TrustBus 2012: Trust, Privacy and Security in Digital Business pp 65-78 | Cite as
An Autonomous Social Web Privacy Infrastructure with Context-Aware Access Control
Abstract
The rise of online social networks (OSNs) has traditionally been accompanied by privacy concerns. These typically stem from facts: First, OSN service providers’ access to large databases with millions of user profiles and their exploitation. Second, the user’s inability to create and manage different identity facets and enforce access to the self as in the real world. In this paper, we argue in favor of a new paradigm, decoupling the management of social identities in OSNs from other social network services and providing access controls that take social contexts into consideration. For this purpose, we first propose Priamos, an architecture for privacy-preserving autonomous management of social identities and subsequently present one of its core components to realize context-aware access control. We have implemented a prototype to evaluate the feasibility of the proposed approach.
Keywords
Privacy Online Social Networks Context-Aware Access Control Privacy-Preserving Social Identity ManagementPreview
Unable to display preview. Download preview PDF.
References
- 1.Ali, B., Villegas, W., Maheswaran, M.: A trust based approach for protecting user data in social networks. In: Proceedings of the 2007 Conference of the Center for Advanced Studies on Collaborative Research, pp. 288–293. ACM (2007)Google Scholar
- 2.Beato, F., Kohlweiss, M., Wouters, K.: Scramble! Your Social Network Data. In: Fischer-Hübner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 211–225. Springer, Heidelberg (2011)CrossRefGoogle Scholar
- 3.van den Berg, B., Leenes, R.: Audience Segregation in Social Network Sites. In: Proceedings of the 2010 IEEE Second International Conference on Social Computing, SOCIALCOM 2010, pp. 1111–1116. IEEE Computer Society (2010)Google Scholar
- 4.Bortoli, S., Palpanas, T., Bouquet, P.: Decentralised social network management. International Journal of Web Based Communities 7(3), 276–297 (2011)CrossRefGoogle Scholar
- 5.Boyd, D.: Taken Out of Context: American Teen Sociality in Networked Publics. Ph.D. thesis, University of California, Berkeley (2008)Google Scholar
- 6.Camenisch, J., Fischer-Hübner, S., Rannenberg, K. (eds.): Privacy and Identity Management for Life. Springer (2011)Google Scholar
- 7.Carminati, B., Ferrari, E., Heatherly, R., Kantarcioglu, M., Thuraisingham, B.: A semantic web based framework for social network access control. In: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, p. 177. ACM, New York (2009)CrossRefGoogle Scholar
- 8.Carminati, B., Ferrari, E., Heatherly, R., Kantarcioglu, M., Thuraisingham, B.: Semantic web-based social network access control. Computers & Security 30(2-3), 108–115 (2011)CrossRefGoogle Scholar
- 9.Doruer, N., Menevi, I., Eyyam, R.: What is the motivation for using Facebook? Procedia - Social and Behavioral Sciences 15, 2642–2646 (2011)CrossRefGoogle Scholar
- 10.Edwards, L., Brown, I.: Data Control and Social Networking: Irreconcilable Ideas? Harboring Data: Information Security, Law, and the Corporation, 202–228 (2009)Google Scholar
- 11.Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security 4(3), 224–274 (2001)CrossRefGoogle Scholar
- 12.Goffman, E.: The Presentation of Self in Everyday Life. Anchor (1959)Google Scholar
- 13.Kruk, S.R., Grzonkowski, S., Gzella, A., Woroniecki, T., Choi, H.-C.: D-FOAF: Distributed Identity Management with Access Rights Delegation. In: Mizoguchi, R., Shi, Z.-Z., Giunchiglia, F. (eds.) ASWC 2006. LNCS, vol. 4185, pp. 140–154. Springer, Heidelberg (2006)CrossRefGoogle Scholar
- 14.Leenes, R.: Context Is Everything Sociality and Privacy in Online Social Network Sites. In: Bezzi, M., Duquenoy, P., Fischer-Hübner, S., Hansen, M., Zhang, G. (eds.) Privacy and Identity. IFIP AICT, vol. 320, pp. 48–65. Springer, Heidelberg (2010)CrossRefGoogle Scholar
- 15.Mostarda, M., Zani, F., Palmisano, D., Tripodi, S.: Towards an OpenID-based solution to the Social Network Interoperability problem. In: W3C Workshop on the Future of Social Networking (2009)Google Scholar
- 16.Netter, M., Riesner, M., Pernul, G.: Assisted Social Identity Management - Enhancing Privacy in the Social Web. In: Proceedings of the 10th International Conference on Wirtschaftsinformatik (2011)Google Scholar
- 17.Nissenbaum, H.: Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford Law Books (2010)Google Scholar
- 18.Peterson, C.: Losing Face: An Environmental Analysis of Privacy on Facebook. SSRN eLibrary (2010)Google Scholar
- 19.Pettenati, M.C., Ciofi, L., Parlanti, D., Pirri, F., Giuli, D.: An Overlay Infrastructural Approach for a Web-Wide Trustworthy Identity and Profile Management. In: Salgarelli, L., Bianchi, G., Blefari-Melazzi, N. (eds.) Trustworthy Internet, pp. 43–58. Springer (2011)Google Scholar
- 20.Tufekci, Z.: Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites. Bulletin of Science, Technology & Society 28(1), 20–36 (2008)CrossRefGoogle Scholar
- 21.Ziegele, M., Quiring, O.: Privacy in Social Network Sites. In: Trepte, S., Reinecke, L. (eds.) Privacy Online. Perspectives on Privacy and Self-Disclosure in the Social Web, pp. 175–189. Springer (2011)Google Scholar
- 22.Zimmermann, A., Lorenz, A., Oppermann, R.: An Operational Definition of Context. In: Kokinov, B., Richardson, D.C., Roth-Berghofer, T.R., Vieu, L. (eds.) CONTEXT 2007. LNCS (LNAI), vol. 4635, pp. 558–571. Springer, Heidelberg (2007)CrossRefGoogle Scholar