Skip to main content

A Public-Key Protocol for Social Networks with Private Relationships

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4617))

Abstract

The need for protecting the privacy of relationships in social networks has recently been stressed in the literature. Conventional protection mechanisms in those networks deal with the protection of resources and data, i.e. with deciding whether access to resources and data held by a user (owner) should be granted to a requesting user (requestor). However, the relationships between users are also sensitive and need protection: knowing who is trusted by a user and to what extent leaks a lot of confidential information about that user. The use of symmetric key cryptography to implement private relationships in social networks has recently been proposed. We show in this paper how to use public-key cryptography to reduce the overhead caused by private relationships.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ashri, R., Ramchurn, S.D., Sabater, J., Luck, M., Jennings, N.R.: Trust evaluation through relationship analysis. In: AAMAS 2005. 4th International Joint Conference on Autonomous Agengs and Multiagent Systems, pp. 1005–1011. ACM, New York (2005)

    Chapter  Google Scholar 

  2. Barnes, S.B.: A privacy paradox: social networking in the United States, First Monday, vol. 11(9) (September 2006)

    Google Scholar 

  3. Carminati, B., Ferrari, E., Perego, A.: Rule-based access control for social networks. In: Meersman, R., Tari, Z., Herrero, P. (eds.) On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops. LNCS, vol. 4278, pp. 1734–1744. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  4. Carminati, B., Ferrari, E., Perego, A.: Private relationships in social networks (IEEE Catalog Number 07EX1627). In: Private Data Management 2007 workshop of the ICDE 2007- 23rd IEEE International Conference on Data Engineering, Istanbul, Turkey, April 15-20, 2007, IEEE Computer Society Press, Los Alamitos (2007)

    Google Scholar 

  5. Facebook: http://www.facebook.com

  6. Sabater-Mir, J.: Towards the next generation of computational trust and reputation models. In: Torra, V., Narukawa, Y., Valls, A., Domingo-Ferrer, J. (eds.) MDAI 2006. LNCS (LNAI), vol. 3885, pp. 19–21. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  7. Staab, S., Domingos, P., Mika, P., Golbeck, J., Ding, L., Finin, T.W., Joshi, A., Nowak, A., Vallacher, R.R.: Social networks applied. IEEE Intelligent Systems 20(1), 80–93 (2005)

    Article  Google Scholar 

  8. Videntity: http://videntity.org

  9. Wang, D.-W., Liau, C.-J., Sheng, T.: Privacy protection in social network data disclosure based on granular computing. In: HICSS 2005. Proc. of the 2006 IEEE International Conference on Fuzzy Systems, pp. 997–1003. IEEE Computer Society, Los Alamitos (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Vicenç Torra Yasuo Narukawa Yuji Yoshida

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Domingo-Ferrer, J. (2007). A Public-Key Protocol for Social Networks with Private Relationships. In: Torra, V., Narukawa, Y., Yoshida, Y. (eds) Modeling Decisions for Artificial Intelligence. MDAI 2007. Lecture Notes in Computer Science(), vol 4617. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73729-2_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73729-2_35

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73728-5

  • Online ISBN: 978-3-540-73729-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics