Privacy Protection Based Privacy Conflict Detection and Solution in Online Social Networks

  • Arunee Ratikan
  • Mikifumi Shikida
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8533)


Online Social Networks (OSNs) such as Facebook, Twitter, and so on recently are major impact in communication and social interaction. Users can share any information with others. However, they have concerns about losing privacy due to lack of an adequate privacy protection provided by the OSNs. The information posted by the user (owner) might leak to unwanted target users. Especially, when collaborative information (e.g. text, photo, video, link), which has associated with the owner and multiple users (co-owners) in the real world, is posted into the OSNs, the co-owners do not have permission to control and might not be aware their information that is being managed by others. To overcome, collective privacy protection (CPP) is proposed to balance between the collaborative information sharing and the privacy protection for the owner and co-owners by majority vote. It enables the owner to create the privacy policy and the co-owners to make a decision in the privacy policy by vote. It additionally identifies and solves the privacy conflicts because at least one co-owner intends to keep private.


Online Social Networks Information sharing Privacy protection 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Dhia, I.B.: Access control in social networks: A reachability-based approach. In: Proceedings of the 2012 Joint EDBT/ICDT Workshops, EDBT-ICDT 2012, pp. 227–232. ACM, New York (2012)Google Scholar
  2. 2.
    Li, Q., Li, J., Wang, H., Ginjala, A.: Semantics-enhanced privacy recommendation for social networking sites. In: 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 226–233 (2011)Google Scholar
  3. 3.
    Hu, H., Ahn, G.J., Jorgensen, J.: Detecting and resolving privacy conflicts for collaborative data sharing in online social networks. In: Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC 2011, pp. 103–112. ACM, New York (2011)Google Scholar
  4. 4.
    Hu, H., Ahn, G.J., Jorgensen, J.: Enabling collaborative data sharing in google+. In: 2012 IEEE Global Communications Conference (GLOBECOM), pp. 720–725 (2012)Google Scholar
  5. 5.
    Acquisti, A., Grossklags, J.: Privacy and rationality in individual decision making. IEEE Security Privacy 3(1), 26–33 (2005)CrossRefGoogle Scholar
  6. 6.
    Banks, L., Wu, S.: All friends are not created equal: An interaction intensity based approach to privacy in online social networks. In: International Conference on Computational Science and Engineering, CSE 2009, vol. 4, pp. 970–974 (2009)Google Scholar
  7. 7.
    Gollu, K., Saroiu, S., Wolman, A.: A social networking-based access control scheme for personal content. In: Proceeding of the 21st ACM Symposium on Operating Systems Principles, SOSP 2007 (2007) (Work-in-Progress Session)Google Scholar
  8. 8.
    Carminati, B., Ferrari, E., Perego, A.: Rule-based access control for social networks. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4278, pp. 1734–1744. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  9. 9.
    Hart, M., Johnson, R., Stent, A.: More content- less control: Access control in the web 2.0. In: IEEE Web 2.0 Privacy and Security Workshop (2007)Google Scholar
  10. 10.
    Squicciarini, A.C., Shehab, M., Wede, J.: Privacy policies for shared content in social network sites. The VLDB Journal 19(6), 777–796 (2010)CrossRefGoogle Scholar
  11. 11.
    Dinh, T.N., Shen, Y., Thai, M.T.: The walls have ears: optimize sharing for visibility and privacy in online social networks. In: CIKM, pp. 1452–1461 (2012)Google Scholar
  12. 12.
    Adu-Oppong, F., Gardiner, C., Kapadia, A., Tsang, P.: Social circles: Tackling privacy in social networks. In: Symposium on Usable Privacy and Security, SOSP (2008)Google Scholar
  13. 13.
    Church, L., Anderson, J., Bonneau, J., Stajano, F.: Privacy stories: Confidence in privacy behaviors through end user programming. In: Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS 2009. ACM, New York (2009)Google Scholar
  14. 14.
    Wellman, B., Salaff, J., Dimitrova, D., Garton, L., Gulia, M., Haythornthwaite, C.: Computer networks as social networks: Collaborative work, telework, and virtual community. Annual Review of Sociology 22(1), 213–238 (1996)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Arunee Ratikan
    • 1
  • Mikifumi Shikida
    • 2
  1. 1.School of Information ScienceJapan Advanced Institute of Science and TechnologyIshikawaJapan
  2. 2.Research Center for Advanced Computing InfrastructureJapan Advanced Institute of Science and TechnologyIshikawaJapan

Personalised recommendations