Privacy in Social Networks

  • Traian Marius Truta
  • Michail Tsikerdekis
  • Sherali Zeadally
Chapter
Part of the Computer Communications and Networks book series (CCN)

Abstract

Social networks such as Facebook and LinkedIn have gained a lot of popularity in recent years. These networks use a large amount of data that are highly valuable for different purposes. Hence, social networks become a potential vector for attackers to exploit. This chapter focuses on the security attacks and countermeasures used by social networks. Privacy issues and solutions in social networks are discussed and the chapter ends with an outline of some of the privacy challenges in the social networks.

References

  1. 1.
    Alufaisan Y, Campan A (2013) Preservation of centrality measures in anonymized social networks. In: Proceedings of the ASE/IEEE international conference on privacy, security, risk, and trust (PASSAT 2013), Washington D.C., USAGoogle Scholar
  2. 2.
    Barbaro M, Zeller T (2006) A face is exposed for AOL searcher no. 4417749. The New York Times, Published 9 Aug 2006Google Scholar
  3. 3.
    Barnes SB (2006) A privacy paradox: social networking in the United States. First Monday 11(9):11–15CrossRefGoogle Scholar
  4. 4.
    Beato F, Kohlweiss M, Wouters K (2011) Scramble! your social network data. In: Privacy enhancing technologies symposium (PETS), pp 211–225Google Scholar
  5. 5.
    Bernal J (2009) Web 2.0 and social networking for the enterprise: guidelines and examples for implementation and management within your organization. Pearson EducationGoogle Scholar
  6. 6.
    Bhat CS (2008) Cyber bullying: overview and strategies for school counsellors, guidance officers, and all school personnel. Aust J Guid Couns 18(1):53–66CrossRefGoogle Scholar
  7. 7.
    Blocki J, Blum A, Datta A, Sheffet O (2013) Differentially private data analysis of social networks via restricted sensitivity. In: Proceedings of the conference on innovations in theoretical computer science (ITCS), pp 87–96. doi:10.1145/2422436.2422449
  8. 8.
    Boyd DM (2003) Reflections on Friendster, trust and intimacy. In: Proceedings of the Fifth international conference on ubiquitous computing (Ubicomp 2003), Workshop application for the Intimate ubiquitous computing workshop, Seattle WA, USAGoogle Scholar
  9. 9.
    Boyd DM (2004) Friendster and publicly articulated social networking. In: Proceedings of the ACM CHI 2004 conference on human factors in computing systems, pp 1279–1282. ACM Press, New York NY, USA. doi:10.1145/985921.986043
  10. 10.
    Boyd DM, Ellison NB (2007) Social network sites: definition, history, scholarship. J Comput-Mediat Commun 13(1):1–19CrossRefGoogle Scholar
  11. 11.
    Brenner J, Smith A (2013) 72 % of online adults are social networking site users. http://pewinternet.org/Reports/2013/social-networking-sites.aspx
  12. 12.
    Brown J, Broderick AJ, Lee NJ (2007) Word of mouth communication within online communities: conceptualizing the online social network. J Interact Mark 21(3):2–20. doi:10.1016/10.1002/dir.20082 CrossRefGoogle Scholar
  13. 13.
    Campan A, TrutaTM (2008) A clustering approach for data and structural anonymity in social networks. In: Proceedings of the 2nd ACM SIGKDD international workshop on privacy, security, and trust in KDD (PinKDD)Google Scholar
  14. 14.
    Chen R, Fung B, Yu PS, Desai B (2014) Correlated network publication via differential privacy. VLDB J 23(4):653–676. doi:10.1007/s00778-013-0344-8 CrossRefGoogle Scholar
  15. 15.
    Cheng J, Fu AWC, Liu J (2010) K-isomorphism: privacy preserving network publication against structural attacks. In: Proceedings of the ACM SIGMOD international conference on management of data (SIGMOD), pp 459–470Google Scholar
  16. 16.
    Choi D, Kim J (2004) Why people continue to play online games: in search of critical design factors to increase customer loyalty to online contents. Cyberpsychol Behav 7(1):11–24CrossRefGoogle Scholar
  17. 17.
    Coleman JS (1988) Social capital in the creation of human capital. Am J Sociol 94:95–120. doi:10.1086/228943 CrossRefGoogle Scholar
  18. 18.
    Consumer Reports (2012) Facebook and your privacy. Who sees the data you share on the biggest social network? Consumer Rep MagGoogle Scholar
  19. 19.
    Dey R, Jelveh Z, Ross KW (2012) Facebook users have become much more private: alarge-scale study. In: PerCom Workshops, pp 346–352Google Scholar
  20. 20.
