Skip to main content

PriGuardTool: A Web-Based Tool to Detect Privacy Violations Semantically

  • Conference paper
  • First Online:
Engineering Multi-Agent Systems (EMAS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 10093))

Included in the following conference series:

  • 488 Accesses

Abstract

Online social networks contain plethora of information about its users. While users enjoy sharing information online, not all information is meant to be seen by the entire network. Managing the privacy of users has become an important aspect of such online networks. An important part of this is detecting privacy violations and notifying the users so that they can take appropriate actions. While various approaches for detecting privacy violations exist, most of the approaches do not have a running tool that can exhibit the principles of its underlying approach.

This paper presents PriGuardTool, a Web-based tool that can detect privacy violations in online social networks. Each user is represented by a software agent in the system that first collects user’s privacy concerns, explicitly specified as what types of content are meant to be seen by which audience. The system represents these privacy constraints as commitments between the user and the online social network. The user constraints are converted into commitments automatically by the agent. The system then monitors which commitments are violated based on the content shown to users, such that a violated commitment represents a privacy violation in the system. While checking for violations, the effects of posts on the system as well as the semantic relations and rules are considered. We evaluate PriGuardTool by using various real-life scenarios and real data that have been collected over Facebook. Our initial results show that realistic privacy violations can be detected using PriGuardTool.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    We denote a Concept with text in mono-spaced format, a relation with italic text, and an :individual with a colon followed by text in mono-spaced format.

  2. 2.

    http://mas.cmpe.boun.edu.tr/priguardtool.

  3. 3.

    https://developers.facebook.com/docs/graph-api.

  4. 4.

    https://www.mongodb.com/.

  5. 5.

    https://jena.apache.org/.

  6. 6.

    https://gnu.io/social/.

References

  1. Akcora, C.G., Carminati, B., Ferrari, E.: Risks of friendships on social networks. In: IEEE International Conference on Data Mining (ICDM), pp. 810–815 (2012)

    Google Scholar 

  2. Baldoni, M., Baroglio, C., Chopra, A.K., Singh, M.P.: Composing and verifying commitment-based multiagent protocols. In: Proceedings of the 24th International Joint Conference on Artificial Intelligence (IJCAI), pp. 10–17 (2015)

    Google Scholar 

  3. Carminati, B., Ferrari, E., Heatherly, R., Kantarcioglu, M., Thuraisingham, B.: Semantic web-based social network access control. Comput. Secur. 30(2), 108–115 (2011)

    Article  Google Scholar 

  4. Fang, L., LeFevre, K.: Privacy wizards for social networking sites. In: Proceedings of the 19th International Conference on World Wide Web, pp. 351–360. ACM (2010)

    Google Scholar 

  5. Gürses, F., Berendt, B.: The social web and privacy: practices, reciprocity and conflict detection in social networks. In: Privacy-Aware Knowledge Discovery, pp. 395–432. Chapman & Hall/CRC Press, New York (2010)

    Google Scholar 

  6. Heussner, K.M.: Celebrities’ photos, videos may reveal location. ABC News. http://goo.gl/sJIFg4

  7. Hu, H., Ahn, G.J., Jorgensen, J.: Multiparty access control for online social networks: model and mechanisms. IEEE Trans. Knowl. Data Eng. 25(7), 1614–1627 (2013)

    Article  Google Scholar 

  8. Kafalı, O., Günay, A., Yolum, P.: Detecting and predicting privacy violations in online social networks. Distrib. Parallel Databases 32(1), 161–190 (2014)

    Article  Google Scholar 

  9. Keküllüoğlu, D., Kökciyan, N., Yolum, P.: Strategies for privacy negotiation in online social networks. In: Proceedings of the 1st International Workshop on AI for Privacy and Security (PrAISe), pp. 2:1–2:8 (2016)

    Google Scholar 

  10. Kepez, B., Yolum, P.: Learning privacy rules cooperatively in online social networks. In: Proceedings of the 1st International Workshop on AI for Privacy and Security (PrAISe), pp. 3:1–3:4. ACM (2016)

    Google Scholar 

  11. Kökciyan, N., Yaglikci, N., Yolum, P.: Argumentation for resolving privacy disputes in online social networks: (extended abstract). In: Proceedings of the 15th International Conference on Autonomous Agents & Multiagent Systems, Singapore, May 9–13, pp. 1361–1362 (2016)

