Sharing-habits based privacy control in social networks

Silvie Levy, Ehud Gudes, Nurit Gal Oz

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

We study users behavior in online social networks (OSN) as a means to preserve privacy. People widely use OSN for a variety of objectives and fields. Each OSN has different characteristics, requirements, and vulnerabilities of the private data shared. Sharing-habits refers to users’ patterns of sharing information. These sharing-habits implied by the communication between users and their peers hides a lot of additional private information. Most users are not aware that the sensitive private information they share might leak to unauthorized users. We use several different well-known strategies from graph flows, and the sharinghabits of information flow among OSN users to define efficient and easy to implement algorithms for ensuring privacy preservation with a predefined privacy level.

Original languageEnglish
Title of host publicationData and Applications Security and Privacy - 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Proceedings
EditorsSilvio Ranise, Vipin Swarup
PublisherSpringer Verlag
Pages217-232
Number of pages16
ISBN (Print)9783319414829
DOIs
StatePublished - 1 Jan 2016
Externally publishedYes
Event30th IFIP WG 11.3 Conference on Data and Applications Security, DBSec 2016 - Trento, Italy
Duration: 18 Jul 201620 Jul 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9766
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference30th IFIP WG 11.3 Conference on Data and Applications Security, DBSec 2016
Country/TerritoryItaly
CityTrento
Period18/07/1620/07/16

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Sharing-habits based privacy control in social networks'. Together they form a unique fingerprint.

Cite this