Advertisement

A Closer Look at Third-Party OSN Applications: Are They Leaking Your Personal Information?

  • Abdelberi Chaabane
  • Yuan Ding
  • Ratan Dey
  • Mohamed Ali Kaafar
  • Keith W. Ross
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8362)

Abstract

We examine third-party Online Social Network (OSN) applications for two major OSNs: Facebook and RenRen. These third-party applications typically gather, from the OSN, user personal information. We develop a measurement platform to study the interaction between OSN applications and fourth parties. We use this platform to study the behavior of 997 Facebook applications and 377 RenRen applications. We find that the Facebook and RenRen applications interact with hundreds of different fourth-party tracking entities. More worrisome, 22% of Facebook applications and 69% of RenRen applications provide users’ personal information to one or more fourth-party tracking entities.

Keywords

Online Social Network User Information Analytic Service External Entity Data Leakage 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Chaabane, A., Kaafar, M.A., Boreli, R.: Big friend is watching you: Analyzing online social networks tracking capabilities. In: WOSN (2012)Google Scholar
  2. 2.
    Chia, P.H., Yamamoto, Y., Asokan, N.: Is this app safe?: A large scale study on application permissions and risk signals. In: WWW (2012)Google Scholar
  3. 3.
    Dey, R., Jelveh, Z., Ross, K.: Facebook users have become much more private: A large-scale study. In: PERCOM Workshops (2012)Google Scholar
  4. 4.
    Frank, M., Dong, B., Porter Felt, A., Song, D.: Mining permission request patterns from Android and Facebook applications. In: ICDM (2012)Google Scholar
  5. 5.
    Krishnamurthy, B., Wills, C.E.: Characterizing privacy in online social networks. In: WOSN (2008)Google Scholar
  6. 6.
    Krishnamurthy, B., Wills, C.E.: On the leakage of personally identifiable information via online social networks. In: WOSN (2009)Google Scholar
  7. 7.
    Mayer, J.R., Mitchell, J.C.: Third-party web tracking: Policy and technology. In: S&P (2012)Google Scholar
  8. 8.
    Perito, D., Castelluccia, C., Kaafar, M.A., Manils, P.: How unique and traceable are usernames? In: Fischer-Hübner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 1–17. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  9. 9.
    Xia, N., Song, H., Liao, Y., Iliofotou, M., Nucci, A., Zhang, Z., Kuzmanovic, A.: Mosaic: Quantifying privacy leakage in mobile networks. In: SIGCOMM (2013)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Abdelberi Chaabane
    • 1
  • Yuan Ding
    • 2
  • Ratan Dey
    • 2
  • Mohamed Ali Kaafar
    • 1
    • 3
  • Keith W. Ross
    • 2
  1. 1.INRIAFrance
  2. 2.Polytechnic Institute of NYUUSA
  3. 3.NICTAAustralia

Personalised recommendations