Guarding a Walled Garden — Semantic Privacy Preferences for the Social Web

  • Philipp Kärger
  • Wolf Siberski
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6089)


With increasing usage of Social Networks, giving users the possibility to establish access restrictions on their data and resources becomes more and more important. However, privacy preferences in nowaday’s Social Network applications are rather limited and do not allow to define policies with fine-grained concept definitions. Moreover, due to the walled garden structure of the Social Web, current privacy settings for one platform cannot refer to information about people on other platforms. In addition, although most of the Social Network’s privacy settings share the same nature, users are forced to define and maintain their privacy settings separately for each platform. In this paper, we present a semantic model for privacy preferences on Social Web applications that overcomes those problems. Our model extends the current privacy model for Social Platforms by semantic concept definitions. By means of these concepts, users are enabled to exactly define what portion of their profile or which resources they want to protect and which user category is allowed to see those parts. Such category definitions are not limited to one single platform but can refer to information from other platforms as well. We show how this model can be implemented as extension of the OpenSocial standard, to enable advanced privacy settings which can be exchanged among OpenSocial platforms.


Subject Category Object Category Access Control Policy Privacy Setting Descriptive Category 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Rosenblum, D.: What anyone can know: The privacy risks of social networking sites. IEEE Security & Privacy 5(3) (May-June 2007)Google Scholar
  2. 2.
    Breslin, J., Decker, S.: The future of social networks on the internet: The need for semantics. IEEE Internet Computing 11(6), 86–90 (2007)CrossRefGoogle Scholar
  3. 3.
    Grandison, T., Maximilien, E.M.: Towards privacy propagation in the social web. In: Workshop on Web 2.0 Security and Privacy at the 2008 IEEE Symposium on Security and Privacy, Oakland, California, USA, May 18-21 (2008)Google Scholar
  4. 4.
    Kärger, P., Kigel, E., Olmedilla, D.: Reactivity and social data: Keys to drive decisions in social network applications. In: Second ISWC Workshop on Social Data on the Web, SDoW 2009 (2009)Google Scholar
  5. 5.
    Ferraiolo, D.F., Kuhn, R., Chandramouli, R.: Role-Based Access Control. Artech House (2003), ISBN: 1580533701Google Scholar
  6. 6.
    Baral, C.: Knowledge representation, reasoning and declarative problem solving. Cambridge University Press, Cambridge (2003)zbMATHCrossRefGoogle Scholar
  7. 7.
    Baader, F., Calvanese, D., McGuinness, D.L., Nardi, D., Patel-Schneider, P.F.: Description Logic Handbook. Cambridge University Press, Cambridge (2003)zbMATHGoogle Scholar
  8. 8.
    Bonatti, P.A., Duma, C., Fuchs, N., Nejdl, W., Olmedilla, D., Peer, J., Shahmehri, N.: Semantic web policies - a discussion of requirements and research issues. In: Sure, Y., Domingue, J. (eds.) ESWC 2006. LNCS, vol. 4011, pp. 712–724. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  9. 9.
    Bonatti, P.A., Olmedilla, D.: Driving and monitoring provisional trust negotiation with metapolicies. In: 6th IEEE Policies for Distributed Systems and Networks (POLICY 2005), Stockholm, Sweden, June 2005, pp. 14–23. IEEE Computer Society, Los Alamitos (2005)CrossRefGoogle Scholar
  10. 10.
    OpenSocial Foundation: OpenSocial API v0.9 (August 2009),
  11. 11.
    Tootoonchian, A., Saroiu, S., Ganjali, Y., Wolman, A.: Lockr: better privacy for social networks. In: CoNEXT 2009: Proceedings of the 5th international conference on Emerging networking experiments and technologies, December 2009, pp. 169–180. ACM, New York (2009)CrossRefGoogle Scholar
  12. 12.
    Sun, S.T., Hawkey, K., Beznosov, K.: Secure web 2.0 content sharing beyond walled gardens. In: Proceedings of the 25th Annual Computer Security Applications Conference (ACSAC) (December 2009)Google Scholar
  13. 13.
    Fong, P., Anwar, M., Zhao, Z.: A privacy preservation model for facebook-style social network systems, pp. 303–320 (2009)Google Scholar
  14. 14.
    Liu, K., et al.: Towards privacy-aware opensocial applications. Google Talk (May 2009),
  15. 15.
    Fausto Giunchiglia, R.Z., Crispo, B.: Ontology Driven Community Access Control. In: Proceedings of the First International Workshop on Trust and Privacy on the Social and Semantic Web (SPOT 2009), Heraklion, Greece (2009)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Philipp Kärger
    • 1
  • Wolf Siberski
    • 1
  1. 1.L3S Research Center & University of HannoverGermany

Personalised recommendations