Abstract
The need for protecting the privacy of relationships in social networks has recently been stressed in the literature. Conventional protection mechanisms in those networks deal with the protection of resources and data, i.e. with deciding whether access to resources and data held by a user (owner) should be granted to a requesting user (requestor). However, the relationships between users are also sensitive and need protection: knowing who is trusted by a user and to what extent leaks a lot of confidential information about that user. The use of symmetric key cryptography to implement private relationships in social networks has recently been proposed. We show in this paper how to use public-key cryptography to reduce the overhead caused by private relationships.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Ashri, R., Ramchurn, S.D., Sabater, J., Luck, M., Jennings, N.R.: Trust evaluation through relationship analysis. In: AAMAS 2005. 4th International Joint Conference on Autonomous Agengs and Multiagent Systems, pp. 1005–1011. ACM, New York (2005)
Barnes, S.B.: A privacy paradox: social networking in the United States, First Monday, vol. 11(9) (September 2006)
Carminati, B., Ferrari, E., Perego, A.: Rule-based access control for social networks. In: Meersman, R., Tari, Z., Herrero, P. (eds.) On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops. LNCS, vol. 4278, pp. 1734–1744. Springer, Heidelberg (2006)
Carminati, B., Ferrari, E., Perego, A.: Private relationships in social networks (IEEE Catalog Number 07EX1627). In: Private Data Management 2007 workshop of the ICDE 2007- 23rd IEEE International Conference on Data Engineering, Istanbul, Turkey, April 15-20, 2007, IEEE Computer Society Press, Los Alamitos (2007)
Facebook: http://www.facebook.com
Sabater-Mir, J.: Towards the next generation of computational trust and reputation models. In: Torra, V., Narukawa, Y., Valls, A., Domingo-Ferrer, J. (eds.) MDAI 2006. LNCS (LNAI), vol. 3885, pp. 19–21. Springer, Heidelberg (2006)
Staab, S., Domingos, P., Mika, P., Golbeck, J., Ding, L., Finin, T.W., Joshi, A., Nowak, A., Vallacher, R.R.: Social networks applied. IEEE Intelligent Systems 20(1), 80–93 (2005)
Videntity: http://videntity.org
Wang, D.-W., Liau, C.-J., Sheng, T.: Privacy protection in social network data disclosure based on granular computing. In: HICSS 2005. Proc. of the 2006 IEEE International Conference on Fuzzy Systems, pp. 997–1003. IEEE Computer Society, Los Alamitos (2006)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Domingo-Ferrer, J. (2007). A Public-Key Protocol for Social Networks with Private Relationships. In: Torra, V., Narukawa, Y., Yoshida, Y. (eds) Modeling Decisions for Artificial Intelligence. MDAI 2007. Lecture Notes in Computer Science(), vol 4617. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73729-2_35
Download citation
DOI: https://doi.org/10.1007/978-3-540-73729-2_35
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73728-5
Online ISBN: 978-3-540-73729-2
eBook Packages: Computer ScienceComputer Science (R0)