    Google Scholar 

  12. Kökciyan, N., Yolum, P.: Priguard: a semantic approach to detect privacy violations in online social networks. IEEE Trans. Knowl. Data Eng. 28(10), 2724–2737 (2016)

    Article  Google Scholar 

  13. Kökciyan, N., Yolum, P.: PriGuardTool: a tool for monitoring privacy violations in online social networks (demonstration). In: Proceedings of the 2016 International Conference on Autonomous Agents and Multiagent Systems (AAMAS), pp. 1496–1497 (2016)

    Google Scholar 

  14. Krishnamurthy, B.: Privacy and online social networks: can colorless green ideas sleep furiously? IEEE Secur. Priv. 11(3), 14–20 (2013)

    Article  MathSciNet  Google Scholar 

  15. Lampinen, A., Lehtinen, V., Lehmuskallio, A., Tamminen, S.: We’re in it together: interpersonal management of disclosure in social network services. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 3217–3226. ACM (2011)

    Google Scholar 

  16. Liu, K., Terzi, E.: A framework for computing the privacy scores of users in online social networks. ACM Trans. Knowl. Discov. Data (TKDD) 5(1), 6: 1–6: 30 (2010)

    Google Scholar 

  17. Mester, Y., Kökciyan, N., Yolum, P.: Negotiating privacy constraints in online social networks. In: Koch, F., Guttmann, C., Busquets, D. (eds.) Advances in Social Computing and Multiagent Systems, Communications in Computer and Information Science, vol. 541, pp. 112–129. Springer, Heidelberg (2015)

    Google Scholar 

  18. Motik, B., Patel-Schneider, P.F., Parsia, B., Bock, C., Fokoue, A., Haase, P., Hoekstra, R., Horrocks, I., Ruttenberg, A., Sattler, U., et al.: Owl 2 web ontology language: structural specification and functional-style syntax. W3C Recommendation 27(65), 159 (2009)

    Google Scholar 

  19. Mugan, J., Sharma, T., Sadeh, N.: Understandable learning of privacy preferences through default personas and suggestions. Technical report CMU-ISR-11-112, School of Computer Science, Carnegie Mellon University (2011)

    Google Scholar 

  20. Pappachan, P., Yus, R., Das, P.K., Finin, T., Mena, E., Joshi, A.: A semantic context-aware privacy model for faceblock. In: Proceedings of the 2nd International Conference on Society, Privacy and the Semantic Web - Policy and Technology, pp. 64–72. PrivOn (2014)

    Google Scholar 

  21. Pérez, J., Arenas, M., Gutierrez, C.: Semantics and complexity of SPARQL. ACM Trans. Database Syst. 34(3), 16 (2009)

    Article  Google Scholar 

  22. Singh, M.P.: An ontology for commitments in multiagent systems. Artif. Intell. Law 7(1), 97–113 (1999)

    Article  Google Scholar 

  23. Squicciarini, A.C., Paci, F., Sundareswaran, S.: PriMa: a comprehensive approach to privacy protection in social network sites. Ann. Telecommun./Annales des Télécommunications 69(1), 21–36 (2014)

    Google Scholar 

  24. Squicciarini, A.C., Xu, H., Zhang, X.L.: Cope: enabling collaborative privacy management in online social networks. J. Am. Soc. Inf. Sci. Technol. 62(3), 521–534 (2011)

    Google Scholar 

  25. Such, J.M., Rovatsos, M.: Privacy policy negotiation in social media. ACM Trans. Auton. Adapt. Syst. (TAAS) 11(1), 4:1–4:29 (2016)

    Google Scholar 

  26. Yolum, P., Singh, M.P.: Flexible protocol specification and execution: applying event calculus planning using commitments. In: Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 527–534 (2002)

    Google Scholar 

Download references

Acknowledgments

This work is supported by TUBITAK under grant 113E543. This work extends the demonstration paper that was presented at AAMAS 2016 [13]. We thank Hamza Ozturk and Safa Orhan for helping with integrating PriGuardTool to Facebook.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nadin Kökciyan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Kökciyan, N., Yolum, P. (2016). PriGuardTool: A Web-Based Tool to Detect Privacy Violations Semantically. In: Baldoni, M., Müller, J., Nunes, I., Zalila-Wenkstern, R. (eds) Engineering Multi-Agent Systems. EMAS 2016. Lecture Notes in Computer Science(), vol 10093. Springer, Cham. https://doi.org/10.1007/978-3-319-50983-9_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-50983-9_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-50982-2

  • Online ISBN: 978-3-319-50983-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics