Skip to main content

Negotiating Privacy Constraints in Online Social Networks

Part of the Communications in Computer and Information Science book series (CCIS,volume 541)

Abstract

Privacy is a major concern of Web systems. Traditional Web systems employ static privacy agreements to notify its users of how their information will be used. Recent social networks allow users to specify some privacy concerns, thus providing a partially personalized privacy setting. However, still privacy violations are taking place because of different privacy concerns, based on context, audience, or content that cannot be enumerated by a user up front. Accordingly, we propose that privacy should be handled per post and on demand among all that might be affected. To realize this, we envision a multiagent system where each user in a social network is represented by an agent. When a user engages in an activity that could jeopardize a user’s privacy (e.g., publishing a picture), agents of the users negotiate on the privacy concerns that will govern the content. We employ a negotiation protocol and use it to settle differences in privacy expectations. We develop a novel agent that represents its user’s preferences semantically and reason on privacy concerns effectively. Execution of our agent on privacy scenarios from the literature show that our approach can handle and resolve realistic privacy violations before they occur.

Keywords

  • Negotiator Agent
  • Privacy Concern
  • Negotiation Protocol
  • Privacy Rule
  • Privacy Violation

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

This work has been supported by TUBITAK under grant 113E543.

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-319-24804-2_8
  • Chapter length: 18 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   54.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-24804-2
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   69.99
Price excludes VAT (USA)
Fig. 1.

Notes

  1. 1.

    \(p'\) is similar to “counter-offer” in other negotiation protocols with the difference that the negotiator agent makes it.

  2. 2.

    We assume that mentioned or included people information can be inferred from post text and medium by employing textual and facial recognition algorithms.

  3. 3.

    We denote a Concept with text in mono-spaced format, a relationship with italic text, and an :instance with a colon followed by text in mono-spaced format.

  4. 4.

    PriNego Mobile can be accessed at http://goo.gl/kF9svI.

References

  1. Andrews, L.: I Know Who You Are and I Saw What You Did: Social Networks and the Death of Privacy. Simon and Schuster, New York (2012)

    Google Scholar 

  2. Aydogan, R., Yolum, P.: Learning opponent’s preferences for effective negotiation: an approach based on concept learning. Auton. Agents Multi-Agent Syst. 24(1), 104–140 (2012)

    CrossRef  Google Scholar 

  3. Bennicke, M., Langendorfer, P.: Towards automatic negotiation of privacy contracts for internet services. In: The 11th IEEE International Conference on Networks, ICON2003, pp. 319–324. IEEE (2003)

    Google Scholar 

  4. Horridge, M., Bechhofer, S.: The OWL API: A Java API for OWL ontologies. Semant. Web 2(1), 11–21 (2011)

    Google Scholar 

  5. Horrocks, I., Patel-Schneider, P.F., Boley, H., Tabet, S., Grosof, B., Dean, M., et al.: SWRL: A semantic web rule language combining OWL and RuleML. W3C Member Submission 21, 79 (2004)

    Google Scholar 

  6. Jennings, N.R., Faratin, A.R.L.P., Parsons, S., Sierra, C., Wooldridge, M.: Automated negotiation: Prospects, methods and challenges. Int. J. Group Decis. Negot. 10(2), 199–215 (2001)

    CrossRef  Google Scholar 

  7. Kafalı, O., Günay, A., Yolum, P.: Detecting and predicting privacy violations in online social networks. Distrib. Parallel Databases 32(1), 161–190 (2014)

    CrossRef  Google Scholar 

  8. Pappachan, P., Yus, R., Das, P.K., Finin, T., Mena, E., Joshi, A.: A semantic context-aware privacy model for FaceBlock. In: Second International Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn), Riva del Garda, Italy, October 2014

    Google Scholar 

  9. Schmidt, A., Beigl, M., Gellersen, H.-W.: There is more to context than location. Comput. Graph. 23(6), 893–901 (1999)

    CrossRef  Google Scholar 

  10. Sirin, E., Parsia, B., Grau, B.C., Kalyanpur, A., Katz, Y.: Pellet: A practical OWL-DL reasoner. Web Semant. Sci. Serv. Agents World Wide Web 5(2), 51–53 (2007)

    CrossRef  Google Scholar 

  11. Squicciarini, A.C., Xu, H., Zhang, X.L.: Cope: Enabling collaborative privacy management in online social networks. J. Am. Soc. Inf. Sci. Technol. 62(3), 521–534 (2011)

    Google Scholar 

  12. Stewart, M.G.: How giant websites design for you (and a billion others, too). TED Talk (2014)

    Google Scholar 

  13. Walker, D.D., Mercer, E.G., Seamons, K.E.: Or best offer: A privacy policy negotiation protocol. In: IEEE Workshop on Policies for Distributed Systems and Networks, POLICY 2008, pp. 173–180. IEEE (2008)

    Google Scholar 

  14. Wishart, R., Corapi, D., Marinovic, S., Sloman, M.: Collaborative privacy policy authoring in a social networking context. In: Proceedings of the 2010 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), pp. 1–8, Washington, DC, USA. IEEE Computer Society (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nadin Kökciyan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Mester, Y., Kökciyan, N., Yolum, P. (2015). Negotiating Privacy Constraints in Online Social Networks. In: Koch, F., Guttmann, C., Busquets, D. (eds) Advances in Social Computing and Multiagent Systems. MFSC 2015. Communications in Computer and Information Science, vol 541. Springer, Cham. https://doi.org/10.1007/978-3-319-24804-2_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-24804-2_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-24803-5

  • Online ISBN: 978-3-319-24804-2

  • eBook Packages: Computer ScienceComputer Science (R0)