Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
SIS SNDA – BITS Pilani, Hyderabad – 15th & 16th November, 2013 Website: http://sis.netclique.in Privacy Issues in Social Networking Websites: Is Facebook Revealing Our Social Life? Somdip Dey School of Computer Science, The University of Manchester. United Kingdom. Sayak Sen Department of Computer Science, Sikkim Manipal University. India. Introduction Data Extraction Methods In our technologically saturated and digitally enhanced environment, almost everything can be sourced from the internet, and OSN users spend most part of their life in social networking websites like facebook, google +, etc. But at the same time these social networking websites leak different data related to OSN users and hence, jeopardising the privacy of the users. • • • • • Public Listings False Profiles Profile Compromise and Phishing Malicious Applications Facebook Query Language (FQL) Facebook Then (2009) Motivation Facebook is now inevidently the mostly used online social networking website with more than 1.11 billion active users. So privacy of the users are of upmost importance. Source: Bonneau, J., Anderson, J., Anderson, R., and Stajano, F., Eight Friends Are Enough: Social Graph Approximation via Public Listings. In Proceedings of the Second ACM EuroSys Workshop on Social Network Systems (2009), pp. 13-18. Facebook Now (2013) Type Of Extractable Data on Facebook • Profile Data • The Social Graph • Traffic Data Conclusion: ê Even after restricted public listing, there are still many ways to leak OSN user’s social data to third parties. References: Any Kind of Data Exploitation è Ex: Targeted Phishing, Product Design, etc. [1] Bonneau, J., Anderson, J., Anderson, R., and Stajano, F., Eight Friends Are Enough: Social Graph Approximation via Public Listings. In Proceedings of the Second ACM EuroSys Workshop on Social Network Systems (2009), pp. 13-18. [2] Bonneau, J., Anderson, J., and Denezis, G., Prying Data Out of a Social Network. In Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining, 2009, pp. 249-254. [3] Wasserman, S., and Faust, K., Social Network Analysis. Cam- bridge University Press, 1994. [4] “Facebook Privacy Policy,” www.facebook.com/policy.php, 2012. [Online][Viewed on 23rd October, 2013]. [5] Xu, W., Zhou, X., and Li, L., Inferring Privacy Information via Social Relations. In Proceedings of IEEE 24th International Conference on Data Engineering Workshop, ICDEW 2008, pp. 525-530. [6] Javed, Y., Shehab, M., How Do Facebookers Use Friendlists. In Proceedings of the 2012 International Conference on Advances in Social Network Analysis and Mining (ASONAM), 2012, pp. 343- 347. [7] Squicciarini, A., Karumanchi, S., Lin, D., DeSisto, N., Identifying hidden social circles for advanced privacy configuration. Computers & Security, 2013 – Elsevier. Available online 13 August 2013.