Reliability score inference and recommendation using fuzzy-based technique for social media applications
- 170 Downloads
Usage of online social networks (OSN) has been gaining momentum in the recent past. People with varying cultural background and age, spanning the globe, share their views and day-to-day affairs with their community. There are an abundant number of internal applications as well as third-party applications (TPA) available to the users either through these OSN sites or that which uses the OSNs identity service to login and access the service. When users wish to use the TPA, the user’s data has to be shared with the TPA’s server. Otherwise, the service would be denied. When users share such information with the TPA, firstly, the users may not be aware of the reliability level of TPA and how those TPA would be handling the user’s data. Secondly, they need not provide the promised level of service but still would have acquired the data from the users. Hence, it is necessary to check the TPA’s level of service and the data requested by them before using the service. The reliability inference application (RIA) and application recommender proposed in this work are based on fuzzy inference mechanism. They mimic the human expert’s decision of choosing a TPA. The RIA trades off the risk associated with sharing the data with the level of service offered and renders the reliability score of the applications. The application recommender presents the users with the recommendation for TPA as highly recommended, recommended or recommended with risk based on the user’s privacy preference. It assists the user to choose a TPA that provides the desired level of service matching the user’s privacy preferences.
KeywordsOnline social networks Third-party applications Privacy Fuzzy inference system
Compliance with ethical standards
Conflict of interest
The authors declare that they have no conflict of interest.
All procedures performed in studies involving human participants were in accordance with the ethical standards of the institutional and/or national research committee and with the 1964 Helsinki declaration and its later amendments or comparable ethical standards.
Informed consent was obtained from all individual participants included in the study.
- Anthonysamy P, Rashid A, Walkerdine J, Greenwood P, Larkou G (2012) Collaborative privacy management for third-party applications in online social networks. In: Proceedings of the 1st workshop on privacy and security in online social media, ACM, New York, NY, USA, PSOSM ’12, pp 5:1–5:4. doi: 10.1145/2185354.2185359
- Besmer A, Lipford HR, Shehab M, Cheek G (2009) Social applications: exploring a more secure framework. In: Proceedings of the 5th symposium on usable privacy and security, ACM, New York, NY, USA, SOUPS ’09, pp 2:1–2:10. doi: 10.1145/1572532.1572535
- Cheng Y, Park J, Sandhu RS (2013) Preserving user privacy from third-party applications in online social networks. In: 22nd international world wide web conference, WWW ’13, Rio de Janeiro, Brazil, May 13–17, 2013, Companion Volume, pp 723–728. http://dl.acm.org/citation.cfm?id=2488032
- Felt A, Evans D (2008) Privacy protection for social networking apis. In: Proceedings of the workshop on web 2.0 security and privacy, Oakland, CA, pp 1–8Google Scholar
- Jsoup (2015) API documentation for jsoup. https://jsoup.org/apidocs/
- Krutz DE, Mirakhorli M, Malachowsky SA, Ruiz A, Peterson J, Filipski A, Smith J (2015) A dataset of open-source android applications. In: Mining software repositories (MSR), 2015 IEEE/ACM 12th working conference on IEEE, pp 522–525. doi: 10.1109/MSR.2015.79
- Matlab (2016) Heirachical clustering. https://in.mathworks.com/help/stats/hierarchical-clustering.html
- Peng H, Gates C, Sarma B, Li N, Qi Y, Potharaju R, Nita-Rotaru C, Molloy I (2012) Using probabilistic generative models for ranking risks of android apps. In: Proceedings of the 2012 ACM conference on computer and communications security, ACM, New York, NY, USA, CCS ’12, pp 241–252. doi: 10.1145/2382196.2382224
- Shanmughapriya T, Swamynathan S (2016) An alert system based on shared score for online social networks. In: Proceedings of the second international conference on information and communication technology for competitive strategies, ACM, p 108Google Scholar
- Singh K, Bhola S, Lee W (2009) xbook: redesigning privacy control in social networking platforms. In: Proceedings of the 18th conference on USENIX security symposium, USENIX Association, Berkeley, CA, USA, SSYM’09, pp 249–266. http://dl.acm.org/citation.cfm?id=1855768.1855784
- TextBlob (2015) Text Blob in Python documentation. https://pypi.python.org/pypi/textblob
- Tuunainen VK, Pitkänen O, Hovi M (2009) Users’ awareness of privacy on online social networking sites-case facebook. In: Proceedings of Bled 2009, p 42Google Scholar