AppMonitor: restricting information leakage to third-party applications

被引:0
|
作者
Nemi Chandra Rathore
Somanath Tripathy
机构
[1] Indian Institute of Technology,Department of Computer Science and Engineering
[2] CUSB,undefined
来源
关键词
Online social network; Third-party application; Privacy; Access control; Answer set programming;
D O I
暂无
中图分类号
学科分类号
摘要
Nowadays, the popularity of online social networks (OSNs) has been increased tremendously. Meanwhile, a wide range of third-party applications (TPAs) facilitated by OSNs has made a significant contribution to their popularity. TPAs offer many attractive functionalities and services to the OSN users but pose serious privacy threats to the users. Therefore, it is essential to strictly regulate the divulgence of user data to TPAs. In this paper, we propose an access control framework called AppMonitor to monitor and curb the user data to TPA. Further, we also introduce a relation-based access control policy model that uses predicate calculus to express data access policies. Analysis of the usability and correctness of the introduced policy model has been made, based on a logical model using answer set programming. A simplified prototype has been developed to show the feasibility of AppMonitor, and its effectiveness is shown through a user study.
引用
收藏
相关论文
共 50 条
  • [1] AppMonitor: restricting information leakage to third-party applications
    Rathore, Nemi Chandra
    Tripathy, Somanath
    SOCIAL NETWORK ANALYSIS AND MINING, 2020, 10 (01)
  • [2] Leakage of Sensitive Information to Third-Party Voice Applications
    Bispham, Mary
    Zard, Clara
    Sattar, Suliman
    Ferrer-Aran, Xavier
    Suarez-Tangil, Guillermo
    Such, Jose
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON CONVERSATIONAL USER INTERFACES, CUI 2022, 2022,
  • [3] Classification of Third-Party Applications on Facebook to Mitigate Users' Information Leakage
    Kavianpour, Sanaz
    Ismail, Zuraini
    Shanmugam, Bharanidharan
    RECENT ADVANCES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 1, 2017, 569 : 144 - 154
  • [4] Misinformation in Third-party Voice Applications
    Bispham, Mary
    Sattar, Suliman Kalim
    Zard, Clara
    Ferrer-Aran, Xavier
    Edu, Jide
    Suarez-Tangil, Guillermo
    Such, Jose
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON CONVERSATIONAL USER INTERFACES, CUI 2023, 2023,
  • [5] Integrating third-party applications and information systems into the World Wide Web
    Chiu, CM
    Chen, RS
    Bieber, M
    ASSOCIATION FOR INFORMATION SYSTEMS PROCEEDINGS OF THE AMERICAS CONFERENCE ON INFORMATION SYSTEMS, 1998, : 935 - 937
  • [6] Strategy for scheduled downtime of hospital information system utilizing third-party applications
    Jo, Inhae
    Kim, Woojin
    Lim, Younghee
    Kang, Eunjeong
    Kim, Jinung
    Chung, Hyekyung
    Kim, Jihae
    Kang, Eunhye
    Jung, Yoon Bin
    BMC MEDICAL INFORMATICS AND DECISION MAKING, 2024, 24 (01)
  • [7] Visualizations of Third-Party Applications on DCS Systems
    Kujawa, Marcin
    Piotrowski, Robert
    INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND ENERGY TECHNOLOGIES (ICECET 2021), 2021, : 1767 - 1770
  • [8] Dynamic privacy leakage analysis of Android third-party libraries
    He, Yongzhong
    Yang, Xuejun
    Hu, Binghui
    Wang, Wei
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 46 : 259 - 270
  • [9] Dynamic Privacy Leakage Analysis of Android Third-party Libraries
    He, Yongzhong
    Hu, Binghui
    Han, Zhen
    2018 1ST INTERNATIONAL CONFERENCE ON DATA INTELLIGENCE AND SECURITY (ICDIS 2018), 2018, : 275 - 280
  • [10] Using third-party purchasing to push third-party logistics
    Long, JS
    Zhao, J
    THIRD WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS: GLOBAL BUSINESS INTERFACE, 2004, : 400 - 404