Skip to main content

A Semi-supervised Approach to Measuring User Privacy in Online Social Networks

  • Conference paper
  • First Online:
Book cover Discovery Science (DS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 9956))

Included in the following conference series:

Abstract

During our digital social life, we share terabytes of information that can potentially reveal private facts and personality traits to unexpected strangers. Despite the research efforts aiming at providing efficient solutions for the anonymization of huge databases (including networked data), in online social networks the most powerful privacy protection is in the hands of the users. However, most users are not aware of the risks derived by the indiscriminate disclosure of their personal data. With the aim of fostering their awareness on private data leakage risk, some measures have been proposed that quantify the privacy risk of each user. However, these measures do not capture the objective risk of users since they assume that all user’s direct social connections are close (thus trustworthy) friends. Since this assumption is too strong, in this paper we propose an alternative approach: each user decides which friends are allowed to see each profile item/post and our privacy score is defined accordingly. We show that it can be easily computed with minimal user intervention by leveraging an active learning approach. Finally, we validate our measure on a set of real Facebook users.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Source: http://www.alexa.com/.

  2. 2.

    https://research.facebook.com/blog/three-and-a-half-degrees-of-separation/.

  3. 3.

    http://www.zdnet.com/article/facebook-cto-most-people-have-modified-their- privacy-settings/.

  4. 4.

    http://www.consumerreports.org/cro/magazine/2012/06/facebook-your-privacy/index.htm.

  5. 5.

    http://www.pewresearch.org/fact-tank/2014/02/03/6-new-facts-about-facebook/.

  6. 6.

    http://kdd.di.unito.it/privacyawareness/.

References

  1. Akcora, C.G., Carminati, B., Ferrari, E.: Privacy in social networks: How risky is your social graph? In: Proceedings of ICDE 2012, pp. 9–19 (2012)

    Google Scholar 

  2. Akcora, C.G., Carminati, B., Ferrari, E.: Risks of friendships on social networks. In: Proceedings of ICDM 2012, pp. 810–815 (2012)

    Google Scholar 

  3. Backstrom, L., Dwork, C., Kleinberg, J.M.: Wherefore art thou R3579X?: anonymized social networks, hidden patterns, and structural steganography. Commun. ACM 54(12), 133–141 (2011)

    Article  Google Scholar 

  4. Becker, J., Chen, H.: Measuring privacy risk in online social networks. In: Proceedings of Web 2.0 Security and Privacy (W2SP) (2009)

    Google Scholar 

  5. Cavoukian, A.: Privacy by design [leading edge]. IEEE Technol. Soc. Mag. 31(4), 18–19 (2012)

    Article  Google Scholar 

  6. Cetto, A., Netter, M., Pernul, G., Richthammer, C., Riesner, M., Roth, C., Sänger, J.: Friend inspector: A serious game to enhance privacy awareness in social networks. In: Proceedings of IDGEI 2014 (2014)

    Google Scholar 

  7. Coscia, M., Rossetti, G., Giannotti, F., Pedreschi, D.: Uncovering hierarchical and overlapping communities with a local-first approach. TKDD 9(1), 6:1–6:27 (2014)

    Article  Google Scholar 

  8. Culotta, A., McCallum, A.: Reducing labeling effort for structured prediction tasks. In: Proceedings of AAAI 2005, pp. 746–751 (2005)

    Google Scholar 

  9. Dagan, I., Engelson, S.P.: Committee-based sampling for training probabilistic classifiers. In: Proceedings of ICML 1995, pp. 150–157 (1995)

    Google Scholar 

  10. Dunbar, R.I.M.: Do online social media cut through the constraints that limit the size of offline social networks? Roy. Soc. Open Sci. 3(1), 50292 (2016)

    Google Scholar 

  11. Fang, L., LeFevre, K.: Privacy wizards for social networking sites. In: Proceedings of WWW 2010 (2010)

    Google Scholar 

  12. Ghazinour, K., Matwin, S., Sokolova, M.: Monitoring and recommending privacy settings in social networks. In: Proceedings of 2013 EDBT/ICDT Workshop, pp. 164–168 (2013)

    Google Scholar 

  13. Kempe, D., Kleinberg, J.M., Tardos, É.: Maximizing the spread of influence through a social network. In: Proceedings of SIGKDD 2003, pp. 137–146 (2003)

    Google Scholar 

  14. Kosinski, M., Stillwell, D., Graepel, T.: Private traits and attributes are predictable from digital records of human behavior. PNAS 110(15), 5802–5805 (2013)

    Article  Google Scholar 

  15. Lewis, D.D., Gale, W.A.: A sequential algorithm for training text classifiers. In: Proceedings of SIGIR 1994, pp. 3–12 (1994)

    Google Scholar 

  16. Liu, K., Terzi, E.: A framework for computing the privacy scores of users in online social networks. TKDD 5(1), 6 (2010)

    Article  Google Scholar 

  17. Liu, Y., Gummadi, P.K., Krishnamurthy, B., Mislove, A.: Analyzing facebook privacy settings: user expectations vs. reality. In: Proceedings of SIGCOMM IMC 2011, pp. 61–70 (2011)

    Google Scholar 

  18. Mislove, A., Viswanath, B., Gummadi, P.K., Druschel, P.: You are who you know: inferring user profiles in online social networks. In: Proceedings of WSDM 2010, pp. 251–260 (2010)

    Google Scholar 

  19. Mitchell, T.M.: Machine learning. McGraw-Hill, New York (1997)

    MATH  Google Scholar 

  20. Roberts, S.G.B., Dunbar, R.I.M., Pollet, T.V., Kuppens, T.: Exploring variation in active network size: Constraints and ego characteristics. Soc. Netw. 31(2), 138–146 (2009)

    Article  Google Scholar 

  21. Scheffer, T., Decomain, C., Wrobel, S.: Active hidden markov models for information extraction. In: Hand, D.J., Kok, J.N., Berthold, M.R. (eds.) IDA 1999. LNCS, vol. 1642, pp. 309–318. Springer, Heidelberg (2001). doi:10.1007/3-540-44816-0_31

    Chapter  Google Scholar 

  22. Talukder, N., Ouzzani, M., Elmagarmid, A.K., Elmeleegy, H., Yakout, M.: Privometer: Privacy protection in social networks. In: Proceedings of M3SN 2010, pp. 266–269 (2010)

    Google Scholar 

  23. Wang, Y., Nepali, R.K., Nikolai, J.: Social network privacy measurement and simulation. In: Proceedings of ICNC 2014, pp. 802–806 (2014)

    Google Scholar 

  24. Wu, L., Majedi, M., Ghazinour, K., Barker, K.: Analysis of social networking privacy policies. In: Proceedings of 2010 EDBT/ICDT Workshops (2010)

    Google Scholar 

  25. Zheleva, E., Getoor, L.: Privacy in social networks: A survey. In: Aggarwal, C.C. (ed.) Social Network Data Analytics, pp. 277–306. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

Download references

Acknowledgments

The work presented in this paper has been co-funded by Fondazione CRT (grant number 2015-1638). The authors wish to thank all the volunteers who participated in the survey.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ruggero G. Pensa .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Pensa, R.G., Di Blasi, G. (2016). A Semi-supervised Approach to Measuring User Privacy in Online Social Networks. In: Calders, T., Ceci, M., Malerba, D. (eds) Discovery Science. DS 2016. Lecture Notes in Computer Science(), vol 9956. Springer, Cham. https://doi.org/10.1007/978-3-319-46307-0_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-46307-0_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-46306-3

  • Online ISBN: 978-3-319-46307-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics