Skip to main content

“How Did They Know?”—Model-Checking for Analysis of Information Leakage in Social Networks

  • Conference paper
  • First Online:
Coordination, Organizations, Institutions, and Norms in Agent Systems XII (COIN 2016, COIN 2016)

Abstract

We examine the use of model-checking in the analysis of information leakage in social networks. We take previous work on the formal analysis of digital crowds and show how a variation on the formalism can naturally model the interaction of people and groups of followers in intersecting social networks. We then show how probabilistic models of the forwarding and reposting behaviour of individuals can be used to analyse the risk that information will leak to unwanted parties. We illustrate our approach by analysing several simple examples.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    livejournal.com.

  2. 2.

    facebook.com.

  3. 3.

    ifttt.com.

  4. 4.

    zapier.com.

  5. 5.

    Though note that these could be included.

  6. 6.

    In [25], the formulas \(M^{\uparrow i} \varphi \) and \(M^{\downarrow i}\varphi \) have also subscripts that denote the nature of the communication, i.e., whether it expresses a question, a statement, or an order, but we here only use statements and thus omit subscripts.

  7. 7.

    Note: We define the messages with individual agents, not sets as in [7, 8, 10], because a message can be broadcast to many agents, but it can be sent from one agent only, otherwise the sender is unknown, which cannot happen here — if your contexts sends you a message it is from exactly one context.

  8. 8.

    Prism allows models to be created as Discrete Time Markov Chains (DTMCs), Continuous Time Markov Chains (CTMCs) and Markov Decisions Procedures (MDPs). Since our models had no continuous or non-deterministic aspects that would have required more complex models we opted to use the simplest of these (DTMCs) in modelling. We opted for a representation based on Markov Chains since they capture stochastic processes well and it seemed plausible that models of information leakage in social networks might need to be cyclic. If the possibility of cyclic models could be ruled out then Bayesian Networks would also be a plausible candidate formalism.

  9. 9.

    We use the notation \(P^{=n}\) to indicate that there is a probability of n that something will occur.

References

  1. Abdulrahman, R., Alim, S., Neagu, D., Holton, D.R.W., Ridley, M.: Multi agent system approach for vulnerability analysis of online social network profiles over time. Int. J. Knowl. Web Intell. 3(3), 256–286 (2012). http://dx.doi.org/10.1504/IJKWI.2012.050854

    Article  Google Scholar 

  2. Belardinelli, F., Grossi, D.: On the formal verification of diffusion phenomena in open dynamic agent networks. In: Proceedings of International Conference on Autonomous Agents and Multiagent Systems (AAMAS), pp. 237–245 (2015). http://dl.acm.org/citation.cfm?id=2772912

  3. Bryant, E.M., Marmo, J.: The rules of facebook friendship: a two-stage examination of interaction rules in close, casual, and acquaintance friendships. J. Soc. Pers. Relat. 29(8), 1013–1035 (2012). http://spr.sagepub.com/content/29/8/1013.abstract

    Article  Google Scholar 

  4. Clarke, E., Grumberg, O., Peled, D.: Model Checking. MIT Press, Cambridge (1999)

    Google Scholar 

  5. Dennis, L.A., Fisher, M., Webster, M.: Two-stage agent program verification. J. Logic Comput. (2016). http://logcom.oxfordjournals.org/content/early/2015/02/16/logcom.exv002.abstract

  6. Dennis, L.A., Fisher, M., Webster, M., Bordini, R.H.: Model checking agent programming languages. Autom. Softw. Eng. 19(1), 5–63 (2012)

    Article  Google Scholar 

  7. Fisher, M., Dennis, L., Hepple, A.: Modular Multi-Agent Design. Technical report ULCS-09-002, Department of Computer Science, University of Liverpool (2009). http://www.csc.liv.ac.uk/research

  8. Fisher, M., Kakoudakis, T.: Flexible agent grouping in executable temporal logic. In: Proceedings of the 12th International Symposium on Languages for Intensional Programming (ISLIP). World Scientific Press (1999)

    Google Scholar 

  9. Hansson, H., Jonsson, B.: A logic for reasoning about time and reliability. Formal Aspects Comput. 6, 102–111 (1994)

    Article  MATH  Google Scholar 

  10. Hepple, A., Dennis, L., Fisher, M.: A common basis for agent organisation in BDI languages. In: Dastani, M., Fallah Seghrouchni, A., Leite, J., Torroni, P. (eds.) LADS 2007. LNCS (LNAI), vol. 5118, pp. 71–88. Springer, Heidelberg (2008). doi:10.1007/978-3-540-85058-8_5

    Chapter  Google Scholar 

  11. Holm, H., Sommestad, T., Ekstedt, M., Nordström, L.: CySeMol: a tool for cyber security analysis of enterpises. In: 22nd International Conference and Exhibition Electricity Distribution (CIRED 2013), pp. 1–4. IET (2013)

    Google Scholar 

  12. Kwiatkowska, M., Norman, G., Parker, D.: PRISM 4.0: verification of probabilistic real-time systems. In: Gopalakrishnan, G., Qadeer, S. (eds.) CAV 2011. LNCS, vol. 6806, pp. 585–591. Springer, Heidelberg (2011). doi:10.1007/978-3-642-22110-1_47

