UnFriendly: Multi-Party Privacy Risks in Social Networks Kurt Thomas, Chris Grier, David M. Nicol.

Slides:



Advertisements
Similar presentations
Facebook Current Status WallPhotosBoxesNameLogout View photos of NAME (5) Send NAME a message Poke Wall InfoPhotos What’s on your mind? Share Information.
Advertisements

UNDERSTANDING VISIBLE AND LATENT INTERACTIONS IN ONLINE SOCIAL NETWORK Presented by: Nisha Ranga Under guidance of : Prof. Augustin Chaintreau.
Tagging Systems Austin Wester. Tags A keywords linked to a resource (image, video, web page, blog, etc) by users without using a controlled vocabulary.
Tagging Systems Mustafa Kilavuz. Tags A tag is a keyword added to an internet resource (web page, image, video) by users without relying on a controlled.
Adjusting your Facebook Privacy Settings Privacy, please!
Privacy Issues with Social Networking Sites Ai Ho, Abdou Maiga, Esma Aïmeur Département d'informatique et de recherche opérationnelle Université de Montréal.
Facebook Name WallPhotosFlairBoxesJohn F. KennedyLogout View photos of JFK (5) Send a message Poke message Wall InfoPhotosBoxes Write something… Share.
UT DALLAS Erik Jonsson School of Engineering & Computer Science FEARLESS engineering Security and Privacy in Social Networks Raymond Heatherly Data Security.
10 Privacy Settings Every Facebook User Should Know.
You can customize your privacy settings. The privacy page gives you control over who can view your content. At most only your friends, their friends and.
Web Marketing Strategy DCU Sports Development Service.
Online Information Services and Social Media Social Networking.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
Modeling Relationship Strength in Online Social Networks Rongjing Xiang: Purdue University Jennifer Neville: Purdue University Monica Rogati: LinkedIn.
Introduction to Facebook. Introduction In this workshop, we will: –Walk you through creating a Facebook account –Describe Facebook’s layout –Show you.
Tippecanoe 4-H Computer Project Mikel BergerBret Madsen Ed Evans
Pitfalls and Mistakes. Agenda Who We Are Social Media Today Pitfalls and Mistakes –Policies –Poor Decisions Online Reputation Accepting Random People.
Illinois Security Lab Privacy Sensitive Location Information Systems in Smart Buildings Jodie P. Boyer, Kaijun Tan, Carl A. Gunter Midwest Security Workshop,
Feedback Effects between Similarity and Social Influence in Online Communities David Crandall, Dan Cosley, Daniel Huttenlocher, Jon Kleinberg, Siddharth.
© Kaaren Thompson all rights reserved By Kaaren Thompson.
Social Media 101 An Overview of Social Media Basics.
A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks S. Creese, M. Goldsmith, J. Nurse, E.
Panther Forum Activity Week 9. Things to remember when you are using social media to communicate with others.
INSERT CHARACTER’S NAME Facebook Project YOUR NAME.
Facebook Project. facebook Friends Requests MessagesNotificationsSearchName of CharacterHome Photos JOB RELATIONSHIP STATUS CURRENT RESIDENCE BIRTHDAY.
Facebook Status: WallPhotosName: ___________Logout View photos of _______ (5) Send ______ a message Poke message Wall InfoPhotos Write something… Share.
Facebook (insert name) enter a status update Student Names:Insert person’s nameLogout View photos of View photos of (insert name) Send (insert name) a.
Facebook [NAME] is preparing to [ ] WallPhotosFlairBoxes[NAME]Logout View photos of [NAME] (5) Send [NAME] a message Poke message Wall PhotosBoxes Write.
Place Profile Picture Here facebook Name of Mathematician current status WallPhotosFlairBoxes Name of Mathematician Logout View photos of “Mathematician”
Facebook (Your Person’s name goes here) is… WallPhotosFlairPages Your Person’s Name goes here Logout View photos of (PERSON) (5) Send (PERSON) a message.
Fakebook NAME of person is write their new status here………. WallPhotosFlairBoxesPerson’s Name HereLogout View photos of _______ (# of pics) Send _______.
Facebook Edgar Allan Poe WallPhotosFlairBoxesEdgar Allan PoeLogout View photos of Edgar Allan Poe (#) Send EAP a message Poke Wall InfoPhotosBoxes Write.
Privacy Issues on The Internet. Login if you want everyone to see your private life * * * * *
Social Media: The Basics Teresa Marks School Community Oral Health Conference Friday, October 16, 2015.
Facebook for Beginners One Session Class. What will you learn today? What can you do on Facebook? Creating a profile Privacy Connecting with friends Sending.
Facebook NAME statusupdate WallPhotosFlairBoxesNAMELogout View photos of () Send a message Poke message Wall InfoPhotosBoxes Write something… Share Information.
Personal Information fakebook Profile Name status Profile NAMELogout Send _____ a message Poke message Wall Info Basic Information Photos Activities: Interests:
Facebook Status WallPhotosFlairBoxesNameLogout View photos of name (5) Send name a message Poke message Wall InfoPhotosBoxes Write something… Share Information.
Facebook EVENT as a status WallPhotosFlairBoxesPresidentLogout View photos of President (5) Send President a message Poke message Wall InfoPhotosBoxes.
Healthy Media Boundaries
Facebook WallPhotosFlairBoxesJohn F. KennedyLogout Poke message Wall InfoPhotosBoxes Write something… Share Information Networks: Birthday: Political:
Facebook Celebrity is (status) WallPhotosCelebrityLogout View photos of Celebrity (#) Send Celebrity a message Poke message Wall InfoPhotos Write something…
Facebook ENTER NAME HERE WallPhotosNotesEnter Name HereLogout View photos of ENTER NAME HERE (5) Send ENTER NAME a message Poke message Wall InfoPhotosNotes.
Facebook WallPhotosFlairBoxesLogout View photos of (5) Send a message Poke message Wall InfoPhotosBoxes Write something… Share Information Networks: Birthday:
Facebook _____________________ ______________________________________________________________ ______________________________________________________________.
Security and Privacy in Social Networks
Shavonne Henry, Nikia Clarke, David Heymann, Brandon Knight
Status: ______________________________________________________
facebook Wall Photos Flair Boxes Character Name Logout Wall Info
facebook Wall Photos Flair Boxes Logout Wall Info Photos Boxes
____________________________________________________
Security and Privacy in Social Networks
facebook Bob Smith is …. Wall Photos Flair Boxes John F. Kennedy
facebook Name Wall Photos Flair Boxes Logout Wall Info Photos Boxes
Insert picture here facebook Researched Person Wall Photos Name Logout
facebook Wall Info Photos Logout Wall Info Photos Write something…
____________________________________________________
facebook Wall Photos Logout Wall Info Photos Write something… Share
Write an advertisement for your sponsored product here…
Place picture here facebook NAME Wall Photos Flair Boxes Logout Wall
Write an advertisement for your sponsored product here…
Security and Privacy in Social Networks
_______________is ___________________________________
mathematician is (status)
facebook _____ is… Wall Photos Flair Boxes _____ Logout _____:
facebook HG Wells is… Wall Photos Flair Boxes HG Wells Logout
WHAT IS THE DIFFERENCE BETWEEN THE FACEBOOK NEWSFEED AND THE TIMELINE
Online Safety; Privacy and Sharing
Online Safety; Privacy and Sharing
Presentation transcript:

unFriendly: Multi-Party Privacy Risks in Social Networks Kurt Thomas, Chris Grier, David M. Nicol

Problem Social networks propelled by personal content – Upload stories, photos; disclose relationships – Access control limited to owners Content can reference multiple parties – Distinct privacy requirements for each party – Currently, only one policy enforced Friends, family inadvertently leak sensitive information 2

Consequences One photo or message leaked may be harmless.. – Aggregate stories, friends, photos form a composite Can infer personal data from these public references – Weighted by perceived importance of relationships In practice, can predict personal attributes with up to 83% accuracy – Directly tied to amount, richness of exposed data – Independent of existing privacy controls 3

Solution Adapt privacy controls: – Grant users control over all personal references, regardless where it appears – Includes tags, mentions, links – Allow users to specify global privacy settings Prototype solution as a Facebook application – Satisfies privacy requirements of all users referenced – Determines mutually acceptable audience; restricts access to everyone else 4

Overview Existing privacy controls Sources of conflicting requirements Inferring personal details from leaks Inference performance Devising a solution Conclusion 5

Existing Controls EveryoneFriends of Friends Only Friends Friend List  Wall Posts  Personal Details  Photos, Videos  6

Privacy Conflict Social networks recognize only one owner – But data can pertain to multiple users – Each user has potentially distinct privacy requirement Privacy Conflict: – When two or more users disagree on data’s audience – Results in data exposed against a user’s will 7

Privacy Conflict – Friendships Privacy Requirement: Hide sensitive relationships Privacy Conflict: Alice reveals her friends Link between Alice-Bob revealed by Alice 8

Privacy Conflict – Wall Posts Privacy Requirement: Control audience of post Privacy Conflict: Anything posted to Alice’s wall is public Content written by Bob exposed by Alice 9 Bob > Alice: Just broke up with Carol..

Privacy Conflict – Tagging Privacy Requirement: Hide sensitive posts Privacy Conflict: Alice shares her posts Details about Bob exposed by Alice 10 Alice: Skipping work

Aggregating Leaked Data Threat model: – Adversary crawls entire social network – Collects all public references to a user; messages, friendships, tagged content – Feasible for search engines, marketers, political groups Exposure Set – All public information in conflict with a user’s privacy requirement 11

Inferring Personal Details Given exposure set, analyze whether leaks create an accurate composite of user Attempt to predict 8 values from exposure set: – Personal: Gender, religion, political view, relation status – Media: Favorite books, TV shows, movies, music Compare predictions to scenario where no privacy conflict exists 12

Inference Approaches Friendships: – Base predictions on attributes of friends – Users with liberal, Catholic friends who like Twilight tend to be… – Weight relationships on perceived importance; distinguish strong friends from acquaintances Frequency of communication Mutual friends; community – Feed vector of attributes, weights into multinomial logistic regression 13

Inference Approaches Wall Content: – Base prediction on content written by private user, posted to public walls – A user who talks about sports, girlfriends, and cars tends to be … – Treat content as bag of words, weight terms based on TF-IDF – Feed vector of words into multinomial logistic regression 14

Experiment Setup Analyze inference accuracy on 80,000 Facebook profiles – 40,000 profiles from 2 distinct networks – Collect all references to a user appearing in public profiles, walls, friend lists Simulate private profiles – Used values reported in public profile as ground truth – Compare prediction against ground truth 15

Frequency Data is Exposed 16 StatisticNetwork ANetwork B Profiles in data set42,79640,544 Fraction of profiles public44%35% Avg. # relationships per profile in exposure set 4223 Avg. # wall posts per profile in exposure set 5343

Prediction Accuracy 17

More Conflicts, Better Accuracy 18

Improving Privacy Privacy must extend beyond single-owner model – Tags, links, mentions can reference multiple users – Rely on these existing features to distinguish who is at risk Allow each user to specify global privacy policy Enforce policy on all personal content, regardless page it appears 19

Enforcing Multi-Party Privacy 20 Alice: Looks are done for! Individual PoliciesU1U2U3U4U5U6 Alice  Bob  Carol  Mutual Policy 

Limitations In absence of mutual friends, safe set of viewers tends towards empty set Assume friends will consent to not sharing with wider audience Content must be tagged; no other way to distinguish privacy-affected parties Censorship; prevents negative speech 21

Conclusion Privacy goes beyond one person’s expectations – All parties affected must have a say – Existing model lacks multi-party support References to other users are common – Outside their control Aggregate exposed data contains sensitive features – Predictions will only get better By adopting multi-party privacy, can return control back to users 22

Questions? 23

Correlated Features Among Friends 24

Importance of Mutual Friends 25

Importance of Frequent Communication 26