UT DALLAS Erik Jonsson School of Engineering & Computer Science FEARLESS engineering Security and Privacy in Social Networks Raymond Heatherly Data Security.

Slides:



Advertisements
Similar presentations
Naïve Bayes. Bayesian Reasoning Bayesian reasoning provides a probabilistic approach to inference. It is based on the assumption that the quantities of.
Advertisements

Resource Management §A resource can be a logical, such as a shared file, or physical, such as a CPU (a node of the distributed system). One of the functions.
Approximation, Chance and Networks Lecture Notes BISS 2005, Bertinoro March Alessandro Panconesi University La Sapienza of Rome.
Decision Tree.
UnFriendly: Multi-Party Privacy Risks in Social Networks Kurt Thomas, Chris Grier, David M. Nicol.
Bring Order to Your Photos: Event-Driven Classification of Flickr Images Based on Social Knowledge Date: 2011/11/21 Source: Claudiu S. Firan (CIKM’10)
E-Safety Support e-Safety Presentation D Flynn and L Findon.
Georgia Institute of Technology Workshop for CS-AP Teachers Chapter 3 Advanced Object-Oriented Concepts.
Funding Networks Abdullah Sevincer University of Nevada, Reno Department of Computer Science & Engineering.
Web as Graph – Empirical Studies The Structure and Dynamics of Networks.
Lecture 5 (Classification with Decision Trees)
A Decision Support System For Civil Protection Prof. Thanasis Ziliaskopoulos University of Thessaly Hellenic Institute of Transport International Conference.
B + -Trees (Part 1). Motivation AVL tree with N nodes is an excellent data structure for searching, indexing, etc. –The Big-Oh analysis shows most operations.
Working group discussion 1 Cyber Risk Security, Privacy ?
Memoplex Browser: Searching and Browsing in Semantic Networks CPSC 533C - Project Update Yoel Lanir.
Online Stacked Graphical Learning Zhenzhen Kou +, Vitor R. Carvalho *, and William W. Cohen + Machine Learning Department + / Language Technologies Institute.
UT DALLAS Erik Jonsson School of Engineering & Computer Science FEARLESS engineering Secure Data Storage and Retrieval in the Cloud Bhavani Thuraisingham,
Judgment and Decision Making in Information Systems Computing with Influence Diagrams and the PathFinder Project Yuval Shahar, M.D., Ph.D.
Created by Amber Craddock, Kylee Stone & Caleb Truette.
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
Managing Large RDF Graphs (Infinite Graph) Vaibhav Khadilkar Department of Computer Science, The University of Texas at Dallas FEARLESS engineering.
Distributed Networks & Systems Lab. Introduction Collaborative filtering Characteristics and challenges Memory-based CF Model-based CF Hybrid CF Recent.
Bayesian Networks. Male brain wiring Female brain wiring.
Aegis: A Semantic Implementation of Privacy as Contextual Integrity in Social Ecosystems Imrul Kayes, Adriana Iamnitchi.
Learning Structure in Bayes Nets (Typically also learn CPTs here) Given the set of random variables (features), the space of all possible networks.
Using Transactional Information to Predict Link Strength in Online Social Networks Indika Kahanda and Jennifer Neville Purdue University.
1 Data Mining Lecture 3: Decision Trees. 2 Classification: Definition l Given a collection of records (training set ) –Each record contains a set of attributes,
Wherefore Art Thou R3579X? Anonymized Social Networks, Hidden Patterns, and Structural Stenography.
B-Trees. CSM B-Trees 2 Motivation for B-Trees So far we have assumed that we can store an entire data structure in main memory What if we have so.
Graph Data Management Lab, School of Computer Science Add title here: Large graph processing
1 N -Queens via Relaxation Labeling Ilana Koreh ( ) Luba Rashkovsky ( )
Illinois Security Lab Privacy Sensitive Location Information Systems in Smart Buildings Jodie P. Boyer, Kaijun Tan, Carl A. Gunter Midwest Security Workshop,
Steve Allen Marc Greco Michael Dennis. 
Lecture # 3 & 4 Chapter # 2 Database System Concepts and Architecture Muhammad Emran Database Systems 1.
The Matrix: Using Intermediate Features to Classify and Predict Friends in a Social Network Michael Matczynski Status Report April 14, 2006.
UT DALLAS Erik Jonsson School of Engineering & Computer Science FEARLESS engineering Analyzing and Securing Social Media Security and Privacy in Online.
B-Trees. Motivation for B-Trees So far we have assumed that we can store an entire data structure in main memory What if we have so much data that it.
Survey Propagation. Outline Survey Propagation: an algorithm for satisfiability 1 – Warning Propagation – Belief Propagation – Survey Propagation Survey.
Relationship-based Access Control for Online Social Networks: Beyond User-to-User Relationships Sep. 3, 2012 PASSAT 2012, Amsterdam, The Netherlands Yuan.
UT DALLAS Erik Jonsson School of Engineering & Computer Science FEARLESS engineering Integrity Policies Murat Kantarcioglu.
Preventing Private Information Inference Attacks on Social Networks.
Slides for “Data Mining” by I. H. Witten and E. Frank.
CHAPTER 8 DISCRIMINATIVE CLASSIFIERS HIDDEN MARKOV MODELS.
Rotem Golan Department of Computer Science Ben-Gurion University of the Negev, Israel.
Lecture Notes for Chapter 4 Introduction to Data Mining
CS 590 Term Project Epidemic model on Facebook
Hybrid Intelligent Systems for Network Security Lane Thames Georgia Institute of Technology Savannah, GA
Speaker : Yu-Hui Chen Authors : Dinuka A. Soysa, Denis Guangyin Chen, Oscar C. Au, and Amine Bermak From : 2013 IEEE Symposium on Computational Intelligence.
Using Bayesian Networks to Predict Plankton Production from Satellite Data By: Rob Curtis, Richard Fenn, Damon Oberholster Supervisors: Anet Potgieter,
Privacy Preserving in Social Network Based System PRENTER: YI LIANG.
Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas Cyber Security Research on Engineering Solutions Dr. Bhavani.
Don’t Follow me : Spam Detection in Twitter January 12, 2011 In-seok An SNU Internet Database Lab. Alex Hai Wang The Pensylvania State University International.
Computational methods for inferring cellular networks II Stat 877 Apr 17 th, 2014 Sushmita Roy.
BAYESIAN LEARNING. 2 Bayesian Classifiers Bayesian classifiers are statistical classifiers, and are based on Bayes theorem They can calculate the probability.
Ontology Engineering and Feature Construction for Predicting Friendship Links in the Live Journal Social Network Author:Vikas Bahirwani 、 Doina Caragea.
What Parents Should Know About Social Networking.
More Access – Less Control Access Control in the Web 2.0 Michael Hart, Rob Johnson, Amanda Stent Stony Brook University.
Security and Privacy in Social Networks
Module 7: Managing Access to Objects in Organizational Units
Dealing With Social Media
J.N GRAY R.A LORIE IBM RESEARCH LAB, SAN JOSE, CALIFORNIA
Providing Secure Storage on the Internet
Security and Privacy in Social Networks
PROJECTS SUMMARY PRESNETED BY HARISH KUMAR JANUARY 10,2018.
Graph-based Security and Privacy Analytics via Collective Classification with Joint Weight Learning and Propagation Binghui Wang, Jinyuan Jia, and Neil.
Facebook Group Page Parent Agreement
Security and Privacy in Social Networks
B-Trees.
Notes from 02_CAINE conference
Hazelwood Schools Wednesday 2nd October 2019.
Presentation transcript:

UT DALLAS Erik Jonsson School of Engineering & Computer Science FEARLESS engineering Security and Privacy in Social Networks Raymond Heatherly Data Security and Privacy Lab

FEARLESS engineering Social Network Privacy (Heatherly et al) Facebook currently has over 400 million users Each of these users specify details about themselves For example:

FEARLESS engineering So what? What about details they don’t specify? In our previous example, what political affiliation does she have? What about her job? Two possible reasons: –Forgot –Don’t want people to know

FEARLESS engineering Privacy But can we figure out anyways? For instance, is there anything our previous example does state that talks about her job? An activity talks about ‘my classroom’

FEARLESS engineering Learning Consider a social network as a graph, where the vertices are the users in the network, and the edges are friendship links between those users. Each node has a finite subset of detail types (hometown, birthdate, groups, books, etc.) Each detail type has a finite number of detail values (books = The Bible, Harry Potter, etc.)

FEARLESS engineering Model Building We use these properties to construct three different models: –Details Only –Links Only –Average

FEARLESS engineering Details Only Naïve Bayesian classifier (Detail independence) Builds a raw model based on training data over all details

FEARLESS engineering Links Only Naïve Bayes based With changes Weigh friendships based on similarity

FEARLESS engineering Average Calculate Link only and Details only probabilities and average them

FEARLESS engineering Collective Inference When we classify large graphs, the decisions we make at one node transfer through the graph CI gives us a series of algorithms to assist with handling these transfers –Local Classifier –Relational Classifier –CI Algorithm

FEARLESS engineering Preserving Privacy What happens when data is released? In what ways can we decrease accuracy of classifiers? We can add or remove links or details Consider what additions mean What about deletions?

FEARLESS engineering Our experiments Performed on data gathered from the DFW network on Facebook in the Spring of 2008 Performing only link or detail deletions For Details, remove the best identifiers of any classification globally For Links, remove links to those individuals most like a person

FEARLESS engineering Results

FEARLESS engineering

Access Control in Social Networks (Carminati et al, 2009) What about access to resources? For example, photos: Who should control viewers of a photo on Facebook? Now, on Facebook, the photo uploader has control of the photo’s viewers A person in the picture can only untag

FEARLESS engineering Parental rights over a minor What if a photo is of a minor child? How would a parent be able to (reliably) have photos removed or restricted of their children? What about limiting children’s access to inappropriate videos over a social network?

FEARLESS engineering Friendship Hierarchy Propose several generic classes of friends: –Friend –Co-Worker –Family Some classes can have (user-defined) specific sub-classes, such as a Best Friend, a Boss, a Parent, a child, etc.

FEARLESS engineering Project motivation What if we give all people tagged in a photo some say in who can see photos of them? Additionally, parents of minor children can also have a say in the permissions of photos of their children Instead of a static access list, what about inferring the authorizations using semantic reasoners?

FEARLESS engineering Data Generation Facebook doesn’t give full set of its data to researchers Needed to test efficacy of semantic solution using a comparable size of data Generated 350 million `users’ with their own security policies Simulated a scale-free network Generated Between 750,000 and 350 million resources

FEARLESS engineering Implementation challenges Initially, we attempted to do the reasoning on the entire data set. SweetRules did not update in-memory model of security policies, so gave incorrect responces Pellet then crashed due to the amount of memory required to perform inference on data set

FEARLESS engineering Partitioning We then decided to partition data But any single partition would be a cut that would have edges to (at least) one other partition These would decrease our accuracy Dynamic partitioning –Owner –Tagged individuals –Requestor

FEARLESS engineering Experiment 1 Friendship types: –Coworker –Friend: with BestFriend sub-type –Family: with Parent/Child sub-type Security policies: –1. Strict – Only BestFriends and Family can view photos of self and any child; child may not view any videos –2. Casual – Anyone can see photos; no restriction on child –3. ParentStrict – Anyone can see photos of the parent, only family can see photos of child;

FEARLESS engineering Experiment 2 Discard almost all Link Types –Keep ParentOf/ChildOf Replace with a Trust value between 1 and 10

FEARLESS engineering Experiment 3 Used a hybrid approach Maintained all general and specific link types Each friendship also assigned a Trust Value –i.e. A Best Friend with a TV of 6

FEARLESS engineering Results Time (in seconds) for each inference AverageLowHigh Link-Type only Trust Value Only Value/Trust Hybrid

FEARLESS engineering Questions?