    Chapter  Google Scholar 

  13. Lam, I.-F., Chen, K.-T., Chen, L.-J.: Involuntary information leakage in social network services. In: Matsuura, K., Fujisaki, E. (eds.) IWSEC 2008. LNCS, vol. 5312, pp. 167–183. Springer, Heidelberg (2008). doi:10.1007/978-3-540-89598-5_11

    Chapter  Google Scholar 

  14. Lee, Y.C., Bishop, S., Okhravi, H., Rahimi, S.: Information leakage detection in distributed systems using software agents. In: Proceedings of the IEEE Symposium on Intelligent Agents, pp. 128–135 (2009)

    Google Scholar 

  15. Lu, X., Yu, Z., Guo, B., Zhou, X.: Predicting the content dissemination trends by repost behavior modeling in mobile social networks. J. Netw. Comput. Appl. 42, 197–207 (2014). http://www.sciencedirect.com/science/article/pii/S1084804514000599

    Article  Google Scholar 

  16. Padget, J., Elakehal, E.E., Satoh, K., Ishikawa, F.: On requirements representation and reasoning using answer set programming. In: 1st International Workshop on Artificial Intelligence for Requirements Engineering (AIRE 2014), Karlskrona, Sweden, pp. 35–42 (2014)

    Google Scholar 

  17. Padget, J.A., Satoh, K., Ishikawa, F.: A normative approach to exploring multi-agency privacy and transparency. In: Proceedings of the 7th International Workshop on Juris-informatics (JURISIN 2013), Yokohama, Japan, pp. 9–22 (2013)

    Google Scholar 

  18. Pieters, W., Padget, J., Dechesne, F., Dignum, V., Aldewereld, H.: Effectiveness of qualitative and quantitative security obligations. J. Inf. Secur. Appl. 22, 3–16 (2015). http://www.sciencedirect.com/science/article/pii/S2214212614000805. Special Issue on Security of Information and Networks

  19. PRISM: Probabilistic Symbolic Model Checker. http://www.prismmodelchecker.org. Accessed 31 May 2013

  20. Rao, A.S., Georgeff, M.P.: Modelling agents within a BDI-architecture. In: Proceedings of the International Conference on Principles of Knowledge Representation and Reasoning (KR). Morgan Kaufmann (1991)

    Google Scholar 

  21. Rao, A.S., Georgeff, M.P.: BDI agents: from theory to practice. In: Proceedings of the 1st International Conference on Multi-Agent Systems (ICMAS), pp. 312–319 (1995)

    Google Scholar 

  22. Seligman, J., Liu, F., Girard, P.: Facebook and the epistemic logic of friendship. In: Proceedings of the 14th Conference on Theoretical Aspects of Rationality and Knowledge (TARK) (2013). http://www.tark.org/proceedings/tark_jan7_13/p.229-seligman.pdf

  23. Sichman, J.S.: DEPINT: dependence-based coalition formation in an open multi-agent scenarios. J. Artif. Soc. Social Sim. 1(2) (1998)

    Google Scholar 

  24. Sichman, J.S., Conte, R., Demazeau, Y., Castelfranchi, C.: A Social Reasoning Mechanism Based on Dependence Networks, pp. 188–192. John Wiley and Sons (1994)

    Google Scholar 

  25. Slavkovik, M., Dennis, L., Fisher, M.: An abstract formal basis for digital crowds. Distrib. Parallel Databases 33(1), 3–31 (2015). http://dx.doi.org/10.1007/s10619-014-7161-y

    Article  Google Scholar 

  26. Stirling, C.: Modal and temporal logics. In: Handbook of Logic in Computer Science. Oxford University Press (1992)

    Google Scholar 

  27. Wooldridge, M., Jennings, N.R.: Intelligent agents: theory and practice. Knowl. Eng. Rev. 10(2), 115–152 (1995)

    Article  Google Scholar 

Download references

Acknowledgments

This work was partially funded through EPSRC Grants EP/L024845 (“Verifiable Autonomy”) and EP/N007565 (“Science of Sensor System Software”). The authors would also like to thank Dagstuhl for their facilities and hospitality, something that provided the impetus for this work.

Access to Data. The Prism models used in this work will are available in the University of Liverpool’s Data Catalogue at DOI:10.17638/datacat.liverpool.ac.uk/163.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Louise A. Dennis .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Dennis, L.A., Slavkovik, M., Fisher, M. (2017). “How Did They Know?”—Model-Checking for Analysis of Information Leakage in Social Networks. In: Cranefield, S., Mahmoud, S., Padget, J., Rocha, A. (eds) Coordination, Organizations, Institutions, and Norms in Agent Systems XII. COIN COIN 2016 2016. Lecture Notes in Computer Science(), vol 10315. Springer, Cham. https://doi.org/10.1007/978-3-319-66595-5_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-66595-5_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-66594-8

  • Online ISBN: 978-3-319-66595-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics