To Join or Not to Join: The Illusion of Privacy in social Networks with Mixed Public and Private User Profiles Paper by Elena Zhelea and Lise Getoor.

Slides:



Advertisements
Similar presentations
A NEW LOOK AT FACEBOOK!. What you can do with facebook: What you can do with facebook: o o You can see where old friends have gone o o Students can make.
Advertisements

+ Multi-label Classification using Adaptive Neighborhoods Tanwistha Saha, Huzefa Rangwala and Carlotta Domeniconi Department of Computer Science George.
DE-DC-MD ASFAA November 8,  Why use social networking?  How to use social networking ◦ Introduction to Facebook and Twitter  Watching for trends.
E-safety EXPOSURE TO INAPPROPRIATE MATERIAL HARASSMENT AND BULLYING PERSONAL INFORMATION AND PRIVACY PHYSICAL DANGER UNWANTED ADVERTISING FINANCIAL RISKS.
Presenter: Nguyen Ba Anh HCMC University of Technology Information System Security Course.
UnFriendly: Multi-Party Privacy Risks in Social Networks Kurt Thomas, Chris Grier, David M. Nicol.
Modeling Relationship Strength in Online Social Networks Rongjian Xiang 1, Jennifer Neville 1, Monica Rogati 2 1 Purdue University, 2 LinkedIn WWW 2010.
SOCIAL MEDIA | JULIET DAVIS Self-Promotion. Do Job Boards Work? 13.2% of jobs are found through job boards (many of which are low level) Less than 1%
Students’ online profiles for employability and community Frances Chetwynd, Karen Kear, Helen Jefferis and John Woodthorpe The Open University.
Helpful Guide for Members IMFFA Social Community 1.
Marios Iliofotou (UC Riverside) Brian Gallagher (LLNL)Tina Eliassi-Rad (Rutgers University) Guowu Xi (UC Riverside)Michalis Faloutsos (UC Riverside) ACM.
Adjusting your Facebook Privacy Settings Privacy, please!
To Join or Not to Join: The Illusion of Privacy in Social Networks with Mixed Public and Private User Profiles By Elena Zheleva, Lise Getoor Presented.
Miscreant of Social Networks Paper1: Social Honeypots, Making Friends With A Spammer Near You Paper2: Social phishing Kai and Isaac.
To Join or Not join: The Illusion of Privacy in Social Networks with Mixed Public and Private User Profiles May 20 Offense.
Top 5 Facebook Tips Mark Smith Rosemary Turner. What is Facebook? Users create a personalised profile for themselves and then add people as friends to.
10 Privacy Settings Every Facebook User Should Know.
NETWORKING Networking could be Social, Computer, Professional etc.
Using Friendship Ties and Family Circles for Link Prediction Elena Zheleva, Lise Getoor, Jennifer Golbeck, Ugur Kuter (SNAKDD 2008)
Social Networking and On-Line Communities: Classification and Research Trends Maria Ioannidou, Eugenia Raptotasiou, Ioannis Anagnostopoulos.
“Social Networking Services: Tribute to Fashion or Vital Necessity?” Tchirkina Victoria.
Online Social Networking. Agenda Survey Results What is Online Social Networking? Popular Online Social Networking Sites Privacy Settings for Facebook.
Modeling Relationship Strength in Online Social Networks Rongjing Xiang: Purdue University Jennifer Neville: Purdue University Monica Rogati: LinkedIn.
Pattern Recognition & Machine Learning Debrup Chakraborty
C HAPTER Social Networking Using Facebook: Advanced Techniques 3 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall.
Web 2.0 Social Bookmarking and Start Pages in the Classroom Sally Todd, St John’s School Library, April 2009.
Using Transactional Information to Predict Link Strength in Online Social Networks Indika Kahanda and Jennifer Neville Purdue University.
PRIVACY PRESERVING SOCIAL NETWORKING THROUGH DECENTRALIZATION AUTHORS: L.A. CUTILLO, REFIK MOLVA, THORSTEN STRUFE INSTRUCTOR DR. MOHAMMAD ASHIQUR RAHMAN.
Website Workshop Emma Castro, Contents Questionnaire Results Handouts New Ideas.
Protecting Sensitive Labels in Social Network Data Anonymization.
Refined privacy models
Face your Facebook Fears Take control of your profile privacy settings and use Facebook to communicate with students MOACAC Conference, 4/12/11 Presenters:
The Matrix: Using Intermediate Features to Classify and Predict Friends in a Social Network Michael Matczynski Status Report April 14, 2006.
A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks S. Creese, M. Goldsmith, J. Nurse, E.
Preventing Private Information Inference Attacks on Social Networks.
Final Major Project Feedback. How I got feedback: I showed my FMP to a focused audience group I created a questionnaire on Google docs which included.
Date: 2015/11/19 Author: Reza Zafarani, Huan Liu Source: CIKM '15
Educational Networks What are they and why are they important?
Keeping Children Safe Online. Where to report abuse? To report any abuse on social media or internet: CEOP will accept reports from parents, teachers.
Facebook for Beginners One Session Class. What will you learn today? What can you do on Facebook? Creating a profile Privacy Connecting with friends Sending.
Design 11 Mr. Jean September 24 th, The plan: Video clip of the day Introduction to Design Communication Company Logos Company logos after tough.
Dominique Renault. > Groups Groups - A group can be set up by any user and can be set to private. These are generally used by smaller groups of people.
YRAB Meeting  Ana: Adolescent Medicine Physician and Researcher  Interested in how to help teens who need help with depression get the care.
KS2 E-Safety assembly How to be smart and keep safe online.
Write something... Delete box add photo Name here Delete box add photo Name here Friends (94) Name Here Wall Info Photos Notes Friends Home Profile Find.
Uncovering Social Spammers: Social Honeypots + Machine Learning
Social Media Dominique Renault.
SocialMix: Supporting Privacy-aware Trusted Social Networking Services
9/19/2018 Social Networks 9/19/2018.
Digital Footprint Sama Salehi Block 2.
Insert a famous quote or fun fact here
Using Friendship Ties and Family Circles for Link Prediction
BRAIN PART status update
facebook Bob Smith is …. Wall Photos Flair Boxes John F. Kennedy
MIT What sparks your interest in this subject?
Sr. Manager, Global Talent Acquisition
Insert a famous quote or fun fact here
Tips for Job Seekers Using Facebook
Insert picture here facebook Researched Person Wall Photos Name Logout
PROFILE NAME is (replace with status)
facebook Wall Info Photos Logout Wall Info Photos Write something…
facebook Wall Photos Logout Wall Info Photos Write something… Share
facebook Wall Photos Name of Explorer Here Logout is… Wall Info Photos
Privacy Protection for Social Network Services
PROFILE NAME is (replace with status)
facebook Katie Feldman Working with this template:
How to Set up Privacy Functions
mathematician is (status)
Type the name of character here
Refined privacy models
Presentation transcript:

To Join or Not to Join: The Illusion of Privacy in social Networks with Mixed Public and Private User Profiles Paper by Elena Zhelea and Lise Getoor

Introduction What do we want to find out about a “Private” profile? –S–Sensitive information What Is Sensitive information ? –W–What advertizing agencies and companies want to know –W–What you do not want others to find out

How can we find out private information? If a profile is really private how can you find out something? –What if it was not facebook? A completely anonymous profile? –Utilize what pubic info you have. Using tactics that exploit friendship links Exploiting group affiliations –Neither Facebook nor Flikr hide group members.

BASIC model Guess sensitive attribute based on distribution of known attributes. ? ? ? ? ? ? Ana Gia Fabio Emma Chris Bob Don Sensitive Info =Favorite Colors Orange Blue Green

Sensitive-Attribute Inference Models We assume the overall distribution of the sensitive attribute is either known or it can be found using public profiles. We will consider the BASIC distribution to be the baseline attack. A successful attack is one that with extra knowledge, has significantly higher accuracy.

Our Model ? ? ? ? ? ? Ana Gia Fabio Emma Chris Bob Don ? ? Bob ? ? Gia Fabio True Blue Lovers ? ? Bob Emma Chris Don Espresso lovers Sensitive Info = Favorite Color Orange Blue Green

“Tell me who your friends are, and I’ll tell you who are you” Link based Attacks Friend-aggregate model (AGG) Collective Classification model (CC) Flat-link model (LINK)

Friend-aggregate model (AGG) ? ? ? ? ? ? Ana Gia Fabio Emma Chris Bob Don Given my friends, what am I most likely? Public-Sensitive attributes/Total Links

Collective Classification model (CC) AGG, With re-evaluation ? ? ? ? ? ? Ana Gia Fabio Emma Chris Bob Don

Flat-link model (LINK) ? ? ? ? ? ? Ana Gia Fabio Emma Chris Bob Don Flatten the data by considering adjacency matrix of the graph. CLASSIFICATION!!! AnaBobChrisDonEmmaFabioGiacolor Ana ? Bob ? Chris Orange Don Green Emma Orange Fabio Blue Gia ?

Group Based Attacks Groupmate-link model (CLIQUE) –Considers all people in a group as friends Group-based classification model (GROUP) –Considers each group as a feature in a classifier

Groupmate-link model (CLIQUE) ? ? Bob ? ? Gia Fabio ? ? Bob Emma Chris Don Espresso loversTrue Blue Lovers Consider everyone in a group, a friend Then flatten to adjacency matrix Use previous LINK methods after AnaBobChrisDonEmmaFabioGiacolor Ana ? Bob ? Chris Orange Don Green Emma Orange Fabio Blue Gia ?

Group-based classification model (GROUP) ? ? Bob ? ? Gia Fabio ? ? Bob Emma Chris Don Espresso Lovers Use groups as a feature set –Prune away less useful groups Homogeneity = Entropy (h) Size, smaller groups might be better. True Blue Lovers Espresso LoversColor Ana00? Bob11? Chris01Orange Don01Green Emma01Orange Fabio10Blue Gia10?

LINK-GROUP Use friends and groups as features and then use traditional classifier AnaBobChrisDonEmm a FabioGiaTrue Blue Espre sso Color Ana ? Bob ? Chris Orang e Don Green Emm a Orang e Fabio Blue Gia ?

Using Both –Groups and Links LINK-GROUP –Uses the links and groups as features in a classifier model

Facebook Data Link based attacks –AGG, CC, BLOCK similar to baseline –LINK’s accuracy varied between 65.3% and 73.5% Group based Attacks –73.4% success in determining gender Mixed-Model – 72.5%, no improvement, 57.8% or 1% better than BASIC on political views

How good is this paper? How good is their attack methods? We can attack in more ways –Using image recognition –Using the names of people and “googling” Also applies to doing the same to their friends –Search for key words in wall posts