Skip to main content

2015 | OriginalPaper | Buchkapitel

SocialSpy: Browsing (Supposedly) Hidden Information in Online Social Networks

verfasst von : Andrea Burattin, Giuseppe Cascavilla, Mauro Conti

Erschienen in: Risks and Security of Internet and Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Online Social Networks are becoming the most important “places” where people share information about their lives. With the increasing concern that users have about privacy, most social networks offer ways to control the privacy of the user. Unfortunately, we believe that current privacy settings are not as effective as users might think.
In this paper, we highlight this problem focusing on one of the most popular social networks, Facebook. In particular, we show how easy it is to retrieve information that a user might have set as (and hence thought as) “private”. As a case study, we focus on retrieving the list of friends for users that did set this information as “hidden” (to non-friends). We propose four different strategies to achieve this goal, and we evaluate them. The results of our thorough experiments show the feasibility of our strategies as well as their effectiveness: our approach is able to retrieve a significant percentage of the names of the “hidden” friends: i.e., some 25 % on average, and more than 70 % for some users.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
9.
Zurück zum Zitat Ratan, D., Cong, T., Keith, R., Nitesh, S.: Estimating age privacy leakage in online social networks. In: IEEE INFOCOM, pp. 2836–2840 (2012) Ratan, D., Cong, T., Keith, R., Nitesh, S.: Estimating age privacy leakage in online social networks. In: IEEE INFOCOM, pp. 2836–2840 (2012)
10.
Zurück zum Zitat Luo, W., Liu, J., Liu, J., Fan, C.: An analysis of security in social networks. In: IEEE DASC, pp. 648–651 (2009) Luo, W., Liu, J., Liu, J., Fan, C.: An analysis of security in social networks. In: IEEE DASC, pp. 648–651 (2009)
13.
Zurück zum Zitat Madejski, M., Johnson, M., Bellovin, S.M.: A study of privacy settings errors in an online social network. In: IEEE PERCOM Workshops, pp. 340–345 (2012) Madejski, M., Johnson, M., Bellovin, S.M.: A study of privacy settings errors in an online social network. In: IEEE PERCOM Workshops, pp. 340–345 (2012)
15.
Zurück zum Zitat Steele, R.D.: Open source intelligence. In: Johnson, L. (ed.) Handbook of Intelligence Studies. Routledge, New York (2007) Steele, R.D.: Open source intelligence. In: Johnson, L. (ed.) Handbook of Intelligence Studies. Routledge, New York (2007)
19.
Zurück zum Zitat Kandias, M., Mitrou, L., Stavrou, V., Gritzalis, D.: Which side are you on? - a new panopticon vs. privacy. In: SECRYPT, pp. 98–110 (2013) Kandias, M., Mitrou, L., Stavrou, V., Gritzalis, D.: Which side are you on? - a new panopticon vs. privacy. In: SECRYPT, pp. 98–110 (2013)
20.
Zurück zum Zitat Kosinski, M., Stillwell, D., Graepel, T.: Private traits and attributes are predictable from digital records of human behavior. Proc. Natl. Acad. Sci. 110, 5802–5805 (2013) Kosinski, M., Stillwell, D., Graepel, T.: Private traits and attributes are predictable from digital records of human behavior. Proc. Natl. Acad. Sci. 110, 5802–5805 (2013)
22.
Zurück zum Zitat Tang, C., Ross, K., Saxena, N., Chen, R.: What’s in a name: a study of names, gender inference, and gender behavior in facebook. In: Xu, J., Yu, G., Zhou, S., Unland, R. (eds.) DASFAA Workshops 2011. LNCS, vol. 6637, pp. 344–356. Springer, Heidelberg (2011) CrossRef Tang, C., Ross, K., Saxena, N., Chen, R.: What’s in a name: a study of names, gender inference, and gender behavior in facebook. In: Xu, J., Yu, G., Zhou, S., Unland, R. (eds.) DASFAA Workshops 2011. LNCS, vol. 6637, pp. 344–356. Springer, Heidelberg (2011) CrossRef
23.
Zurück zum Zitat Thomas, K., Grier, C., Nicol, D.M.: unFriendly: multi-party privacy risks in social networks. In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 236–252. Springer, Heidelberg (2010) CrossRef Thomas, K., Grier, C., Nicol, D.M.: unFriendly: multi-party privacy risks in social networks. In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 236–252. Springer, Heidelberg (2010) CrossRef
24.
Zurück zum Zitat Zhang, L., Zhang, W.: An information extraction attack against on-line social networks. In: SocialInformatics, pp. 49–55 (2012) Zhang, L., Zhang, W.: An information extraction attack against on-line social networks. In: SocialInformatics, pp. 49–55 (2012)
25.
Zurück zum Zitat Costantino, G., Martinelli, F., Sgandurra, D.: Are photos on social networks really private? In: CTS, pp.162–165 (2013) Costantino, G., Martinelli, F., Sgandurra, D.: Are photos on social networks really private? In: CTS, pp.162–165 (2013)
26.
Zurück zum Zitat Luo, W., Xie, Q., Hengartner, U.: FaceCloak: an architecture for user privacy on social networking sites. In: IEEE CSE, pp. 26–33 (2009) Luo, W., Xie, Q., Hengartner, U.: FaceCloak: an architecture for user privacy on social networking sites. In: IEEE CSE, pp. 26–33 (2009)
27.
Zurück zum Zitat Conti, M., Hasani, A., Crispo, B.: Virtual private social networks and a facebook implementation. ACM Trans. Web 7(3), 14:1–14:31 (2013)CrossRef Conti, M., Hasani, A., Crispo, B.: Virtual private social networks and a facebook implementation. ACM Trans. Web 7(3), 14:1–14:31 (2013)CrossRef
28.
Zurück zum Zitat Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: IEEE Symposium on Security and Privacy, pp. 173–187 (2009) Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: IEEE Symposium on Security and Privacy, pp. 173–187 (2009)
29.
Zurück zum Zitat Beato, F., Conti, M., Preneel, B.: Friend in the Middle (FiM): tackling de-anonymization in social networks. In: IEEE PERCOM Workshops, pp. 279–284 (2013) Beato, F., Conti, M., Preneel, B.: Friend in the Middle (FiM): tackling de-anonymization in social networks. In: IEEE PERCOM Workshops, pp. 279–284 (2013)
30.
Zurück zum Zitat Beato, F., Conti, M., Preneel, B., Vettore, D.: VirtualFriendship: hiding interactions on online social networks. In: IEEE CNS (2014) Beato, F., Conti, M., Preneel, B., Vettore, D.: VirtualFriendship: hiding interactions on online social networks. In: IEEE CNS (2014)
31.
Zurück zum Zitat Buchegger, S., Schiöberg, D., Vu, L.H., Datta, A.: PeerSoN: P2P social networking: early experiences and insights. In: ACM Workshop, pp. 46–52 (2009) Buchegger, S., Schiöberg, D., Vu, L.H., Datta, A.: PeerSoN: P2P social networking: early experiences and insights. In: ACM Workshop, pp. 46–52 (2009)
32.
Zurück zum Zitat Conti, M., Poovendran, R., Secchiero, M.: FakeBook: detecting fake profiles in on-line social networks. In: ASONAM, pp. 1071–1078 (2012) Conti, M., Poovendran, R., Secchiero, M.: FakeBook: detecting fake profiles in on-line social networks. In: ASONAM, pp. 1071–1078 (2012)
33.
Zurück zum Zitat Nagle, F., Singh, L.: Can friends be trusted? Exploring privacy in online social networks. In: ASONAM, pp. 312–315 (2009) Nagle, F., Singh, L.: Can friends be trusted? Exploring privacy in online social networks. In: ASONAM, pp. 312–315 (2009)
34.
Zurück zum Zitat Dey, R., Jelveh, Z., Ross, K.W.: Facebook users have become much more private: a large-scale study. In: IEEE PERCOM Workshops, pp. 346–352 (2012) Dey, R., Jelveh, Z., Ross, K.W.: Facebook users have become much more private: a large-scale study. In: IEEE PERCOM Workshops, pp. 346–352 (2012)
Metadaten
Titel
SocialSpy: Browsing (Supposedly) Hidden Information in Online Social Networks
verfasst von
Andrea Burattin
Giuseppe Cascavilla
Mauro Conti
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-17127-2_6