Privacy Policy Negotiation in Social Media

被引:59
|
作者
Such, Jose M. [1 ]
Rovatsos, Michael [2 ]
机构
[1] Univ Lancaster, Secur Lancaster, Sch Comp & Commun, Infolab2l, Lancaster LA1 4WA, England
[2] Univ Edinburgh, Sch Informat, Informat Forum 2 12, 10 Crichton St, Edinburgh EH8 9AB, Midlothian, Scotland
关键词
Design; Algorithms; Performance Social media; privacy; conflicts; intimacy; social networking services; online social networks;
D O I
10.1145/2821512
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Social media involve many shared items, such as photos, which may concern more than one user. The challenge is that users' individual privacy preferences for the same item may conflict, so an approach that simply merges in some way the users' privacy preferences may provide unsatisfactory results. Previous proposals to deal with the problem were either time-consuming or did not consider compromises to solve these conflicts (e.g., by considering unilaterally imposed approaches only). We propose a negotiation mechanism for users to agree on a compromise for these conflicts. The second challenge we address in this article relates to the exponential complexity of such a negotiation mechanism. To address this, we propose heuristics that reduce the complexity of the negotiation mechanism and show how substantial benefits can be derived from the use of these heuristics through extensive experimental evaluation that compares the performance of the negotiation mechanism with and without these heuristics. Moreover, we show that one such heuristic makes the negotiation mechanism produce results fast enough to be used in actual social media infrastructures with near-optimal results.
引用
收藏
页数:29
相关论文
共 50 条
  • [1] Policy Negotiation System Architecture for Privacy Protection
    Jang, In Joo
    Shi, Wenbo
    Yoo, Hyeong Seon
    [J]. NCM 2008: 4TH INTERNATIONAL CONFERENCE ON NETWORKED COMPUTING AND ADVANCED INFORMATION MANAGEMENT, VOL 2, PROCEEDINGS, 2008, : 592 - 597
  • [2] Or best offer: A privacy policy negotiation protocol
    Walker, Daniel D.
    Mercer, Eric G.
    Seamons, Kent E.
    [J]. 2008 IEEE WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2008, : 173 - 180
  • [3] Strategies for Privacy Negotiation in Online Social Networks
    Kekulluoglu, Dilara
    Kokciyan, Nadin
    Yolum, Pinar
    [J]. ECAI 2016: 22ND EUROPEAN CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2016, 285 : 1608 - 1609
  • [4] Privacy in Social Media
    Ozkaya, Erdal
    Islam, Rafiqul
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2017, 2018, 239 : 3 - 10
  • [6] A Snow-Ball Algorithm for Automating Privacy Policy Configuration in Social Media
    Abuelgasim, Ammar
    Kayem, Anne V. D. M.
    [J]. INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP 2016), 2017, 691 : 108 - 129
  • [7] Multiparty Privacy in Social Media
    Such, Jose M.
    Criado, Natalia
    [J]. COMMUNICATIONS OF THE ACM, 2018, 61 (08) : 74 - 81
  • [8] Privacy and Social Media Conceptual Review on Private Turbulence in Communication Privacy Management of Social Media
    Yuliarti, Monika Sri
    Anggreni, Likha Sari
    Utari, Prahastiwi
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON MEDIA AND COMMUNICATION STUDIES (ICOMACS 2018), 2018, 260
  • [9] Behavior Accountability of Agents Responsible for Privacy Negotiation in Social Networks
    Gu T.-L.
    Hao F.-R.
    Li L.
    Li J.-J.
    Chang L.
    [J]. Ruan Jian Xue Bao/Journal of Software, 2022, 33 (09):
  • [10] Privacy, Patriarchy, and Participation on Social Media
    Karusala, Naveena
    Bhalla, Apoorva
    Kumar, Neha
    [J]. PROCEEDINGS OF THE 2019 ACM DESIGNING INTERACTIVE SYSTEMS CONFERENCE (DIS 2019), 2019, : 511 - 526