding association rules that trade support optimally against confidence. In: De Raedt, L., Siebes, A. (eds.) Principles of Data Mining and Knowledge Discovery, Lecture Notes in Computer Science, vol. 2168, pp. 424–435. Springer, Berlin / Heidelberg (2001)
39.
Zurück zum Zitat Singla, P., Kautz, H., Luo, J., Gallagher, A.: Discovery of social relationships in consumer photo collections using markov logic. In: Computer Vision and Pattern Recognition Workshops, 2008. CVPRW ’08. IEEE Computer Society Conference on, pp. 1–7 (2008) Singla, P., Kautz, H., Luo, J., Gallagher, A.: Discovery of social relationships in consumer photo collections using markov logic. In: Computer Vision and Pattern Recognition Workshops, 2008. CVPRW ’08. IEEE Computer Society Conference on, pp. 1–7 (2008)
40.
Zurück zum Zitat Staddon, J., Golle, P., Zimny, B.: Web-based inference detection. In: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, SS’07, pp. 6:1–6:16. USENIX Association, Berkeley, USA (2007) Staddon, J., Golle, P., Zimny, B.: Web-based inference detection. In: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, SS’07, pp. 6:1–6:16. USENIX Association, Berkeley, USA (2007)
41.
Zurück zum Zitat Surowiecki, J.: The wisdom of crowds: Why the Many are smarter than the few. Doubleday Books, New York (2004) Surowiecki, J.: The wisdom of crowds: Why the Many are smarter than the few. Doubleday Books, New York (2004)
42.
Zurück zum Zitat Watry, P.: Digital preservation theory and application: transcontinental persistent archives testbed activity. Int. J. Digit. Curation 2(2), 41–68 (2008)CrossRef Watry, P.: Digital preservation theory and application: transcontinental persistent archives testbed activity. Int. J. Digit. Curation 2(2), 41–68 (2008)CrossRef
Metadaten
Titel
Preventing sensitive relationships disclosure for better social media preservation
verfasst von
Elie Raad
Bechara Al Bouna
Richard Chbeir
Publikationsdatum
01.04.2016
Verlag
Springer Berlin Heidelberg
Erschienen in
International Journal of Information Security / Ausgabe 2/2016
Print ISSN: 1615-5262
Elektronische ISSN: 1615-5270
DOI
https://doi.org/10.1007/s10207-015-0278-9

Weitere Artikel der Ausgabe 2/2016

International Journal of Information Security 2/2016 Zur Ausgabe

Premium Partner