    Dingledine R, Mathewson N, Syverson P (2004) Tor: the second generation onion router. In: USENIX security symposium, pp 303–320Google Scholar
  21. 21.
    DiNucci D (1999) Fragmented future. Print 53(4):32Google Scholar
  22. 22.
    Duncan GT, Keller-McNulty SA, Stokes SL (2001) Disclosure risk vs. data utility: the R-U confidentiality map. Technical Report Number 121. National Institute of Statistical SciencesGoogle Scholar
  23. 23.
    Dwork C (2006) Differential privacy. In: Proceedings of the international colloquium on automata, languages, and programming (ICALP)Google Scholar
  24. 24.
    Editorial Board (2014) Edward Snowden, whistle-blower. The New York Times. Accessed 2 Jan 2014Google Scholar
  25. 25.
    Ellison NB, Steinfield C, Lampe C (2007) The benefits of Facebook “friends:” social capital and college students’ use of online social network sites. J Comput-Mediat Commun 12(4):1143–1168. doi:10.1111/j.1083-6101.2007.00367.x CrossRefGoogle Scholar
  26. 26.
    Facebook (2014) Data use policy. https://www.facebook.com/about/privacy/
  27. 27.
    Goel V (2013) Facebook to update privacy policy, but adjusting settings is no easier. The New York Times. 29 Aug 2012Google Scholar
  28. 28.
    Gross R, Acquisti A (2005) Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM workshop on Privacy in the electronic society, pp 71–80. doi:10.1145/1102199.1102214
  29. 29.
    Guha S, Tang K, Francis P (2008) Noyb: privacy in online social networks. In: Proceedings of the First workshop on online social networks, pp 49–54Google Scholar
  30. 30.
    Guillen MF, Suarez SL (2005) Explaining the global digital divide: economic, political and sociological drivers of cross-national internet use. Soc Forces 84(2):681–708. doi:10.1353/sof.2006.0015 CrossRefGoogle Scholar
  31. 31.
    Gundry J (1992) Understanding collaborative learning in networked organizations. In: Kaye AR (ed) Collaborative learning through computer conferencing. Springer, Berlin, pp 167–178Google Scholar
  32. 32.
    Gundry J (2006) Web 0.0 social media. Knowledge Ability Ltd. http://www.knowab.co.uk/socialmedia.html
  33. 33.
    Gupta A, Roth A, Ullman J (2012) Iterative constructions and private data release. In: Proceedings of the theory of cryptography conference (TCC), pp 339–356Google Scholar
  34. 34.
    Guynn J (2012) Facebook changes privacy controls again and takes a key one away. Los Angeles Times. Accessed 12 Dec 2012Google Scholar
  35. 35.
    Hargittai E (2008) Whose space? Differences among users and non-users of social network sites. J Comput-Mediat Commun 13(1):276–297. doi:10.1111/j.1083-6101.2007.00396.x CrossRefGoogle Scholar
  36. 36.
    Hay M, Miklau G, Jensen D, Weis P, Srivastava S (2007) Anonymizing social networks. Technical report, University of Massachusetts, AmherstGoogle Scholar
  37. 37.
    Hay M, Li C, Miklau G, Jensen D (2009) Accurate estimation of the degree distribution of private networks. In: Proceedings of the international conference on data mining (ICDM)Google Scholar
  38. 38.
    Hoegg R, Martignoni R, Meckel M, Stanoevska K (2006) Overview of business models for Web 2.0 communities. In: Proceedings of the GeNeMe (Gemeinschaften in NeuenMedien), Dresden, Germany, pp 23–37Google Scholar
  39. 39.
    Howard TW (2010) Design to thrive: creating social networks and online communities that last. Morgan KaufmannGoogle Scholar
  40. 40.
    Izquierdo E (2011) Social networked media: advances and trends. In: Proceedings of the 2011 ACM workshop on social and behavioural networked media access, pp 1–2. ACM, New York, NY, USA. doi:10.1145/2072627.2072629
  41. 41.
    Jabeur N, Zeadally S, Sayed B (2013) Mobile social networking applications. Commun ACM 56(3):71–79. doi:10.1145/2428556.2428573 CrossRefGoogle Scholar
  42. 42.
    Jones R (1994) Digital’s world-wide web server: a case study. Comput Netw ISDN Syst 27(2):297–306. doi:10.1016/0169-7552(94)90144-9 CrossRefGoogle Scholar
  43. 43.
