Resolving Multi-Party Privacy Conflicts in Social Media

被引:70
|
作者
Such, Jose M. [1 ]
Criado, Natalia [2 ]
机构
[1] Univ Lancaster, Sch Comp & Commun, Secur Lancaster, Lancaster LA1 4WA, England
[2] Kings Coll London, Dept Informat, London WC2R 2LS, England
关键词
Social media; privacy; conflicts; multi-party privacy; social networking services; online social networks; ACCESS-CONTROL;
D O I
10.1109/TKDE.2016.2539165
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Items shared through Social Media may affect more than one user's privacy-e.g., photos that depict multiple users, comments that mention multiple users, events in which multiple users are invited, etc. The lack of multi-party privacy management support in current mainstream Social Media infrastructures makes users unable to appropriately control to whom these items are actually shared or not. Computational mechanisms that are able to merge the privacy preferences of multiple users into a single policy for an item can help solve this problem. However, merging multiple users' privacy preferences is not an easy task, because privacy preferences may conflict, so methods to resolve conflicts are needed. Moreover, these methods need to consider how users' would actually reach an agreement about a solution to the conflict in order to propose solutions that can be acceptable by all of the users affected by the item to be shared. Current approaches are either too demanding or only consider fixed ways of aggregating privacy preferences. In this paper, we propose the first computational mechanism to resolve conflicts for multi-party privacy management in Social Media that is able to adapt to different situations by modelling the concessions that users make to reach a solution to the conflicts. We also present results of a user study in which our proposed mechanism outperformed other existing approaches in terms of how many times each approach matched users' behaviour.
引用
收藏
页码:1851 / 1863
页数:13
相关论文
共 50 条
  • [31] Privacy-Preserving Query Processing by Multi-Party Computation
    Sepehri, Maryam
    Cimato, Stelvio
    Damiani, Ernesto
    COMPUTER JOURNAL, 2015, 58 (10): : 2195 - 2212
  • [32] Social Signals of Cohesion in Multi-party Interactions
    Kantharaju, Reshmashree B.
    Pelachaud, Catherine
    PROCEEDINGS OF THE 21ST ACM INTERNATIONAL CONFERENCE ON INTELLIGENT VIRTUAL AGENTS (IVA), 2021, : 9 - 16
  • [33] Value Knowledge Management for Multi-party Conflicts: An Example of Process Structuring
    Hassan, Shahidul
    Rohrbaugh, John
    KNOWLEDGE DISCOVERY, KNOWLEDGE ENGINEERING AND KNOWLEDGE MANAGEMENT, 2011, 128 : 390 - 398
  • [34] Privacy sensitive distributed data mining from multi-party data
    Kargupta, H
    Liu, K
    Ryan, J
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2003, 2665 : 336 - 342
  • [35] Blockchain-based multi-party proof of assets with privacy preservation
    Wang, Huaqun
    He, Debiao
    Choo, Kim-Kwang Raymond
    Chen, Xi
    INFORMATION SCIENCES, 2021, 547 : 609 - 621
  • [36] A Privacy-Preserving Scheme for Multi-Party Vertical Federated Learning
    FAN Mochan
    ZHANG Zhipeng
    LI Difei
    ZHANG Qiming
    YAO Haidong
    ZTE Communications, 2024, 22 (04) : 89 - 96
  • [37] Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model
    Neugebauer, Georg
    Brutschy, Lucas
    Meyer, Ulrike
    Wetzel, Susanne
    DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, DPM 2013, 2014, 8247 : 178 - 193
  • [38] MERLIN - A Tool for Multi-party Privacy-preserving Record Linkage
    Ranbaduge, Thilina
    Vatsalan, Dinusha
    Christen, Peter
    2015 IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOP (ICDMW), 2015, : 1640 - 1643
  • [39] Multi-Party Dynamic State Estimation That Preserves Data and Model Privacy
    Ni, Yuqing
    Wu, Junfeng
    Li, Li
    Shi, Ling
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 2288 - 2299
  • [40] Trading correctness for privacy in unconditional multi-party computation (extended abstract)
    Fitzi, M
    Hirt, M
    Maurer, U
    ADVANCES IN CRYPTOLOGY - CRYPTO'98, 1998, 1462 : 121 - 136