0% found this document useful (0 votes)
63 views26 pages

Security and Privacy in Social Networks

This document summarizes research on privacy and security in social networks. It discusses how details users provide and their social links can be used to infer additional private information. Three models for predicting private details are described: details only, links only, and average. The document also discusses how privacy can be preserved by selectively removing user details or social links from the data. Experimental results show that combining trust values with social links provides the most accurate access control predictions for photos and videos.

Uploaded by

Jeetendra Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views26 pages

Security and Privacy in Social Networks

This document summarizes research on privacy and security in social networks. It discusses how details users provide and their social links can be used to infer additional private information. Three models for predicting private details are described: details only, links only, and average. The document also discusses how privacy can be preserved by selectively removing user details or social links from the data. Experimental results show that combining trust values with social links provides the most accurate access control predictions for photos and videos.

Uploaded by

Jeetendra Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 26

UT DALLAS Erik Jonsson School of Engineering & Computer Science

Security and Privacy in


Social Networks
Raymond Heatherly
Data Security and Privacy Lab

FEARLESS engineering
Social Network Privacy
(Heatherly et al)

• Facebook currently has over 400 million users


• Each of these users specify details about
themselves
• For example:

FEARLESS engineering
So what?

• What about details they don’t specify?


• In our previous example, what political affiliation
does she have?
• What about her job?
• Two possible reasons:
– Forgot
– Don’t want people to know

FEARLESS engineering
Privacy

• But can we figure out anyways?


• For instance, is there anything our previous
example does state that talks about her job?
• An activity talks about ‘my classroom’

FEARLESS engineering
Learning

• Consider a social network as a graph, where the


vertices are the users in the network, and the
edges are friendship links between those users.
• Each node has a finite subset of detail types
(hometown, birthdate, groups, books, etc.)
• Each detail type has a finite number of detail values
(books = The Bible, Harry Potter, etc.)

FEARLESS engineering
Model Building

• We use these properties to construct three


different models:
– Details Only
– Links Only
– Average

FEARLESS engineering
Details Only

• Naïve Bayesian classifier (Detail


independence)
• Builds a raw model based on training data
over all details

FEARLESS engineering
Links Only

• Naïve Bayes based


• With changes
• Weigh friendships based on similarity

FEARLESS engineering
Average

• Calculate Link only and Details only


probabilities and average them

FEARLESS engineering
Collective Inference

• When we classify large graphs, the decisions


we make at one node transfer through the
graph
• CI gives us a series of algorithms to assist
with handling these transfers
– Local Classifier
– Relational Classifier
– CI Algorithm

FEARLESS engineering
Preserving Privacy

• What happens when data is released?


• In what ways can we decrease accuracy of
classifiers?
• We can add or remove links or details
• Consider what additions mean
• What about deletions?

FEARLESS engineering
Our experiments

• Performed on data gathered from the DFW


network on Facebook in the Spring of 2008
• Performing only link or detail deletions
• For Details, remove the best identifiers of any
classification globally
• For Links, remove links to those individuals most
like a person

FEARLESS engineering
Results

FEARLESS engineering
FEARLESS engineering
Access Control in Social Networks
(Carminati et al, 2009)

• What about access to resources?


• For example, photos: Who should control
viewers of a photo on Facebook?
• Now, on Facebook, the photo uploader has
control of the photo’s viewers
• A person in the picture can only untag

FEARLESS engineering
Parental rights over a minor

• What if a photo is of a minor child?


• How would a parent be able to (reliably) have
photos removed or restricted of their
children?
• What about limiting children’s access to
inappropriate videos over a social network?

FEARLESS engineering
Friendship Hierarchy

• Propose several generic classes of friends:


– Friend
– Co-Worker
– Family
• Some classes can have (user-defined) specific
sub-classes, such as a Best Friend, a Boss, a
Parent, a child, etc.

FEARLESS engineering
Project motivation

• What if we give all people tagged in a photo some


say in who can see photos of them?
• Additionally, parents of minor children can also
have a say in the permissions of photos of their
children
• Instead of a static access list, what about inferring
the authorizations using semantic reasoners?

FEARLESS engineering
Data Generation

• Facebook doesn’t give full set of its data to


researchers
• Needed to test efficacy of semantic solution
using a comparable size of data
• Generated 350 million `users’ with their own
security policies
• Simulated a scale-free network
• Generated Between 750,000 and 350 million
resources

FEARLESS engineering
Implementation challenges

• Initially, we attempted to do the reasoning on


the entire data set.
• SweetRules did not update in-memory model
of security policies, so gave incorrect
responces
• Pellet then crashed due to the amount of
memory required to perform inference on
data set

FEARLESS engineering
Partitioning

• We then decided to partition data


• But any single partition would be a cut that
would have edges to (at least) one other
partition
• These would decrease our accuracy
• Dynamic partitioning
– Owner
– Tagged individuals
– Requestor

FEARLESS engineering
Experiment 1

• Friendship types:
– Coworker
– Friend: with BestFriend sub-type
– Family: with Parent/Child sub-type
• Security policies:
– 1. Strict – Only BestFriends and Family can view
photos of self and any child; child may not view
any videos
– 2. Casual – Anyone can see photos; no restriction
on child
– 3. ParentStrict – Anyone can see photos of the
parent, only family can see photos of child;

FEARLESS engineering
Experiment 2

• Discard almost all Link Types


– Keep ParentOf/ChildOf
• Replace with a Trust value between 1 and 10

FEARLESS engineering
Experiment 3

• Used a hybrid approach


• Maintained all general and specific link types
• Each friendship also assigned a Trust Value
– i.e. A Best Friend with a TV of 6

FEARLESS engineering
Results

Average Low High


Link-Type only 0.585 0.562 0.611

Trust Value Only 0.612 0.534 0.598


Value/Trust Hybrid 0.731 0.643 0.811

• Time (in seconds) for each inference

FEARLESS engineering
Questions?

FEARLESS engineering

You might also like