    Kaplan AM, Haenlein M (2010) Users of the world, unite! The challenges and opportunities of social media. Bus Horiz 53(1):59–68. doi:10.1016/j.bushor.2009.09.003 CrossRefGoogle Scholar
  44. 44.
    Kaplan AM, Haenlein M (2011) The early bird catches the news: nine things you should know about micro-blogging. Bus Horiz 54(2):105–113. doi:10.1016/j.bushor.2010.09.004 CrossRefGoogle Scholar
  45. 45.
    Karwa V, Raskhodnikova S, Smith A, Yaroslavtsev G (2011) Private analysis of graph structure. Proc VLDB Endow 4(11):1146–1157Google Scholar
  46. 46.
    Karwa V, Slavkovic A (2012) Differentially private graphical degree sequences and synthetic graphs. In: Proceedings of the privacy on statistical databases conference. Lecture notes in computer science, vol 7556, pp 273–285Google Scholar
  47. 47.
    Kasiviswanathan S, Nissim K, Raskhodnikova S, Smith A (2013) Analyzing graphs with node differential privacy. In: Proceedings of the theory of cryptography conference (TCC), pp 457–476Google Scholar
  48. 48.
    Katz JE, Rice RE, Aspden P (2001) The Internet, 1995-2000: access, civic involvement, and social interaction. Am Behav Sci 45(3):405–419. doi:10.1177/0002764201045003004 CrossRefGoogle Scholar
  49. 49.
    Kietzmann JH, Hermkens K, McCarthy IP, Silvestre BS (2011) Social media? Get serious! Understanding the functional building blocks of social media. Bus Horiz 54(3):241–251. doi:10.1016/j.bushor.2011.01.005 CrossRefGoogle Scholar
  50. 50.
    Kim A. J. 2000. Community building on the Web. Peachpit PressGoogle Scholar
  51. 51.
    Kirkpatrick D. 2010. The facebook effect. Simon and SchusterGoogle Scholar
  52. 52.
    Lane N, Walton-Flynn N, Benlamlih F (2008) Mobile social networking. Informa UK Limited. http://www.telecoms.com/files/2009/05/buongiorno_final-fmt_nl-3110-f.pdf
  53. 53.
    Lenhart A, Madden M (2007) Teens, privacy and online social networks: How teens manage their online identities and personal information in the age of MySpace. Pew Internet and American Life Project. http://apo.org.au/?q=node/16750
  54. 54.
    Liu K, Terzi E (2008) Towards identity anonymization on graphs. In: Proceedings of the 2008 ACM SIGMOD international conference on management of data, pp 93–106Google Scholar
  55. 55.
    Lucas M, Borisov N (2008) Flybynight: mitigating the privacy risks of social networking. In: Proceedings of the 7th ACM workshop on privacy in the electronic society (WPES), pp 1–8Google Scholar
  56. 56.
    Luo W, Xie Q, Hengartner U (2009) FaceCloack: an architecture for user privacy on social networking sites. In: Proceedings of the international conference on Computational Science and Engineering (CSE), vol 3, pp 26–33Google Scholar
  57. 57.
    Morris MG, Venkatesh V (2000) Age differences in technology adoption decisions: implications for a changing work force. Pers Psychol 53(2):375–403. doi:10.1111/j.1744-6570.2000.tb00206.x
  58. 58.
    Muramatsu J, Ackerman M (1998) Computing, social activity, and entertainment: afield study of a game MUD. Comput Support Coop Work (CSCW) 7(1–2):87–122. doi:10.1023/A:1008636204963 CrossRefGoogle Scholar
  59. 59.
    Murchu IO, Breslin JG, Decker S (2004) Online social and business networking communities. In: Proceedings of the ECAI 2004 workshop on application of semantic web technologies to web communities, pp 241–267. doi:10.1007/978-1-4419-7142-5
  60. 60.
    Murugesan S (2007) Understanding Web 2.0. IT Professional 9(4):34–41. doi:10.1109/MITP.2007.78 CrossRefGoogle Scholar
  61. 61.
    Nobari S, Karras P, Pang H, Bressan S (2014) L-Opacity: Linkage-Aware Graph Anonymization. In: Proceedings of the international conference on extending database technology (EDBT), pp 583–594Google Scholar
  62. 62.
    O’Brien CN (2011) The first Facebook firing case under Section 7 of the National Labor Relations Act: exploring the limits of labor law protection for concerted communication on social media. Suffolk Univ Law Rev 45:29–66Google Scholar
  63. 63.
    Olson P (2013) Teenagers say goodbye to Facebook and hello to messenger apps. Obs J. http://www.theguardian.com/technology/2013/nov/10/teenagers-messenger-apps-facebook-exodus. Accessed 9 Nov 2013
  64. 64.
    Quercia D, Lathia N, Calabrese F, Di Lorenzo G, Crowcroft J (2010) Recommending social events from mobile phone location data. In: Proceedings of the IEEE 10th international conference on in data mining (ICDM), pp 971–976. doi:10.1109/ICDM.2010.152
  65. 65.
    Rafaeli S, Larose RJ (1993) Electronic Bulletin boards and “Public Goods” explanations of collaborative mass media. Commun Res 20(2):277–297. doi:10.1177/009365093020002005 CrossRefGoogle Scholar
  66. 66.
    Raynes-Goldie KS (2012) Privacy in the age of Facebook: discourse, architecture, consequences. PhD Thesis, Curtin UniversityGoogle Scholar
  67. 67.
    Rome Memorandum (2008) Report and Guidance on Privacy in Social Networks Services—“Rome Memorandum”. In: International working group on data protection in telecommunications, Rome, ItalyGoogle Scholar
  68. 68.
    Rosenblum D (2007) What anyone can know: the privacy risks of social networking sites. IEEE Secur Privacy 5(3):40–49. doi:10.1109/MSP.2007.75 MathSciNetCrossRefGoogle Scholar
  69. 69.
    Shen X (Sherman) (2013) Security and privacy in mobile social network [Editor’s Note]. IEEE Netw 27(5):2–3. doi:10.1109/MNET.2013.6616107
  70. 70.
    Shuen A (2008) Web 2.0: astrategy guide. O’Reilly Media, IncGoogle Scholar
  71. 71.
    Squicciarini AC, Griffin C (2012) An informed model of personal information release in social networking sites. Proceedings of the 2012 International conference on privacy, security, risk and trust and 2012 International conference on social computing, pp 636–645. doi:10.1109/SocialCom-PASSAT.2012.137
  72. 72.
    Squicciarini A, Shehab M, Wede J (2010) Privacy policies for shared content in social network sites. VLDB JGoogle Scholar
  73. 73.
    Stutzman F, Gross R, Acquisti A (2012) Silent listeners: the evolution of privacy and disclosure on Facebook. J Privacy Confid 4(2):7–41Google Scholar
  74. 74.
    Tassa T, Cohen DJ (2013) Anonymization of centralized and distributed social networks by sequential clustering. IEE Trans Data Knowl Eng 25(2):311–324. doi:10.1109/TKDE.2011.232 CrossRefGoogle Scholar
  75. 75.
    Travers J, Milgram S (1969) An experimental study of the small world problem. Sociometry 32(4):425–443. doi:10.2307/2786545 CrossRefGoogle Scholar
  76. 76.
    Valkenburg PM, Peter J, Schouten AP (2006) Friend networking sites and their relationship to adolescents’ well-being and social self-esteem. Cyber Psychol Behav 9(5):584–590. doi:10.1089/cpb.2006.9.584 CrossRefGoogle Scholar
  77. 77.
    Wang C-JL, Wang ET, Chen ALP (2013) Anonymization for multiple released social network graphs. Adv Knowl Discov Data Mining LNCS 7819:99–110. doi:10.1007/978-3-642-37456-2_9 Google Scholar
  78. 78.
    West A, Lewis J, Currie P (2009) Students’ Facebook “friends”: public and private spheres. J Youth Stud 12(6):615–627. doi:10.1080/13676260902960752 CrossRefGoogle Scholar
  79. 79.
    Yamada A, Kim TH, Perrig A (2012) Exploiting privacy policy conflicts in online social networks. In: CMU-CyLab-12-005, Carnegie Mellon UniversityGoogle Scholar
  80. 80.
    Zheleva E, Getoor L (2011) Privacy in social networks: a survey. Chapter in Social network data analytics. Springer Science and Business MediaGoogle Scholar
  81. 81.
    Zhou B, Pei J (2008) Preserving privacy in social networks against neighborhood attacks. In: Proceedings of the IEEE international conference on data engineering (ICDE), pp 506–515Google Scholar
  82. 82.
    Zou L, Chen L, Ozsu TM (2009) K-automorphism: a general framework for privacy preserving network publication. In: Proceedings of the international conference on very large data bases (VLDB)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Traian Marius Truta
    • 1
  • Michail Tsikerdekis
    • 2
  • Sherali Zeadally
    • 2
  1. 1.Department of Computer ScienceCollege of Informatics Northern Kentucky UniversityHighland HeightsUSA
  2. 2.College of Communication and InformationUniversity of KentuckyLexingtonUSA

Personalised recommendations